Dell PowerConnect 5524 Manuels
Dell PowerConnect 5524 Manuels
-> Accéder au site Dell
-> Accéder aux CODES PROMO et Bons de réduction Dell
-> Voir d'autres manuels Dell
Revenir à l'accueil
ou juste avant la balise de fermeture -->
PowerConnect 5524
More Languages
-> Commander sur Dell.com, Cliquez ici
Autres manuels :
Dell-Latitude-D630-M..> 10-May-2013 11:17 4.7M
Dell-Precision-690-M..> 10-May-2013 11:16 3.2M
Dell-Latitude-E6400-..> 10-May-2013 11:16 3.9M
Dell-Precision-M40-M..> 10-May-2013 11:15 3.9M
Dell-Precision-360-M..> 10-May-2013 11:15 4.0M
Dell-PowerEdge-R320-..> 10-May-2013 11:14 4.4M
Dell-Precision-450-M..> 10-May-2013 11:13 4.6M
Dell-Intel-Active-Ma..> 10-May-2013 11:13 4.7M
Dell-OptiPlex-755-Ma..> 10-May-2013 11:12 5.5M
Dell-PowerVault-NX30..> 10-May-2013 11:12 5.6M
Dell-Precision-M4500..> 10-May-2013 11:10 6.1M
Dell-OptiPlex-SX280-..> 10-May-2013 11:10 6.0M
Dell-Latitude-E6400-..> 10-May-2013 10:30 3.2M
Dell-PowerEdge-T100-..> 10-May-2013 10:22 3.0M
Dell-Vostro-270s-Man..> 10-May-2013 10:21 3.1M
Dell-Precision-T7600..> 10-May-2013 10:21 3.2M
Dell-Precision-M4400..> 10-May-2013 10:20 3.3M
Dell-Precision-M4700..> 10-May-2013 10:20 3.4M
Dell-Precision-M4600..> 10-May-2013 10:19 3.4M
Dell-Precision-390-M..> 10-May-2013 10:19 2.0M
Dell-Precision-610-M..> 10-May-2013 10:18 2.3M
Dell-Manuel-d-utilis..> 10-May-2013 10:18 2.3M
Dell-Precision-M20-M..> 10-May-2013 10:17 2.8M
Dell-Guide-d-utilisa..> 10-May-2013 10:17 2.8M
Dell-Precision-370-M..> 10-May-2013 10:16 3.2M
Dell-PowerEdge-T100-..> 10-May-2013 10:22 3.0M
Dell-Vostro-270s-Man..> 10-May-2013 10:21 3.1M
Dell-Precision-T7600..> 10-May-2013 10:21 3.2M
Dell-Precision-M4400..> 10-May-2013 10:20 3.3M
Dell-Precision-M4700..> 10-May-2013 10:20 3.4M
Dell-Precision-M4600..> 10-May-2013 10:19 3.4M
Dell-Precision-390-M..> 10-May-2013 10:19 2.0M
Dell-Precision-610-M..> 10-May-2013 10:18 2.3M
Dell-Manuel-d-utilis..> 10-May-2013 10:18 2.3M
Dell-Precision-M20-M..> 10-May-2013 10:17 2.8M
Dell-Guide-d-utilisa..> 10-May-2013 10:17 2.8M
Dell-Precision-370-M..> 10-May-2013 10:16 3.2M
Dell-Latitude-E6400-..> 10-May-2013 10:16 3.2M
Dell-XPS-M1210-Owner..> 08-May-2013 10:57 2.9M
Dell-Windows-8-Manue..> 08-May-2013 10:54 5.1M
Dell-PowerEdge-R815-..> 08-May-2013 10:52 4.3M
Dell-Inspiron-1521-M..> 08-May-2013 10:51 2.9M
Dell-PowerEdge-R900-..> 08-May-2013 10:50 3.1M
Dell-Vostro-270-Manu..> 08-May-2013 10:50 3.2M
Dell-XPS-630-Manuels..> 08-May-2013 10:49 3.6M
Dell-XPS-M1730-Manue..> 08-May-2013 10:49 3.9M
Dell-Vostro-200-Manu..> 08-May-2013 10:48 4.5M
Dell-Vostro-410-Manu..> 08-May-2013 10:48 4.1M
Dell-Vostro-1700-Man..> 08-May-2013 10:47 4.8M
Dell-Inspiron-m301z-..> 08-May-2013 10:47 4.8M
Dell-Studio-Slim-Man..> 08-May-2013 10:45 5.1M
Dell-PowerEdge-R620-..> 08-May-2013 08:46 4.1M
Dell-PowerEdge-R200-..> 08-May-2013 08:46 2.6M
Dell-Inspiron-640M-M..> 08-May-2013 08:46 3.7M
Dell-Inspiron-600m-M..> 08-May-2013 08:45 2.6M
Dell-Studio-Desktop-..> 08-May-2013 08:44 2.7M
Dell-Vostro-1000-Man..> 08-May-2013 08:44 2.7M
Dell-Inspiron-15-Int..> 08-May-2013 08:44 3.0M
Dell-Alienware-Area-..> 08-May-2013 08:43 3.1M
Dell-DR4000-Manuels.htm 08-May-2013 08:43 3.4M
Dell-Alienware-M15x-..> 08-May-2013 08:42 3.3M
Dell-Latitude-XT2-Ma..> 08-May-2013 08:42 3.5M
Dell-Latitude-E5520-..> 08-May-2013 08:41 3.5M
Dell-OptiPlex-745-Ma..> 08-May-2013 08:40 3.9M
Dell-Inspiron-1525-M..> 08-May-2013 08:40 3.9M
Dell-Inspiron-One-23..> 08-May-2013 08:39 4.2M
Dell-Inspiron-One-23..> 08-May-2013 08:39 2.8M
Dell-Inspiron-510m-M..> 08-May-2013 08:38 3.2M
Dell-Inspiron-Duo-Ma..> 08-May-2013 08:38 3.0M
Dell-Vostro-1550-Man..> 08-May-2013 08:37 3.4M
Dell-Precision-T5600..> 08-May-2013 08:37 3.3M
Dell-Dimension-8300-..> 07-May-2013 22:03 2.5M
Dell-Latitude-Cpi-Ma..> 07-May-2013 22:01 3.2M
Dell-Alienware-Area-..> 07-May-2013 22:01 3.2M
Dell-Latitude-D620-M..> 07-May-2013 22:00 2.3M
Dell-PowerEdge-1950-..> 07-May-2013 22:00 2.2M
Dell-Precision-T5600..> 07-May-2013 21:30 3.1M
Dell-PowerEdge-R720x..> 07-May-2013 21:26 3.1M
Dell-Inspiron-500m-M..> 07-May-2013 21:26 2.8M
Dell-PowerEdge-R815-..> 07-May-2013 21:25 2.8M
Dell-Alienware-M15x-..> 07-May-2013 21:25 2.8M
Dell-Vostro-3450-Man..> 07-May-2013 21:24 2.8M
Dell-PowerEdge-R610-..> 07-May-2013 21:24 2.9M
Dell-Vostro-3750-Man..> 07-May-2013 21:23 3.0M
Dell-Studio-1555-15-..> 07-May-2013 21:23 3.1M
Dell-Manuel-de-maint..> 07-May-2013 21:22 3.0M
Dell-Latitude-E6420-..> 07-May-2013 21:22 3.1M
Dell-Inspiron-1520-M..> 07-May-2013 21:21 2.0M
Dell-Aztech-MDP3900-..> 07-May-2013 21:21 2.0M
Dell-PowerEdge-M905-..> 07-May-2013 21:21 2.0M
Dell-PowerEdge-400SC..> 07-May-2013 21:21 2.1M
Dell-Precision-M4500..> 07-May-2013 21:20 2.2M
Dell-Vizioncore-Manu..> 07-May-2013 21:20 2.1M
Dell-Inspiron-1520-2..> 07-May-2013 21:19 2.5M
Dell-Guide-Utilisate..> 07-May-2013 21:19 2.4M
Dell-PowerEdge-R510-..> 07-May-2013 21:18 2.7M
Dell-Manuel-d-Utilis..> 07-May-2013 21:18 2.4M
Dell-PowerEdge-300-M..> 06-May-2013 19:33 4.7M
Dell-Lifecycle-Contr..> 06-May-2013 19:32 4.3M
Dell-PowerVault-110T..> 06-May-2013 19:31 4.4M
Dell-Inspiron-620-Ma..> 06-May-2013 19:10 3.2M
Dell-Dimension-5100-..> 06-May-2013 19:10 3.4M
Dell-Manuels-et-docu..> 06-May-2013 19:09 3.7M
Dell-Manuels-et-docu..> 06-May-2013 19:09 3.5M
Dell-1130-Dell-1130n..> 06-May-2013 18:42 3.1M
Dell-Controleurs-RAID-Dell-PowerEdge-PERC-H310-H710-H710P-et-H810-Guide-d-utilisation
Dell-Laser-MFP-Dell-3333dn-et-3335dn-Guide-de-l-utilisateur
Dell-PowerVault-DL-Backup-to-Disk-Appliance-Powered-by-Symantec-Backup-Exec-Guide-d-utilisation
Dell-XPS-015-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerVault-NX3300-Guide-de-mise-en-route
Dell-INSPIRON-GUIDE-DE-REFERENCE
Dell-Systemes-Dell-PowerVault-Network-Attached-Storage-NAS-Guide-de-depannage
Dell-Commutateur-de-consoles-2161DS-Dell-Guide-de-l-utilisateur-d-OSCAR-et-du-materiel
Dell-PowerEdge-T420-Guide-de-mise-en-route
Dell-PowerEdge-C8000XD-Manuel-du-proprietaire-du-materiel
Dell-OptiPlex-755-Guide-d-utilisation
Dell-Matrices-de-stockage-Dell-PowerVault-MD3200i-et-MD3220i-Guide-de-deploiement
Dell-Latitude-E5400-et-E5500-Guide-de-configuration-et-de-reference-rapide
Dell-Set-Up-Your-Computer
Dell-Manuel-du-proprietaire-du-Dell-XPS-M1730-Manuel
Dell-Systemes-Dell-PowerEdge-M620-Manuel-du-proprietaire-Manuel
Dell-PowerEdge-C410x-Getting-Started-With-Your-System
Dell-Systemes-Dell-PowerEdge-SUSE-Linux-Enterprise-Server-10-Instructions-d-installation
Dell-Utilitaires-de-gestion-du-Dell-OpenManage-Baseboard-Management-Controller-Version%204.6-Guide-d-utilisation
Dell-OpenManage-Server-Administrator-Guide-d-installation-de-la-version-7.1
Dell-Systeme-Dell-DR4000-Guide-de-l-administrateur
Dell-Systemes-Dell-PowerEdge%20Red-Hat-Enterprise-Linux-6-x86_64-x86-Instructions-d-installation-et-informations-importantes
Dell-Integrated-Dell-Remote-Access-Controller-7-iDRAC7-Version-1.20.20-Guide-d-utilisation
Dell-Management-Plug-In-pour-VMware-vCenter-Version-1.5-Guide-d-utilisation
Dell-Projecteur-7700FullHD-Dell-Guide-de-l-utilisateur
Dell-Projecteur-Dell-1420X-1430X-Guide-d-utilisation
Dell-FluidFS-NAS-Solutions-Guide-de-l-administrateur
Dell-PowerEdge-Express-SSD-PCIe-Flash-Guide-d-utilisation
Dell-Update-Packages-DUP-Version-7.0-Guide-d-utilisation
Dell-PowerEdge-R720-et-R720xd-Guide-de-mise-en-route-Manuel
Dell-PowerEdge-R320-Guide-de-mise-en-route
Dell-Systemes-Dell-PowerEdge-R510-Manuel-du-proprietaire
Dell-Precision-M4400-Guide-de-configuration-et-de-reference-rapide
Dell-Matrices-de-stockage-SCSI-Dell-EqualLogic-PS-Series-a-clusters-de-basculement-Microsoft-Windows-Server-Guide-d-installation-et-de-depannage-du-materie
Dell-PowerEdge-C410x-Guide-de-mise-en-route-du-systeme
Dell-Moniteur-a-ecran-plat-Dell-U2713HM-Guide-d-utilisation
Dell-Moniteur-a-Dell-P1913-P1913S-P2213
Dell-Guide-de-l-utilisateur-du-moniteur-Dell-E1913S-E1913-E2213
Dell-Systems-Service-and-Diagnostics-Tools-Version-7.0-Guide-d-installation-rapide
Dell-Moniteur-a-Dell-S2740L-Guide-d-utilisation
Dell-INSPIRON-GUIDE-DE-CONFIGURATION
Dell-Dimension-Serie-8300
Dell-PowerEdge-R820-Guide-de-mise-en-route
Dell-PowerEdge-C8000-Manuel-du-proprietaire-du-materiel-manuel
Dell-OpenManage-Server-Administrator-Version-7.1-Guide-d-utilisation
Dell-PowerEdge-M1000e-M915-M910-M820-M710HD-M710-M620-M610x-M610-M520-et-M420-Guide-de-mise-en-route
Dell-OpenManage-Server-Administrator-Version-7.0-Guide-d-installation
Dell-Inspiron-15R-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerVault-NX3200-Guide-de-mise-en-route
Dell-PowerEdge-RAID-Controller-PERC-S110-Guide-d-utilisation
Dell-FluidFS-NAS-Solutions-Guide-de-mise-en-route
Dell-Micrologiciel-Dell-Chassis-Management-Controller-Version-4-1-Guide-d-utilisation
Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Guide-de-mise-en-route
Dell-Vostro-470-Manuel-du-proprietaire
/Dell-Systeme-Dell-PowerVault-NX3500-Guide-de-l-administrateur
Dell-Latitude-E6420-XFR-Guide-technique
Dell-Guide-de-l-utilisateur-du-moniteur-S2240M-S2340M
Dell-Systemes-Dell-DR4000-Manuel-du-proprietaire-manuel
Dell-PowerEdge-T320-Guide-de-mise-en-route
Dell-Precision-Workstation-T3600-Manuel-du-proprietaire
Dell-Systemes-Dell-DR4000-Manuel-du-proprietaire
Dell-PowerEdge-R420-Guide-de-mise-en-route
Dell-PowerEdge-C8220-Manuel-du-proprietaire-du-materiel-manuel
Dell-Vostro-470-Owner-s-Manual
Dell-Projecteur-Dell-M110-Guide-de-l-utilisateur
Dell-Upgrading-to-BackupExec-2012-PowerVault-DL-Backup-to-Disk-Appliance
Dell-PowerVault-NX3300-Manuel-du-proprietaire
Dell-PowerConnect-5500-Series-CLI-Reference-Guide
Dell-Matrices-de-stockage-Dell-PowerVault-MD3260-Series-Guide-de-deploiement
Dell-Inspiron-One-2020-Manuel-du-proprietaire
Dell-XPS-14-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-1900-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-M620-Manuel-du-proprietaire
Dell-PowerEdge-R815-Manuel-du-proprietaire
Dell-PowerEdge-R720-and-R720xd-Owner-s-Manual
Dell-Micrologiciel-Dell-Chassis-Management-Controller-Version-4.0-Guide-d-utilisation
Dell-Inspiron-17R-Manuel-du-proprietaire-Manuel
Dell-Inspiron-One-2020-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-C5220-Manuel-du-proprietaire-du-materiel
Dell-Inspiron-660s-Manuel-du-proprietaire-manuel
Dell-PowerEdge-R820-Manuel-du-proprietaire
Dell-Vostro-270-Manuel-du-proprietaire-manuel
Dell-Systeme-Dell-PowerEdge-C6220-Manuel-du-proprietaire
Dell-Inspiron-14R-Manuel-du-proprietaire
Dell-Guide-de-l-Utilisateur-de-l-Ecran-Large-Dell-IN1940MW
Dell-Moniteur-a-Dell-S2440L-Guide-d-utilisation
Dell-Alienware-X51-Owner-s-Manual
Dell-ALIENWARE-M17x-MOBILE-MANUAL
Dell-Emplacement-des-cavaliers-de-la-carte-systeme-des-systemes-Dell-PowerEdge-R310-Mise-a-jour-des-informations
Dell-Systemes-Dell-PowerEdge-6950-Manuel-du-proprietaire
Dell-Alienware-M17x-R4-Owner-s-Manual
Dell-XPS-13-Owner-s-Manual
Dell-HBA-SAS-Dell-PowerEdge-6-Gb-s-et-Internal-Tape-Adapter-Guide-d-utilisation
Dell-Systemes-Dell-PowerEdge-R910-Mise-a-jour-des-informations
Dell-Systemes-Dell-PowerEdge-T610-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R420-Manuel-du-proprietaire
/Dell-PowerEdge-R905-Manuel-du-proprietaire
Dell-Imprimantes-laser-Dell-2350d-et-Dell-2350dn
Dell-XPS-430-Guide-de-reference-rapide
Dell-PowerEdge-RAID-Controller-PERC-H700-et-H800-Guide-d-utilisation
Dell-Lifecycle-Controller-2-Version-1.00.00-User-s-Guide
Dell-OpenManage-Server-Administrator-Version-7.0-Guide-d-utilisation
Dell-Solutions-NAS-Dell-FluidFS-Manuel-du-proprietaire-Manue
Dell-Guide-de-l-utilisateur-Dell-V525w
Dell-XPS-13-Manuel-du-proprietaire
Dell-Adaptateurs-Brocade-Manuel-d-installation-et-de-reference
Dell-FluidFS-NAS-Solutions-NX3600-NX3610-Guide-de-deploiement
Dell-Systemes-Dell-PowerEdge-T410-Manuel-du-proprietaire
Dell-Latitude-ST-Manuel-du-proprietaire-Manuel
Dell-OptiPlex-360-Guide-de-configuration-et-de-reference-rapide
Dell-PowerEdge-R810-Manuel-du-proprietaire-du-materiel
Dell-Guide-d-installation-des-systemes-Dell-PowerVault-Modular-Disk-3000
Dell-Imprimante-laser-Dell-2230d-Guide-de-l-utilisateur
Dell-Systemes-Dell-PowerEdge-C6105-Manuel-du-proprietaire-du-materiel
Dell-Imprimante-personnelle-a-jet-d-encre-Dell-J740-Manuel-du-proprietaire
Dell-2130cn-IMPRIMANTE-LASER-COULEUR
Dell-Guide-d-utilisation-de-la-station-de-travail-Dell-Precision-T3400
Dell-1235cn-Imprimante-Multifonction-Mode-d-emploi
Dell-Vostro-1310-1510-1710-et-2510-Guide-de-configuration-et-de-reference-rapide
Dell-Guide-d-utilisation-APC-Smart-UPS-750VA-1000VA-1500VA-100-120-230-V-CA-2U-Montage-en-baie-Onduleur
Dell-Guide-d-utilisation-Modele-TL24iSCSIxSAS%201Gb-iSCSI-a-SAS
Dell-Imprimantes-laser-Dell-1130-et-Dell-1130n
Dell-Precision-M6400-Guide-de-configuration-et-de-reference-rapide
Dell-M770mm-Color-Monitor-Quick-Set-up
Dell-Carte-de-gestion-reseau-AP9617-AP9618-AP9619-Manuel-d-installation-et-de-demarrage-rapide
Dell-Projecteur-Dell-1410X-Guide-d-utilisation
Dell-Imprimante-couleur-Dell-1350cnw
Dell-Manuel-d-utilisation-Dell-Inspiron-M5040-15-N5040-15-N5050-Manuel
Dell-Manuel-de-maintenance-Dell-Inspiron-620
Dell-3D-VISION-MANUEL-D-UTILISATION
Dell-Inspiron-600m-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R805-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R900-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-2970-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-C6145-Manuel-du-proprietaire-du-materiel
Dell-Inspiron-660s-Manuel-du-proprietaire
Dell-P513w-User-s-Guide-Francais-manuel
Dell-Inspiron-660-manuels
Dell-Serveur-de-sauvegarde-sur-disque-Dell-PowerVault-DL-optimise-par-CommVault-Simpana-Guide-d-utilisation
Dell-P513w-User-s-Guide-Guide-de-l-utilisateur-manuel
Dell-Precision-Workstation-T1650-Manuel-du-proprietaire
Dell-ALIENWARE-M17x-MANUEL-DE-L-ORDINATEUR-PORTABLE
Dell-Manuel-du-proprietaire-de-Dell-PowerEdge-M905-M805-M600-et-M605
Dell-Inspiron-One-2330-Manuel-du-proprietaire
Dell-Dimension-1100-B110-Manuel-du-proprietaire
Dell-Vostro-270-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T320-Manuel-du-proprietaire
Dell-Station-de-travail-mobile-Dell-Precision-M4700-Manuel-du-proprietaire
Dell-XPS-8500-Manuel-du-proprietaire
Dell-1230c-Imprimante-laser-couleur-mode-d-emploi-Manuel
Dell-Client-Management-Manuel
Dell-Studio-XPS-Setup-Guide-Manue
Dell-Adaptateur-hote-Dell-PCIe-SCSI-Ultra320-monocanal-Guide-d-utilisation-Manuel
Dell-INSPIRON-DUO-SETUP-GUIDE-Manuel
Dell-INSPIRON-DUO-GUIDE-DE-CONFIGURATION-Manuel
Dell-Guide-de-l-utilisateur-Dell-Inspiron-M4040-14-N4050-Manuel
Dell-Guide-de-l-administrateur-de-Dell-PowerVault-705N-Manuel
Dell-Vostro-420-220-220s-Guide-de-Configuration-et-de-Reference-Rapide-Manuel
Dell-Matrices-de-stockage-Dell-PowerVault-MD3660f-Series-Guide-de-deploiement-Manuel
Dell-Systemes-Dell-PowerVault-Network-Attached-Storage-NAS-Guide-de-l-administrateur-Manuel
Dell-Latitude-D430-Guide-d-utilisation-Manuel
Dell-Studio-XPS-Guide-de-configuration-Manuel
Dell-PowerEdge-C410x-Manuel-du-proprietaire
Dell-Precision-Workstation-T1650-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R300-Manuel-du-proprietaire
Dell-Systemes%20-Dell%20PowerEdge-T110-II-Manuel-du-proprietaire
Dell-Vostro-200-Manuel-du-proprietaire-Mini-Tower
Dell-Inspiron-531-Manuel-du-proprietaire
Dell-ALIENWARE-MANUEL-DE-L-ORDINATEUR-DE-BUREAU-Francais
Dell-PowerEdge-R520-Manuel-du-proprietaire
Projecteur-Dell-1201MP-Manuel-d-utilisation
Dell-PowerEdge-R910-Manuel-du-proprietaire
Dell-Dimension-C521-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T605-Manuel-du-proprietaire
Dell-Mobile-Jamz
Dell-Inspiron-530-Series-Manuel-du-proprietaire
Dell-Vostro-3460-Manuels
Dell-OPENMANAGE-POWER-CENTER-1.1-Guide-d-utilisation
Dell-PowerVault-MD3660f-Storage-Arrays-Manuels
Dell™ Ekran Yöneticisi Kullanıcı Kılavuzu
Dell-PowerEdge-R620-Guide-de-mise-en-route
Dell-PowerEdge-R520-Guide-de-mise-en-route
DELL-POWERVAULT-MD1200-et-MD1220-TECHNICAL-GUIDEBOOK
Console-de-gestion-multi-onduleurs-Dell-Manuel-de-l-utilisateur-pour-l-installation-et-la-configuration
DELL-OPTIPLEX580-TECHNICAL-GUIDEBOOK-INSIDE-THE-OPTIPLEX-580
Dell-Inspiron-1720-manuels
Dell-PowerEdge-R720-et-R720xd-Guide-de-mise-en-route
Dell-Vostro-1540-1550-Manuel-du-proprietaire
Dell-Latitude-E5430-Manuel-du-proprietaire
Dell™ S2240L/S2340L Monitör Kullanıcı Kılavuzu
Dell PowerEdge Sistemleri İçin Microsoft Windows Server 2012 Önemli Bilgiler Kılavuzu
Dell-Guide-de-l-utilisateur-du-moniteur-Dell-S2240L-S2340L
Dell™ S320/S320wi Projektör Kullanım Kılavuzu
Dell-%20Vostro-270-Manuels
Dell-Vostro-3460-Manuel-du-proprietaire-Francais
Dell-Inspiron-9200-Manuel-de-l-utilisateur
Dell-Inspiron-2600-et-2650-Manuel-de-l-utilisateur
Dell-Axim-X30-Manuel-de-l-utilisateur
Dell-Vostro-2520-Manuel-du-proprietaire
Dell-Inspiron-1721-Manuel
Dell-Systemes-Dell-PowerEdge-T710-Manuel-du-proprietaire
Dell-Precision-Workstation-T5600-Manuel-du-proprietaire
Dell-Solutions-NAS-Dell-FluidFS-Manuel-du-proprietaire
Systemes-Dell-PowerEdge-C5220-Manuel-du-proprietaire-du-materiel
Dell-Dimension-3000-Manuel-du-proprietaire
Dell-PowerEdge-R210-Technical-Guide
Dell-Inspiron-Manuels
Dell-Manuel-du-proprietaire-du-Dell-Vostro-1700
Dell-Clavier-sans-fil-et-souris-Dell-KM713-Manuel-de-l'utilisateur
Dell-Systeme-de-navigation-GPS-Dell-Manuel-de-l'utilisateur
Dell-Logiciel-de-gestion-de-l-onduleur-Manuel-de-l-utilisateur-pour-l-installation-et-la-configuration
Dell-Demarrage-rapide-du-moniteur-couleur-M990
Dell-Manuel-de-l-utilisateur-de-la-station-de-travail-Dell-Precision-370
Dell-Systemes-Dell-PowerEdge-2800-Guide-d-installation-et-de-depannage
Dell-Manuel-de-l-utilisateur-du-systeme-Dell-OptiPlex-SX280
Dell-Vostro-1440-1450-Manuel-de-l-utilisateur
Dell-Photo-Printer-540-Guide-de-l-utilisateur
Dell-Streak-7-Francais-Manuel-de-l-utilisateur
Dell-Venue-Pro-Manuel-de-l-utilisateur
Dell-Imprimante-laser-personnelle-Dell-P1500-Manuel-du-proprietaire
Dell-PowerEdge-C5125-Manuel-du-proprietaire-du-materiel
Dell-Latitude-D630-Manuels
Dell-Vostro-400-Manuel-du-proprietaire-Mini-Tower
Dell-Systemes-Dell-PowerEdge-T100-Manuel-du-proprietaire
Dell-OptiPlex-9010-7010-compact-Manuel-du-proprietaire
Dell-PowerVault%20NX3200-Manuel-du-proprietaire
Dell-Inspiron-1200-et-2200-Manuel-de%20l-utilisateur
Dell-Vostro-1540-1550-Manuel-du-proprietaire
Dell-Inspiron-8600-Manuel-du-proprietaire
Dell-PowerVault-Baie-de-stockage-MD1120-Manuel-du-proprietaire
Dell-Dimension-E521-Manuel-du-proprietaire
Dell-Inspiron-9100-Manuel-du-proprietaire
Dell-Vostro-3360-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T300-Manuel-du-proprietaire
Dell-XPS-One-2710-manuel-d-utilisation
Dell-Inspiron-1150-Manuel-du-proprietaire
Dell-Latitude-E5530-Manuel-du-proprietaire
Dell-Inspiron-660-Manuel-du-proprietaire
Acceder-au-site-Dell
Dell-Manuel-du-proprietaire-des-Dell-Latitude-E6420-et-E6420-ATG-Francais
Dell-OptiPlex-9010-Tout-en-un-Manuel-du-proprietaire
Dell-Vostro-3560-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T110-Manuel-du-proprietaire
Dell-server-poweredge-m710-tech-guidebook_fr
Dell-Systemes-Dell-PowerEdge-R420-Manuel-du-proprietaire
Dell-Latitude-5420-E5420-E5420m-Manuel-de-l-utilisateur
Dell-Latitude-E6320-Manuel-de-l-utilisateur
Dell-Systemes-Dell-Inspiron-8200-Manuel-de-l-utilisateur-Francais
Dell-server-poweredge-r610-tech-guidebook_fr
Dell-server-poweredge-t710-technical-guide-book_fr
Dell-server-poweredge-m1000e-tech-guidebook_fr
Dell-server-poweredge-m610-tech-guidebook_fr
Dell-poweredge-r210-technical-guidebook-en_fr
Dell-MANUEL-ALIENWARE-M15x-MOBILE-Manuel-de-l-utilisateur
Dell-Axim-X51-X51v-Manuel-de-l-utilisateur
Dell-Beats-By-dr.dre-Manuel-et-Garantie
Dell-Dimension-3100C-Manuel-du-proprietaire
Dell-Precision-Workstation-T3600-Manuel-du-proprietaire
Dell-Vostro-200-Manuel-du-proprietaire-Slim-Tower
Dell-ALIENWARE-MANUEL-DE-L-ORDINATEUR-DE-BUREAU
Dell-OPENMANAGE-POWER-CENTER-1-1-Guide-d-utilisation
Dell-Vostro-360-Proprietaire-du-manuel
Dell-Dimension-3100C-Manuel-du-proprietaire
AlienwareArea-51Area-51ALX
Dell-Ordinateurs-de-Bureau-PC-Portables-Netbooks/AlienwareAurora-R3
AlienwareAurora-R4
lienwareAuroraAuroraALXAurora-R2
Chassis-RAID-Dell-PowerVault-MD3000i-Manuel-du-proprietaire
Dell-Axim-X50-Manuel-du-proprietaire
Dell-Axim-X51-X51v-Manuel-du-proprietaire
Dell-Baie-de-stockage-Dell-PowerVault-MD1000-Manuel-du-proprietaire
Dell-Boîtier-Dell-PowerEdge-M1000e-Manuel-du-proprietaire
Dell-Clavier-Axim-Manuel-du-proprietaire
Dell-Dimension-3100-E310-Manuel-du-proprietaire
Dell-Dimension-9200-Manuel-du-proprietaire
Dell-Dimension-E520-Manuel-du-proprietaire
Dell-Imprimante-laser-Dell-1100-Manuel-du-proprietaire
Dell-Imprimante-laser-de-groupe-de-travail-Dell-M5200-Manuel-du-proprietaire
Dell-Imprimante-laser-monochrome-Dell-5330dn-Mode-d-emploi
Dell-Imprimante-laser-multifonction-Dell-1600n-Manuel-du-proprietaire
Dell-Inspiron-13z-Manuel-du-proprietaire
Dell-Inspiron-17R-Manuel-du-proprietaire
Dell-Inspiron-530s-Manuel-d-utilisation
Dell-Inspiron-530s-Manuel-du-proprietaire
Dell-Inspiron-700m-Manuel-du-proprietaire
Dell-Inspiron-1100-Manuel-d-utilisation
Dell-Inspiron-1525-1526-Manuel-du-proprietaire
Dell-Inspiron-5100-et-5150-Manuel-d-utilisation
Dell-Inspiron-9300-Manuel-du-proprietaire
Dell-Inspiron-9400-E1705-Manuel-du-proprietaire
http://www.audentia-gestion.fr/Dell-Ordinateurs-de-Bureau-PC-Portables-Netbooks/Dell-Laser-Printer-1700-1700n-Manuel-du-proprietaire.htm
Dell-Laser-Printer-1710-1710n-Manuel-du-proprietaire
Dell-Laser-Printer-3100cn-manuel-du-proprietaire
Dell-Latitude-ST-Manuel-du-proprietaire
Dell-Latitude-XT3-Manuel-du-proprietaire
Dell-Liste-des-manuels-et-de-la-documentation-Dell
Dell-MANUEL-ALIENWARE-M11x-MOBILE-Manuel-du-proprietaire
Dell-MANUEL-ALIENWARE-M15x-MOBILE
Dell-MANUEL-D-ALIENWARE-M17x-MOBILE-francais
Dell-MANUEL-D-ALIENWARE-M17x-MOBILE
Dell-Manuel-d-utilisation-Dell-Inspiron-M5040-15-N5040-15-N5050
Dell-Manuel-d-utilisation-du-Dell-XPS-420
Dell-Manuel-de-l-Utilisateur-Dell-Latitude-E6220
Dell-Manuel-de-l-Utilisateur-Dell-Latitude-E6520
Dell-Manuel-de-l-utilisateur-Dell-Latitude-E6320
Dell-Manuel-de-maintenance-Dell-Inspiron-N5110
Dell-Manuel-du-proprietaire-Dell-Vostro-1500
Dell-Manuel-du-proprietaire-Dell-XPS-M1330
Dell-Manuel-du-proprietaire-des-Dell-Latitude-E6420-et-E6420-ATG
Dell-Manuel-du-proprietaire-du-Dell-Inspiron-1721
Dell-Manuel-du-proprietaire-du-Dell-XPS-M1730
Dell-Manuel-du-proprietaire-du-Dell-XPS-One
Dell-Matrices-de-stockage-Dell-PowerVault-MD3260i-Series-Guide-de-deploiement
Dell-Matrices-de-stockage-Dell-PowerVault-MD3660i-Series-Guide-de-deploiement
Dell-Photo-All-In-One-Printer-944-Manuel-du-proprietaire
Dell-Photo-All-In-One-Printer-964-Manuel-du-proprietaire
Dell-Photo-All-In-One-Printer%20942-Manuel-du-proprietaire
Dell-Photo-Printer-720-Manuel-du-proprietaire
Dell-PowerEdge-C8220-Manuel-du-proprietaire
Dell-PowerEdge-R620-Manuel-du-proprietaire
Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Guide-de-l-administrateur
Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Manuel-du-proprietaire
Dell-PowerVault-NX400-Guide-de-mise-en-route
Dell-Precision-Workstation-T7600-Manuel-du-proprietaire
Dell-Streak-7-Manuel-de-l-utilisateur
Dell-Streak-Manuel-d-utilisation
Dell-Systemes-Dell-Inspiron-4150-Manuel-de-l-utilisateur
Dell-Systemes-Dell-Inspiron-8200-Manuel-de-l-utilisateur
Dell-Systemes-Dell-PowerEdge-1950-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-M420-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R210-II-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R410-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R710-Manuel-du-proprietaire%20-Manuel-d-utilisation
Dell-Systemes-Dell-PowerEdge-T310-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T420-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-T620-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerVault-NX400-Manuel-du-proprietaire
Dell-Tout-en-un-Dell-Photo-924-Manuel-du-proprietaire
Dell-Vostro-360-Proprietaire-du-manuel
Dell-Vostro-3750-Manuel-du-proprietaire
Dell-Vostro-V131-Manuel-du-proprietaire
Dell-XP-M1530-Manuel-du-proprietaire
Dell-XPS-630i-Manuel-du-proprietair
Dell-moniteur-D1920-Manuel-du-proprietaire
DellDimension1100Series
Imprimante-Dell-Photo-All-In-One-Printer-922-Manuel-du-proprietaire
Imprimante-laser-de-groupe-de-travail-Dell-S2500-Manuel-du-proprietaire
Imprimante-personnelle-Dell-AIO-A960-Manuel-du-proprietaire
alienwareX51
Dell-Manuel-de-l-Utilisateur-Dell-Latitude-E6220
Dell-Systemes-Dell-PowerEdge-T420-Manuel-du-proprietaire
Dell-Systemes-Dell-Inspiron-4150-Manuel-de-l-utilisateur
Dell-Streak-Manuel-d-utilisation
Dell-Manuel-du-proprietaire-du-Dell-XPS-M1730
Dell-Photo-All-In-One-Printer-944-Manuel-du-proprietaire
Dell-Manuel-du-proprietaire-du-Dell-XPS-One
Dell-Clavier-Axim-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R410-Manuel-du-proprietaire
Dell-Manuel-d-utilisation-Dell-Inspiron-M5040-15-N5040-15-N5050
Dell-Manuel-de-maintenance-Dell-Inspiron-N5110
Dell-Inspiron-1100-Manuel-d-utilisation
Dell-Imprimante-laser-de-groupe-de-travail-Dell-M5200-Manuel-du-proprietaire
Dell-Photo-Printer-720-Manuel-du-proprietaire
Dell-Imprimante-laser-Dell-1100-Manuel-du-proprietaire
Dell-Manuel-du-proprietaire-Dell-Vostro-1500
Dell-XP-M1530-Manuel-du-proprietaire
Dell-Inspiron-530s-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-R710-Manuel-du-proprietaire-Manuel-d-utilisation
Dell-Inspiron-5100-et-5150-Manuel-d-utilisation
Dell-Manuel-de-l-Utilisateur-Dell-Latitude-E6520
Dell-MANUEL-D-ALIENWARE-M17x-MOBILE
Dell-Manuel-de-l-utilisateur-Dell-Latitude-E6320
Dell-Laser-Printer-3100cn-manuel-du-proprietaire
Dell-Inspiron-530s-Manuel-d-utilisation
Dell-Systemes-Dell-PowerEdge-1950-Manuel-du-proprietaire
Dell-Manuel-du-proprietaire-des-Dell-Latitude-E6420-et-E6420-ATG
Dell-Imprimante-laser-monochrome-Dell-5330dn-Mode-d-emploi
Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Guide-de-l-administrateur
Dell-PowerVault-NX400-Guide-de-mise-en-route
Dell-Matrices-de-stockage-Dell-PowerVault-MD3260i-Series-Guide-de-deploiement
Dell-PowerEdge-C8220-Manuel-du-proprietaire
Dell-MANUEL-ALIENWARE-M11x-MOBILE-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerEdge-M420-Manuel-du-proprietaire
Dell-Systemes-Dell-PowerVault-NX400-Manuel-du-proprietaire
Dell-PowerVault-MD3260-3260i-3660i-3660f-3060e-Storage-Arrays-Manuel-du-proprietaire
Dell-Matrices-de-stockage-Dell-PowerVault-MD3660i-Series-Guide-de-deploiement
Dell-Laser-Printer-1700-1700n-Manuel-du-proprietaire
Dell-Inspiron-9400-E1705-Manuel-du-proprietaire
Dell-Tout-en-un-Dell-Photo-924-Manuel-du-proprietaire
Dell-Laser-Printer-1710-1710n-Manuel-du-proprietaire
Dell-Dimension-3100-E310-Manuel-du-proprietaire
Dell-Inspiron-1525-1526-Manuel-du-proprietaire
Dell-PowerEdge-R815-..> 08-May-2013 10:52 4.3M
Dell-Inspiron-1521-M..> 08-May-2013 10:51 2.9M
Dell-PowerEdge-R900-..> 08-May-2013 10:50 3.1M
Dell-Vostro-270-Manu..> 08-May-2013 10:50 3.2M
Dell-XPS-630-Manuels..> 08-May-2013 10:49 3.6M
Dell-XPS-M1730-Manue..> 08-May-2013 10:49 3.9M
Dell-Vostro-200-Manu..> 08-May-2013 10:48 4.5M
Dell-Vostro-410-Manu..> 08-May-2013 10:48 4.1M
Dell-Vostro-1700-Man..> 08-May-2013 10:47 4.8M
Dell-Inspiron-m301z-..> 08-May-2013 10:47 4.8M
Dell-Studio-Slim-Man..> 08-May-2013 10:45 5.1M
Dell-Windows-8-Manue..> 08-May-2013 10:45 5.1M
Dell-PowerEdge-R620-..> 08-May-2013 08:46 4.1M
Dell-PowerEdge-R200-..> 08-May-2013 08:46 2.6M
Dell-Inspiron-640M-M..> 08-May-2013 08:46 3.7M
Dell-Inspiron-600m-M..> 08-May-2013 08:45 2.6M
Dell-Studio-Desktop-..> 08-May-2013 08:44 2.7M
Dell-Vostro-1000-Man..> 08-May-2013 08:44 2.7M
Dell-Inspiron-15-Int..> 08-May-2013 08:44 3.0M
Dell-Alienware-Area-..> 08-May-2013 08:43 3.1M
Dell-DR4000-Manuels.htm 08-May-2013 08:43 3.4M
Dell-Alienware-M15x-..> 08-May-2013 08:42 3.3M
Dell-Latitude-XT2-Ma..> 08-May-2013 08:42 3.5M
Dell-Latitude-E5520-..> 08-May-2013 08:41 3.5M
Dell-OptiPlex-745-Ma..> 08-May-2013 08:40 3.9M
Dell-Inspiron-1525-M..> 08-May-2013 08:40 3.9M
Dell-Inspiron-One-23..> 08-May-2013 08:39 4.2M
Dell-Inspiron-One-23..> 08-May-2013 08:39 2.8M
Dell-Inspiron-510m-M..> 08-May-2013 08:38 3.2M
Dell-Inspiron-Duo-Ma..> 08-May-2013 08:38 3.0M
Dell-Vostro-1550-Man..> 08-May-2013 08:37 3.4M
Dell-Precision-T5600..> 08-May-2013 08:37 3.3M
Dell-Dimension-8300-..> 07-May-2013 22:03 2.5M
Dell-Latitude-Cpi-Ma..> 07-May-2013 22:01 3.2M
Dell-Alienware-Area-..> 07-May-2013 22:01 3.2M
Dell-Latitude-D620-M..> 07-May-2013 22:00 2.3M
Dell-PowerEdge-1950-..> 07-May-2013 22:00 2.2M
Dell-Precision-T5600..> 07-May-2013 21:30 3.1M
Dell-PowerEdge-R720x..> 07-May-2013 21:26 3.1M
Dell-Inspiron-500m-M..> 07-May-2013 21:26 2.8M
Dell-PowerEdge-R815-..> 07-May-2013 21:25 2.8M
Dell-Alienware-M15x-..> 07-May-2013 21:25 2.8M
Dell-Vostro-3450-Man..> 07-May-2013 21:24 2.8M
Dell-PowerEdge-R610-..> 07-May-2013 21:24 2.9M
Dell-Vostro-3750-Man..> 07-May-2013 21:23 3.0M
Dell-Studio-1555-15-..> 07-May-2013 21:23 3.1M
Dell-Manuel-de-maint..> 07-May-2013 21:22 3.0M
Dell-Latitude-E6420-..> 07-May-2013 21:22 3.1M
Dell-Inspiron-1520-M..> 07-May-2013 21:21 2.0M
Dell-Aztech-MDP3900-..> 07-May-2013 21:21 2.0M
Dell-PowerEdge-M905-..> 07-May-2013 21:21 2.0M
Dell-PowerEdge-400SC..> 07-May-2013 21:21 2.1M
Dell-Precision-M4500..> 07-May-2013 21:20 2.2M
Dell-Vizioncore-Manu..> 07-May-2013 21:20 2.1M
Dell-Inspiron-1520-2..> 07-May-2013 21:19 2.5M
Dell-Guide-Utilisate..> 07-May-2013 21:19 2.4M
Dell-PowerEdge-R510-..> 07-May-2013 21:18 2.7M
Dell-Manuel-d-Utilis..> 07-May-2013 21:18 2.4M
Dell-PowerEdge-300-M..> 06-May-2013 19:33 4.7M
Dell-Lifecycle-Contr..> 06-May-2013 19:32 4.3M
Dell-PowerVault-110T..> 06-May-2013 19:31 4.4M
Dell-Inspiron-620-Ma..> 06-May-2013 19:10 3.2M
Dell-Dimension-5100-..> 06-May-2013 19:10 3.4M
Dell-Manuels-et-docu..> 06-May-2013 19:09 3.7M
Dell-Manuels-et-docu..> 06-May-2013 19:09 3.5M
Dell-1130-Dell-1130n..> 06-May-2013 18:42 3.1M
Code-Promo-Dell.htm 04-Feb-2013 09:17 1.0M
Sony-NV-U83N-Manuels..> 02-Feb-2013 09:00 5.0M
Dell-Sansa-Clip-MP3-..> 27-Nov-2012 09:15 3.0M
Dell-TSi-500-TSi-400..> 27-Nov-2012 09:15 1.0M
Dell-Vostro-3360-Man..> 27-Nov-2012 09:10 2.6M
Dell-Inspiron-5100-e..> 27-Nov-2012 09:09 2.8M
Dell-Systemes-Dell-P..> 27-Nov-2012 09:09 3.1M
Dell-1815dn-Manuel ..> 27-Nov-2012 09:09 3.5M
Dell-PowerVault-MD32..> 27-Nov-2012 09:08 1.7M
Dell-Multifunktionsp..> 27-Nov-2012 09:07 2.4M
Dell-PowerVault-MD32..> 27-Nov-2012 09:07 2.0M
Dell-Inspiron-1150-M..> 27-Nov-2012 09:07 2.8M
Dell-PowerEdge-C8220..> 27-Nov-2012 09:07 2.6M
Dell-Systemes-Dell-P..> 27-Nov-2012 09:06 2.5M
Dell-PowerVault-MD32..> 27-Nov-2012 09:06 1.8M
Dell-Systemes-Dell-P..> 27-Nov-2012 07:42 3.0M
Dell-Matrices-de-sto..> 27-Nov-2012 07:40 3.5M
Dell-Systemes-Dell-D..> 27-Nov-2012 07:40 3.8M
Dell-Console-de-gest..> 27-Nov-2012 07:40 3.9M
Dell-Logiciel-de-ges..> 27-Nov-2012 07:26 2.9M
Dell-MANUEL-ALIENWAR..> 27-Nov-2012 07:20 2.6M
Dell-Axim-X51-X51v-M..> 27-Nov-2012 07:18 2.5M
Dell-Dimension-9150-..> 27-Nov-2012 07:07 2.3M
Lien-Manuels-Utilisa..> 19-Nov-2012 07:12 92K
Dell-XPS-600-francai..> 19-Nov-2012 06:29 2.1M
Dell-XPS-430-francai..> 19-Nov-2012 06:24 1.8M
Dell-XPS-420-francai..> 18-Nov-2012 21:25 3.8M
Dell-XPS-410-Anglais..> 18-Nov-2012 21:25 3.4M
Dell-Dimension-9200C..> 18-Nov-2012 21:03 3.1M
Dell-Dimension-1000-..> 18-Nov-2012 20:57 2.9M
Dell-Alienware-Auror..> 18-Nov-2012 20:49 2.3M
Dell-Alienware-Area-..> 18-Nov-2012 20:45 1.8M
Dell-Alienware-Area-..> 18-Nov-2012 20:44 1.9M
Dell-Alienware-Area-..> 18-Nov-2012 20:44 1.9M
Dell-Alienware-Auror..> 18-Nov-2012 20:44 1.9M
Dell-Alienware-Auror..> 18-Nov-2012 20:43 2.3M
Dell-Alienware-Auror..> 18-Nov-2012 20:43 2.2M
Dell-OpenManage-Remo..> 14-Nov-2012 22:12 4.9M
Dell-OpenManage-Serv..> 14-Nov-2012 22:12 5.0M
Dell-Media-Center-Gu..> 14-Nov-2012 22:11 1.6M
Dell-Systemes-Dell-P..> 14-Nov-2012 21:42 3.2M
Dell-E-Legacy-Extend..> 14-Nov-2012 21:40 2.8M
Dell-Dimension-XPS-M..> 14-Nov-2012 21:39 3.0M
Dell-Adaptateurs-Del..> 14-Nov-2012 21:39 3.1M
Dell-Axim-X3-Guide-d..> 14-Nov-2012 21:38 3.4M
Dell-Guide-d-utilisa..> 14-Nov-2012 21:38 4.1M
Dell-OpenManage-Serv..> 14-Nov-2012 21:38 3.7M
Dell-Latitude-D531-G..> 14-Nov-2012 21:36 4.7M
Dell-Latitude-D430-G..> 14-Nov-2012 21:36 4.4M
Dell-Inspiron-1501-M..> 14-Nov-2012 21:06 5.1M
Dell-Systemes-Dell-D..> 14-Nov-2012 21:05 2.6M
Dell-Guide-d-utilisa..> 14-Nov-2012 21:05 3.6M
Dell-PowerEdge-T110-..> 14-Nov-2012 21:04 3.6M
Dell-Guide-d-utilisa..> 14-Nov-2012 21:03 4.1M
Dell-XPS-M1710-Manue..> 14-Nov-2012 21:03 4.4M
Dell-Ordinateurs-por..> 14-Nov-2012 21:02 4.8M
Dell-Studio-GUIDE-DE..> 14-Nov-2012 21:01 5.5M
Dell-Inspiron-1420-M..> 14-Nov-2012 21:01 5.4M
Dell-Systemes-Dell-P..> 14-Nov-2012 21:00 2.4M
Dell-Latitude-D830-G..> 14-Nov-2012 20:59 2.2M
Dell-Systemes-Dell-P..> 14-Nov-2012 20:59 2.4M
Dell-Dimension-1100-..> 14-Nov-2012 12:08 3.6M
Dell-Inspiron-One-23..> 14-Nov-2012 12:08 3.7M
Dell-Manuel-de-maint..> 14-Nov-2012 12:07 3.8M
Dell-Photo-All-in-On..> 14-Nov-2012 12:06 4.0M
Dell-Carte-de-gestio..> 14-Nov-2012 12:05 4.0M
Dell-Systemes-Dell-P..> 14-Nov-2012 12:05 4.3M
Dell-XPS-M1710-Manue..> 13-Nov-2012 09:56 3.4M
Dell-Inspiron-6400-E..> 13-Nov-2012 08:20 2.8M
Dell-Systemes-Dell-P..> 13-Nov-2012 08:19 3.4M
Dell-Inspiron-1300-B..> 13-Nov-2012 08:19 3.1M
Dell-OptiPlex-9010-7..> 13-Nov-2012 08:18 1.7M
Dell-Laser-Printer-5..> 13-Nov-2012 08:18 1.9M
Dell-XPS-710-H2C-Man..> 13-Nov-2012 08:18 2.5M
Dell-Inspiron-1520-M..> 13-Nov-2012 08:17 2.9M
Dell-Inspiron-1721-M..> 13-Nov-2012 08:17 3.2M
Dell-Inspiron-One-23..> 13-Nov-2012 08:16 3.3M
Dell-XPS-M2010-Manue..> 13-Nov-2012 08:16 3.7M
Dell-Inspiron-1000-M..> 13-Nov-2012 08:15 3.9M
Dell-Inspiron-8500-G..> 13-Nov-2012 08:14 4.1M
Dell-Inspiron-640M-E..> 13-Nov-2012 08:13 4.5M
Dell-Axim-X50-Manuel..> 13-Nov-2012 08:12 4.7M
Dell-Inspiron-300m-G..> 13-Nov-2012 08:12 2.0M
Dell-Inspiron-XPS-Ge..> 13-Nov-2012 08:11 2.2M
Dell-Inspiron-5160-M..> 13-Nov-2012 08:11 2.4M
Dell-Inspiron-8600-G..> 13-Nov-2012 08:11 2.7M
Dell-PowerVault-DL20..> 13-Nov-2012 08:11 2.9M
Dell-Imprimante-pers..> 13-Nov-2012 08:10 3.0M
Dell-Vostro-410-Guid..> 12-Nov-2012 17:26 2.4M
Dell-Manuel-de-l-Uti..> 12-Nov-2012 17:07 2.6M
Dell-Dimension-serie..> 12-Nov-2012 17:07 1.9M
Dell-xps-13-l321x_se..> 12-Nov-2012 17:00 1.9M
Dell-XPS-13-Manuel-d..> 12-Nov-2012 16:59 1.9M
Dell-Manuel-de-maint..> 12-Nov-2012 16:59 2.1M
Dell-Inspiron-2600-e..> 12-Nov-2012 16:59 2.3M
Dell-PowerVault-NX33..> 12-Nov-2012 16:58 2.6M
Dell-Pave-Tactile-Sa..> 12-Nov-2012 16:58 2.6M
Dell-poweredge-r520-..> 12-Nov-2012 16:58 2.7M
Dell-Inspiron-5423-O..> 12-Nov-2012 16:57 2.7M
Dell-Inspiron-3500-P..> 12-Nov-2012 16:57 2.7M
Dell-Inspiron-3000-S..> 12-Nov-2012 16:56 2.7M
Dell-Vostro-270-Owne..> 12-Nov-2012 16:56 2.8M
Dell-server-poweredg..> 12-Nov-2012 16:56 2.9M
Dell-PowerEdge-C6220..> 12-Nov-2012 16:55 3.2M
Dell-2145cn-Impriman..> 12-Nov-2012 16:55 3.6M
Dell-Dimension-Serie..> 12-Nov-2012 16:54 3.8M
Dell-PERC-6-i-PERC-6..> 12-Nov-2012 16:53 4.1M
Dell-Configuration-d..> 12-Nov-2012 16:53 4.1M
Dell-MANUEL-ALIENWAR..> 12-Nov-2012 16:51 2.1M
Dell-ALIENWARE-M18x-..> 12-Nov-2012 16:51 2.2M
Dell-MANUEL-DE-L-ORD..> 12-Nov-2012 16:51 2.3M
Dell-Carte-de-Gestio..> 06-Nov-2012 18:45 2.0M
Dell-Studio-XPS-1640..> 06-Nov-2012 18:40 2.7M
Dell-Studio-XPS-GUID..> 06-Nov-2012 18:40 2.3M
Dell-Storage-Center-..> 06-Nov-2012 11:43 3.7M
Dell-PowerEdge-T300-..> 06-Nov-2012 07:33 2.3M
Dell-Manual-del-prop..> 06-Nov-2012 07:33 2.4M
Dell-Manual-del-prop..> 06-Nov-2012 07:32 2.5M
Dell-PowerEdge-Syste..> 06-Nov-2012 07:32 2.7M
Dell-PowerEdge-R710-..> 06-Nov-2012 07:31 3.0M
Dell-S2440L-Monitor-..> 06-Nov-2012 07:31 3.0M
Dell-P1913-P1913S-P2..> 06-Nov-2012 07:31 2.0M
Dell-U2713HM-Flat-Pa..> 06-Nov-2012 07:30 2.0M
Dell-U2713HM-Flat-Pa..> 06-Nov-2012 07:30 2.0M
Dell-E1913S-E1913-E2..> 06-Nov-2012 07:29 2.1M
Dell-Latitude-ST-Kul..> 06-Nov-2012 07:29 2.1M
Dell-PowerEdge-R310-..> 06-Nov-2012 07:29 2.4M
Dell-Storage-Center-..> 06-Nov-2012 07:29 2.7M
Dell-Latitude-XT3-Ow..> 06-Nov-2012 07:28 1.7M
Dell-Manuel-de-maint..> 06-Nov-2012 07:28 1.8M
Dell-Vostro-3450-Man..> 06-Nov-2012 07:27 1.9M
Dell-Inspiron-14z-N4..> 06-Nov-2012 07:27 2.0M
Dell-Module-de-venti..> 06-Nov-2012 07:27 2.0M
Dell-Matrices-de-sto..> 06-Nov-2012 07:26 2.6M
Dell-Points-d-acces-..> 06-Nov-2012 07:26 2.0M
Dell-Guide-de-l-util..> 05-Nov-2012 18:31 4.2M
Dell-Boitiers-de-sto..> 05-Nov-2012 18:14 1.4M
Dell-Studio-One-GUID..> 05-Nov-2012 18:14 1.5M
Dell-Vostro-1310-151..> 05-Nov-2012 18:14 1.6M
Dell-Systemes-Dell-P..> 05-Nov-2012 18:13 1.9M
Dell-Modules-optique..> 05-Nov-2012 18:13 1.9M
Dell-PowerEdge-R900-..> 05-Nov-2012 18:13 2.2M
Dell-Latitude-E6520-..> 05-Nov-2012 18:13 2.0M
Dell-PowerEdge-2900-..> 05-Nov-2012 18:12 2.4M
Dell-Point-d-acces-D..> 05-Nov-2012 18:12 2.5M
Dell-B1260dn-Mode-d-..> 05-Nov-2012 18:11 2.7M
Dell-B1160-Dell-B116..> 05-Nov-2012 18:11 2.9M
Dell-OpenManage-Serv..> 05-Nov-2012 18:10 3.3M
Dell-PowerEdge-T310-..> 05-Nov-2012 18:10 3.6M
Dell-PowerEdge-R410-..> 05-Nov-2012 18:09 3.8M
Dell-Inspiron-Guide-..> 05-Nov-2012 18:08 1.3M
Dell-Guide-de-soluti..> 05-Nov-2012 17:29 3.8M
Adaptateurs-Brocade-..> 05-Nov-2012 15:05 3.6M
Dell-PowerEdge-R415-..> 05-Nov-2012 15:01 1.7M
Dell-PowerVault-MD-S..> 05-Nov-2012 15:01 1.7M
Dell-PowerEdge-2950-..> 05-Nov-2012 15:01 1.9M
Dell-PowerEdge-R710-..> 05-Nov-2012 15:00 1.9M
Dell-Server-PRO-Mana..> 05-Nov-2012 15:00 2.0M
Dell-PowerVault-NX20..> 05-Nov-2012 15:00 2.0M
Dell-PowerVault-MD11..> 05-Nov-2012 15:00 2.0M
Dell-SAS-RAID-Storag..> 05-Nov-2012 14:59 2.2M
Dell-Imprimante-lase..> 05-Nov-2012 14:59 2.2M
IOGEAR-Guide-d-insta..> 05-Nov-2012 14:58 2.3M
Dell-MANUEL-ALIENWAR..> 05-Nov-2012 14:58 2.4M
Dell-Guide-d-install..> 05-Nov-2012 14:58 2.8M
Dell-Inspiron-600m-M..> 05-Nov-2012 14:57 2.6M
Planification-du-dep..> 05-Nov-2012 14:57 3.1M
Dell-Vizioncore-vRep..> 05-Nov-2012 14:57 3.0M
Dell-Server-Deployme..> 05-Nov-2012 14:56 3.7M
Dell-Latitude-XT2-XF..> 05-Nov-2012 14:54 3.7M
Dell-Deploiement-de-..> 05-Nov-2012 12:15 2.6M
Dell-Setting-up-Your..> 05-Nov-2012 12:15 2.6M
Dell-PowerQuest-Data..> 05-Nov-2012 12:15 2.6M
Dell-Controleurs-Del..> 05-Nov-2012 12:14 2.8M
Dell-Systemes-Dell-P..> 05-Nov-2012 12:14 2.9M
Dell-Guide-de-demarr..> 05-Nov-2012 12:13 2.9M
Dell-Guide-de-config..> 05-Nov-2012 12:13 3.0M
Dell-Guide-d-utilisa..> 05-Nov-2012 12:12 3.0M
Dell-1250c-Color-Pri..> 05-Nov-2012 12:12 3.0M
Dell-XPS-600-Manuel-..> 05-Nov-2012 12:11 3.3M
Dell-Imprimante-lase..> 05-Nov-2012 12:11 3.4M
Dell-Systemes-Dell-P..> 05-Nov-2012 12:10 3.8M
Dell-Photo-All-In-On..> 05-Nov-2012 12:10 3.6M
Dell-Studio-XPS-Setu..> 05-Nov-2012 12:09 1.3M
Dell-XPS-13-Kullanı..> 05-Nov-2012 12:09 1.4M
Dell-XPS-13-Chinois-..> 05-Nov-2012 12:08 1.6M
Dell-XPS-13-Arabe-Ma..> 05-Nov-2012 12:08 1.5M
Dell-Setting-up-Your..> 05-Nov-2012 10:08 1.9M
Dell-Setting-up-Your..> 05-Nov-2012 10:08 1.9M
Dell-Vizioncore-vCon..> 05-Nov-2012 10:08 2.4M
Dell-Cartes-controle..> 05-Nov-2012 10:08 2.0M
Dell-Guide-de-l-util..> 05-Nov-2012 09:06 1.9M
Dell-Bandotheques-De..> 05-Nov-2012 09:03 2.1M
Dell-S320-S320wi-Pro..> 05-Nov-2012 09:02 1.7M
Dell-PowerEdge-RAID-..> 05-Nov-2012 09:02 2.4M
Dell-Matrices-de-sto..> 05-Nov-2012 09:02 2.2M
Dell-Vizioncore-vRan..> 05-Nov-2012 09:01 2.6M
Dell-Cartes-d-extens..> 05-Nov-2012 09:01 2.6M
Dell-Guide-technique..> 05-Nov-2012 09:00 3.2M
Dell-Onduleur-en-Bai..> 05-Nov-2012 09:00 2.7M
Dell-Matrices-de-sto..> 05-Nov-2012 08:59 3.7M
Dell-Setting-up-Your..> 05-Nov-2012 08:59 3.2M
Dell-Systemes-Dell-P..> 05-Nov-2012 08:58 4.2M
Dell-Guide-d-utilisa..> 05-Nov-2012 08:58 4.1M
Dell-M5200-Carte-de-..> 05-Nov-2012 07:58 1.6M
Dell-XPS-L412z-Manue..> 05-Nov-2012 07:38 2.0M
Dell-XPS-GUIDE-DE-CO..> 05-Nov-2012 07:38 2.1M
Dell-Studio-XPS-8100..> 05-Nov-2012 07:38 2.1M
Dell-XPS-One-GUIDE-D..> 05-Nov-2012 07:37 2.2M
Dell-INSPIRON-Setup-..> 05-Nov-2012 07:32 2.3M
Dell-Inspiron-14R-M4..> 05-Nov-2012 07:32 2.4M
Dell-XPS-M1210-Owner..> 05-Nov-2012 07:32 2.7M
Dell-Inspiron-6000-M..> 05-Nov-2012 07:31 2.9M
Dell-Guide-de-l-util..> 05-Nov-2012 07:31 3.5M
Dell-PERC-6-i-PERC-6..> 05-Nov-2012 07:31 3.8M
Dell-Adaptateurs-Del..> 05-Nov-2012 07:30 3.9M
Dell-Guide-d-utilisa..> 05-Nov-2012 07:29 4.2M
Dell-DX-Object-Stora..> 04-Nov-2012 11:04 2.8M
Dell-PowerEdge-T620-..> 04-Nov-2012 11:04 2.8M
Dell-Guide-d-install..> 04-Nov-2012 11:03 2.9M
Dell-Dimension-XPS-G..> 04-Nov-2012 11:03 3.1M
Dell-Latitude-E6500-..> 04-Nov-2012 11:02 3.3M
Dell-PowerEdge-Expan..> 04-Nov-2012 11:02 3.5M
Dell-Matrices-de-sto..> 04-Nov-2012 11:01 3.6M
Dell-Matrices-de-sto..> 04-Nov-2012 11:01 3.7M
Dell-PowerVault-Data..> 04-Nov-2012 11:00 2.7M
Dell-PowerVault-Encr..> 04-Nov-2012 10:41 2.5M
Dell-APC-Smart-UPS-A..> 04-Nov-2012 10:41 2.6M
Dell-PowerVault-Data..> 04-Nov-2012 10:41 2.6M
Dell-PowerVault-Data..> 03-Nov-2012 21:47 2.0M
Dell-EqualLogic-Stor..> 03-Nov-2012 21:47 2.1M
Dell-Latitude-E4300-..> 03-Nov-2012 21:46 2.3M
Dell-Matrices-de-sto..> 03-Nov-2012 21:46 2.2M
Dell-OptiPlex-755-Gu..> 03-Nov-2012 21:12 5.7M
Dell-PowerEdge-C8000..> 03-Nov-2012 18:23 2.1M
Dell-PowerEdge-T420-..> 03-Nov-2012 18:19 2.1M
Dell-Commutateur-de-..> 03-Nov-2012 18:19 2.3M
Dell-INSPIRON-GUIDE-..> 03-Nov-2012 18:16 2.4M
Dell-Systemes-Dell-P..> 03-Nov-2012 18:15 2.4M
Dell-XPS 15-Manuel-d..> 03-Nov-2012 18:15 2.4M
Dell-PowerVault-DL-B..> 03-Nov-2012 18:12 2.6M
Dell-Laser-MFP-Dell-..> 03-Nov-2012 18:12 3.2M
Dell-Controleurs-RAI..> 03-Nov-2012 18:11 3.4M
Dell-PowerEdge-Expre..> 03-Nov-2012 18:11 1.7M
Dell-FluidFS-NAS-Sol..> 03-Nov-2012 18:10 2.1M
Dell-Projecteur-Dell..> 03-Nov-2012 18:10 1.8M
Dell-Projecteur-7700..> 03-Nov-2012 18:09 2.2M
Dell-Management-Plug..> 03-Nov-2012 18:09 2.5M
Dell-Integrated-Dell..> 03-Nov-2012 18:09 3.1M
Dell-Systemes-Dell-P..> 03-Nov-2012 18:08 2.6M
Dell-Systeme-Dell-DR..> 03-Nov-2012 18:08 3.6M
Dell-OpenManage-Serv..> 03-Nov-2012 18:07 3.3M
Dell-Utilitaires-de-..> 03-Nov-2012 18:06 3.8M
Dell-Systemes-Dell-P..> 03-Nov-2012 18:06 3.9M
Dell-PowerEdge-C410x..> 03-Nov-2012 18:05 4.0M
Dell-Systemes-Dell-P..> 03-Nov-2012 18:05 4.3M
Dell-Manuel-du-propr..> 03-Nov-2012 18:04 4.6M
Dell-Set-Up-Your-Com..> 03-Nov-2012 18:04 4.6M
Dell-Latitude-E5400-..> 03-Nov-2012 18:02 4.7M
Dell-Matrices-de-sto..> 03-Nov-2012 18:02 4.9M
Dell-Dimension-Serie..> 03-Nov-2012 18:01 5.1M
Dell-INSPIRON-GUIDE-..> 03-Nov-2012 11:09 3.0M
Dell-Moniteur-a-Dell..> 03-Nov-2012 11:09 3.1M
Dell-Systems-Service..> 03-Nov-2012 11:08 3.1M
Dell-Guide-de-l-util..> 03-Nov-2012 11:07 3.1M
Dell-Moniteur-a-Dell..> 03-Nov-2012 11:07 3.2M
Dell-Moniteur-a-ecra..> 03-Nov-2012 11:06 3.2M
Dell-PowerEdge-C410x..> 03-Nov-2012 11:06 3.3M
Dell-Matrices-de-sto..> 03-Nov-2012 11:05 3.4M
Dell-Precision-M4400..> 03-Nov-2012 11:05 1.5M
Dell-Systemes-Dell-P..> 03-Nov-2012 11:04 1.9M
Dell-PowerEdge-R320-..> 03-Nov-2012 11:04 1.5M
Dell-PowerEdge-R720-..> 03-Nov-2012 11:04 2.0M
Dell-Update-Packages..> 03-Nov-2012 11:04 1.9M
Dell-Micrologiciel-D..> 03-Nov-2012 08:46 2.9M
Dell-FluidFS-NAS-Sol..> 03-Nov-2012 08:45 3.0M
Dell-PowerEdge-RAID-..> 03-Nov-2012 08:44 3.2M
Dell-Systemes-Dell-P..> 03-Nov-2012 08:44 3.0M
Dell-Inspiron-15R-Ma..> 03-Nov-2012 08:43 3.5M
Dell-OpenManage-Serv..> 03-Nov-2012 08:43 3.4M
Dell-PowerEdge-M1000..> 03-Nov-2012 08:42 3.7M
Dell-OpenManage-Serv..> 03-Nov-2012 08:42 3.7M
Dell-PowerEdge-C8000..> 03-Nov-2012 08:30 2.3M
Dell-PowerEdge-R820-..> 03-Nov-2012 08:30 2.0M
Dell-PowerEdge-C8220..> 03-Nov-2012 08:29 2.5M
Dell-PowerEdge-R420-..> 03-Nov-2012 08:29 2.5M
Dell-Systemes-Dell-D..> 03-Nov-2012 08:28 2.8M
Dell-Precision-Works..> 03-Nov-2012 08:28 2.6M
Dell-PowerEdge-T320-..> 03-Nov-2012 08:27 2.8M
Dell-Systemes-Dell-D..> 03-Nov-2012 08:27 2.8M
Dell-Guide-de-l-util..> 03-Nov-2012 08:27 3.0M
Dell-Latitude-E6420-..> 03-Nov-2012 08:27 3.0M
Dell-Systeme-Dell-Po..> 02-Nov-2012 18:07 3.4M
Dell-Vostro-470-Manu..> 02-Nov-2012 18:07 3.5M
Dell-PowerVault-MD32..> 02-Nov-2012 18:07 3.4M
Dell-XPS-14-Manuel-d..> 02-Nov-2012 17:36 3.1M
Dell-Inspiron-One-20..> 02-Nov-2012 17:23 3.0M
Dell-Matrices-de-sto..> 02-Nov-2012 17:22 3.0M
Dell-PowerConnect-55..> 02-Nov-2012 17:22 3.8M
Dell-PowerVault-NX33..> 02-Nov-2012 17:21 1.7M
Dell-Upgrading-to-Ba..> 02-Nov-2012 17:21 1.4M
Dell-Projecteur-Dell..> 02-Nov-2012 17:20 1.8M
Dell-Vostro-470-Owne..> 02-Nov-2012 17:20 1.7M
Dell-Inspiron-14R-Ma..> 02-Nov-2012 17:20 2.2M
Dell-Systeme-Dell-Po..> 02-Nov-2012 17:20 2.1M
Dell-Vostro-270-Manu..> 02-Nov-2012 17:19 2.6M
Dell-PowerEdge-R820-..> 02-Nov-2012 17:19 2.5M
Dell-Inspiron-660s-M..> 02-Nov-2012 17:18 2.7M
Dell-Systemes-Dell-P..> 02-Nov-2012 17:18 2.8M
Dell-Inspiron-17R-Ma..> 02-Nov-2012 17:17 2.9M
Dell-Micrologiciel-D..> 02-Nov-2012 16:35 2.9M
Dell-PowerEdge-R720-..> 02-Nov-2012 16:34 2.8M
Dell-PowerEdge-R815-..> 02-Nov-2012 16:34 3.1M
Dell-Systemes-Dell-P..> 02-Nov-2012 16:33 3.5M
Dell-Systemes-Dell-P..> 02-Nov-2012 16:33 1.9M
Dell-PowerEdge-R905-..> 02-Nov-2012 16:32 2.2M
Dell-Systemes-Dell-P..> 02-Nov-2012 16:32 2.8M
Dell-Systemes-Dell-P..> 02-Nov-2012 16:32 2.5M
Dell-Systemes-Dell-P..> 02-Nov-2012 16:31 2.9M
Dell-HBA-SAS-Dell-Po..> 02-Nov-2012 16:31 2.9M
Dell-XPS-13-Owner-s-..> 02-Nov-2012 16:30 3.0M
Dell-Alienware-M17x-..> 02-Nov-2012 16:30 3.1M
Dell-Systemes-Dell-P..> 02-Nov-2012 16:29 3.4M
Dell-Emplacement-des..> 02-Nov-2012 16:29 3.1M
Dell-ALIENWARE-M17x-..> 02-Nov-2012 16:28 3.5M
Dell-Alienware-X51-O..> 02-Nov-2012 16:28 3.4M
Dell-Moniteur-a-Dell..> 02-Nov-2012 16:27 3.6M
Dell-Guide-de-l-Util..> 02-Nov-2012 16:27 3.5M
Dell-Systemes-Dell-P..> 02-Nov-2012 11:45 2.0M
Dell-FluidFS-NAS-Sol..> 02-Nov-2012 11:24 1.7M
Dell-Latitude-ST-Man..> 02-Nov-2012 11:23 3.8M
Dell-OptiPlex-360-Gu..> 02-Nov-2012 11:23 3.4M
Dell-Adaptateurs-Bro..> 02-Nov-2012 11:22 2.8M
Dell-XPS-13-Manuel-d..> 02-Nov-2012 11:22 2.9M
Dell-Guide-de-l-util..> 02-Nov-2012 11:21 3.2M
Dell-Solutions-NAS-D..> 02-Nov-2012 11:21 3.2M
Dell-OpenManage-Serv..> 02-Nov-2012 11:20 3.7M
Dell-Lifecycle-Contr..> 02-Nov-2012 11:20 3.5M
Dell-PowerEdge-RAID-..> 02-Nov-2012 10:08 2.4M
Dell-XPS-430-Guide-d..> 02-Nov-2012 10:08 2.4M
Dell-Imprimantes-las..> 02-Nov-2012 10:07 2.4M
Dell-Imprimantes-las..> 02-Nov-2012 10:07 2.4M
Dell-Guide-d-utilisa..> 02-Nov-2012 10:06 2.5M
Dell-Guide-d-utilisa..> 02-Nov-2012 10:06 2.4M
Dell-Vostro-1310-151..> 02-Nov-2012 10:06 2.6M
Dell-1235cn-Impriman..> 02-Nov-2012 10:06 3.0M
Dell-Guide-d-utilisa..> 02-Nov-2012 10:05 3.4M
Dell-2130cn-IMPRIMAN..> 02-Nov-2012 10:05 3.0M
Dell-Imprimante-pers..> 02-Nov-2012 09:44 2.7M
Dell-Systemes-Dell-P..> 02-Nov-2012 09:44 3.1M
Dell-Imprimante-lase..> 02-Nov-2012 09:44 2.9M
Dell-Guide d-install..> 02-Nov-2012 09:43 2.1M
Dell-PowerEdge-R810-..> 02-Nov-2012 09:43 2.0M
Dell-Inspiron-660s-M..> 02-Nov-2012 09:42 2.5M
Dell-Systemes-Dell-P..> 02-Nov-2012 09:42 2.4M
Dell-Systemes-Dell-P..> 02-Nov-2012 09:41 2.8M
Dell-Systemes-Dell-P..> 02-Nov-2012 09:41 3.1M
Dell-Systemes-Dell-P..> 02-Nov-2012 09:40 3.6M
Dell-Inspiron-600m-M..> 02-Nov-2012 09:40 3.3M
Dell-3D-VISION-MANUE..> 02-Nov-2012 09:39 1.8M
Dell-Manuel-de-maint..> 02-Nov-2012 09:39 1.7M
Dell-Manuel-d-utilis..> 02-Nov-2012 09:38 1.9M
Dell-Imprimante-coul..> 02-Nov-2012 09:38 1.9M
Dell-Projecteur-Dell..> 02-Nov-2012 09:38 2.0M
Dell-M770mm-Color-Mo..> 02-Nov-2012 09:37 2.1M
Dell-Precision-M6400..> 02-Nov-2012 09:37 2.1M
Dell-Manuel-du-propr..> 01-Nov-2012 19:14 2.6M
Dell-Systemes-Dell-P..> 01-Nov-2012 19:02 2.7M
Dell-Vostro-270-Manu..> 01-Nov-2012 19:02 2.7M
Dell-ALIENWARE-M17x-..> 01-Nov-2012 19:00 2.3M
Dell-Precision-Works..> 01-Nov-2012 18:46 3.3M
Dell-P513w-User-s-Gu..> 01-Nov-2012 18:46 2.8M
Dell-Serveur-de-sauv..> 01-Nov-2012 18:42 1.9M
Dell-Inspiron-660-ma..> 01-Nov-2012 18:42 2.0M
Dell-P513w-User-s-Gu..> 01-Nov-2012 18:42 2.3M
Dell-Studio-XPS-Guid..> 01-Nov-2012 18:41 2.9M
Dell-Latitude-D430-G..> 01-Nov-2012 18:41 3.2M
Dell-Systemes-Dell-P..> 01-Nov-2012 18:41 2.7M
Dell-Matrices-de-sto..> 01-Nov-2012 18:40 1.9M
Dell-Vostro-420-220-..> 01-Nov-2012 18:40 2.0M
Dell-Guide-de-l-admi..> 01-Nov-2012 18:39 2.2M
Dell-Guide-de-l-util..> 01-Nov-2012 18:39 2.1M
Dell-INSPIRON-DUO-GU..> 01-Nov-2012 18:38 2.2M
Dell-INSPIRON-DUO-SE..> 01-Nov-2012 18:38 2.3M
Dell-Adaptateur-hote..> 01-Nov-2012 18:38 2.3M
Dell-Studio-XPS-Setu..> 01-Nov-2012 18:38 2.4M
Dell-Client-Manageme..> 01-Nov-2012 18:37 2.5M
Dell-1230c-Imprimant..> 01-Nov-2012 18:37 2.6M
Dell-XPS-8500-Manuel..> 01-Nov-2012 18:36 2.7M
Dell-Station-de-trav..> 01-Nov-2012 18:36 2.3M
Dell-Inspiron-530-Se..> 29-Oct-2012 07:41 1.9M
Dell-Mobile-Jamz.htm 29-Oct-2012 07:41 1.6M
Dell-Systemes-Dell-P..> 29-Oct-2012 07:41 2.2M
Dell-Dimension-C521-..> 29-Oct-2012 07:41 1.9M
Dell-PowerEdge-R910-..> 29-Oct-2012 07:40 2.6M
Projecteur-Dell-1201..> 29-Oct-2012 07:40 2.3M
Dell-PowerEdge-R520-..> 29-Oct-2012 07:39 3.0M
Dell-ALIENWARE-MANUE..> 29-Oct-2012 07:39 2.7M
Dell-Inspiron-531-Ma..> 29-Oct-2012 07:38 2.7M
Dell-Vostro-200-Manu..> 29-Oct-2012 07:38 2.4M
Dell-Systemes -Dell ..> 29-Oct-2012 07:37 3.2M
Dell-Systemes-Dell-P..> 29-Oct-2012 07:37 3.0M
Dell-PowerEdge-C410x..> 29-Oct-2012 07:36 3.2M
Dell-Latitude-E5430-..> 26-Oct-2012 17:29 1.6M
Console-de-gestion-m..> 26-Oct-2012 14:51 3.3M
DELL-POWERVAULT-MD12..> 26-Oct-2012 14:50 3.3M
Dell-PowerEdge-R520-..> 26-Oct-2012 14:50 3.3M
Dell-PowerEdge-R620-..> 26-Oct-2012 14:49 3.3M
Dell-Ekran-Yönetici..> 26-Oct-2012 14:49 3.4M
Dell-PowerVault-MD36..> 26-Oct-2012 14:48 2.4M
Dell-PowerVault-MD36..> 26-Oct-2012 14:48 2.8M
Dell-OPENMANAGE-POWE..> 26-Oct-2012 14:47 2.7M
Dell-Vostro-3460-Man..> 26-Oct-2012 14:47 2.7M
Dell-Vostro-3460-Man..> 26-Oct-2012 14:46 2.7M
Dell- Vostro-270-Man..> 26-Oct-2012 14:46 2.8M
Dell-S320-S320wi-Pro..> 26-Oct-2012 14:45 2.9M
Dell-Guide-de-l-util..> 26-Oct-2012 14:45 2.0M
Dell-PowerEdge-Siste..> 26-Oct-2012 14:44 1.4M
Dell-S2240L-S2340L-M..> 26-Oct-2012 14:44 1.5M
Dell-Vostro-1540-155..> 26-Oct-2012 14:44 2.2M
Dell-PowerEdge-R720-..> 25-Oct-2012 18:33 2.5M
Dell-Inspiron-1720-m..> 25-Oct-2012 18:32 2.9M
DELL-OPTIPLEX580-TEC..> 25-Oct-2012 18:32 2.9M
Dell-Manuel-du-propr..> 25-Oct-2012 18:31 3.3M
Dell-Inspiron-Manuel..> 25-Oct-2012 18:31 3.3M
Dell-PowerEdge-R210-..> 25-Oct-2012 18:30 3.6M
Dell-Dimension-3000-..> 25-Oct-2012 18:30 3.5M
Systemes-Dell-PowerE..> 25-Oct-2012 18:29 2.8M
Dell-Solutions-NAS-D..> 25-Oct-2012 18:29 2.7M
Dell-Precision-Works..> 25-Oct-2012 12:10 2.0M
Dell-Systemes-Dell-P..> 25-Oct-2012 12:10 2.3M
Dell-Inspiron-1721-M..> 25-Oct-2012 12:09 2.7M
Dell-Vostro-2520-Man..> 25-Oct-2012 12:09 2.8M
Dell-Axim-X30-Manuel..> 25-Oct-2012 12:08 3.0M
Dell-Inspiron-2600-e..> 25-Oct-2012 12:08 3.2M
Dell-Inspiron-9200-M..> 25-Oct-2012 12:07 3.4M
Dell-Imprimante-lase..> 25-Oct-2012 12:07 2.1M
Dell-Venue-Pro-Manue..> 25-Oct-2012 12:06 2.4M
Dell-Streak-7-Franca..> 25-Oct-2012 12:06 2.3M
Dell-Photo-Printer-5..> 25-Oct-2012 12:06 2.6M
Dell-Vostro-1440-145..> 25-Oct-2012 12:05 2.5M
Dell-Manuel-de-l-uti..> 25-Oct-2012 12:05 2.9M
Dell-Systemes-Dell-P..> 25-Oct-2012 12:05 3.1M
Dell-Manuel-de-l-uti..> 25-Oct-2012 12:04 2.8M
Dell-Demarrage-rapid..> 25-Oct-2012 12:04 2.4M
Dellâ„¢ Logiciel-de..> 25-Oct-2012 12:03 2.8M
Dell-Systeme-de-navi..> 25-Oct-2012 12:02 3.2M
Dell-Clavier-sans-fi..> 25-Oct-2012 12:02 3.0M
Dell-Inspiron-1200-e..> 25-Oct-2012 09:48 2.4M
Dell-PowerVault NX32..> 25-Oct-2012 09:48 2.7M
Dell-OptiPlex-9010-7..> 25-Oct-2012 09:48 2.4M
Dell-Systemes-Dell-P..> 25-Oct-2012 09:47 2.0M
Dell-Vostro-400-Manu..> 25-Oct-2012 09:47 2.3M
Dell-Latitude-D630-M..> 25-Oct-2012 09:46 2.9M
Dell-PowerEdge-C5125..> 25-Oct-2012 09:46 2.5M
Dell-Inspiron-660-Ma..> 24-Oct-2012 09:15 2.3M
Dell-Latitude-E5530-..> 24-Oct-2012 09:15 2.4M
Dell-Inspiron-1150-M..> 24-Oct-2012 09:15 2.6M
Dell-XPS-One-2710-ma..> 24-Oct-2012 09:14 2.8M
Dell-Systemes-Dell-P..> 24-Oct-2012 09:14 3.1M
Dell-Inspiron-9100-M..> 24-Oct-2012 09:13 2.6M
Dell-Dimension-E521-..> 24-Oct-2012 09:12 2.9M
Dell-PowerVault-Baie..> 24-Oct-2012 09:12 3.0M
Dell-Inspiron-8600-M..> 24-Oct-2012 09:11 3.2M
Dell-OptiPlex-9010-T..> 24-Oct-2012 07:54 2.3M
Dell-Dimension-3100C..> 24-Oct-2012 07:42 2.7M
Dell-Beats-By-dr.dre..> 24-Oct-2012 07:42 2.7M
Dell-Axim-X51-X51v-M..> 24-Oct-2012 07:42 2.9M
Dell-MANUEL-ALIENWAR..> 24-Oct-2012 07:41 2.4M
Dell-poweredge-r210-..> 24-Oct-2012 07:41 2.5M
Dell-server-poweredg..> 24-Oct-2012 07:40 2.5M
Dell-server-poweredg..> 24-Oct-2012 07:40 2.6M
Dell-server-poweredg..> 24-Oct-2012 07:39 2.3M
Dell-server-poweredg..> 24-Oct-2012 07:39 2.4M
Dell-Systemes-Dell-I..> 24-Oct-2012 07:39 2.1M
Dell-Latitude-E6320-..> 24-Oct-2012 07:38 2.1M
Dell-Latitude-5420-E..> 24-Oct-2012 07:38 2.1M
Dell-server-poweredg..> 24-Oct-2012 07:37 1.9M
Dell-Systemes-Dell-P..> 24-Oct-2012 07:37 2.2M
Dell-Vostro-3560-Man..> 24-Oct-2012 07:37 1.9M
Dell-Manuel-du-propr..> 24-Oct-2012 07:36 2.2M
Acceder-au-site-Dell..> 24-Oct-2012 06:36 1.0M
Dell-Vostro-360-Prop..> 19-Oct-2012 07:42 1.7M
Dell-OPENMANAGE-POWE..> 19-Oct-2012 07:41 1.9M
Dell-ALIENWARE-MANUE..> 19-Oct-2012 07:41 2.0M
Dell-Vostro-200-Manu..> 19-Oct-2012 07:41 2.4M
Dell-Precision-Works..> 19-Oct-2012 07:41 2.1M
Dell-Streak-7-Manuel..> 18-Oct-2012 17:13 2.9M
Dell-Systemes-Dell-P..> 18-Oct-2012 17:13 3.6M
Dell-Manuel-du-propr..> 18-Oct-2012 17:13 2.9M
Dell-MANUEL-D-ALIENW..> 18-Oct-2012 17:12 3.1M
Dell-Inspiron-9300-M..> 18-Oct-2012 17:12 3.3M
Dell-Systemes-Dell-I..> 18-Oct-2012 17:11 3.6M
Dell-PowerEdge-R620-..> 18-Oct-2012 17:11 3.9M
Dell-Manuel-d-utilis..> 18-Oct-2012 17:10 3.1M
Dell-Precision-Works..> 18-Oct-2012 17:09 3.2M
Dell-Inspiron-13z-Ma..> 18-Oct-2012 17:09 3.3M
Dell-Systemes-Dell-P..> 18-Oct-2012 17:08 3.6M
Dell-Systemes-Dell-P..> 18-Oct-2012 17:08 2.6M
Dell-Boîtier-Dell-P..> 18-Oct-2012 17:07 2.7M
Dell-Manuel-du-propr..> 18-Oct-2012 17:07 3.1M
DELLmanuelsutilisate..> 18-Oct-2012 17:06 12M
Dell-Inspiron-5100-e..> 18-Oct-2012 17:05 4.4M
Dell-Manuel-de-l-Uti..> 18-Oct-2012 17:04 4.1M
Dell-MANUEL-D-ALIENW..> 18-Oct-2012 17:03 4.1M
Dell-Manuel-de-l-uti..> 18-Oct-2012 17:02 3.9M
Dell-Laser-Printer-3..> 18-Oct-2012 17:02 3.8M
Dell-Inspiron-530s-M..> 18-Oct-2012 17:01 3.7M
Dell-Liste-des-manue..> 18-Oct-2012 17:01 3.5M
Dell-Inspiron-530s-M..> 18-Oct-2012 17:00 3.5M
Dell-Vostro-V131-Man..> 18-Oct-2012 16:59 3.4M
DellDimension1100Ser..> 18-Oct-2012 16:59 3.4M
Dell-Vostro-3750-Man..> 18-Oct-2012 16:58 3.4M
Dell-Systemes-Dell-P..> 18-Oct-2012 16:58 3.4M
Imprimante-personnel..> 18-Oct-2012 16:57 3.4M
Dell-Inspiron-17R-Ma..> 18-Oct-2012 16:56 3.3M
Dell-PowerVault-NX40..> 18-Oct-2012 16:56 3.2M
Dell-Manuel-du-propr..> 18-Oct-2012 16:55 3.3M
Dell-Matrices-de-sto..> 18-Oct-2012 16:55 3.2M
Dell-Dimension-9200-..> 18-Oct-2012 16:54 3.2M
AlienwareAurora-R3.htm 18-Oct-2012 16:54 3.2M
Dell-Axim-X50-Manuel..> 18-Oct-2012 16:53 3.2M
Imprimante-laser-de-..> 18-Oct-2012 16:53 3.2M
Dell-Axim-X51-X51v-M..> 18-Oct-2012 16:52 3.2M
Dell-Systemes-Dell-P..> 18-Oct-2012 16:52 3.2M
AlienwareAuroraAuror..> 18-Oct-2012 16:51 3.1M
Dell-MANUEL-ALIENWAR..> 18-Oct-2012 16:51 3.1M
Dell-PowerEdge-C8220..> 18-Oct-2012 16:50 3.0M
Dell-Dimension-E520-..> 18-Oct-2012 16:50 3.0M
Chassis-RAID-Dell-Po..> 18-Oct-2012 16:49 3.0M
Dell-XPS-630i-Manuel..> 18-Oct-2012 16:49 3.0M
AlienwareAurora-R4.htm 18-Oct-2012 16:48 2.9M
Dell-Photo-All-In-On..> 18-Oct-2012 16:48 2.9M
Dell-Inspiron-700m-M..> 18-Oct-2012 16:47 2.9M
Dell-Systemes-Dell-I..> 18-Oct-2012 16:47 2.9M
Dell-Manuel-du-propr..> 18-Oct-2012 16:46 2.9M
Dell-Photo-Printer-7..> 18-Oct-2012 16:46 2.8M
Dell-PowerVault-MD32..> 18-Oct-2012 16:45 2.8M
Dell-Photo-All-In-On..> 18-Oct-2012 16:45 2.8M
Dell-Manuel-du-propr..> 18-Oct-2012 16:44 2.8M
Dell-Imprimante-lase..> 18-Oct-2012 16:44 2.8M
Dell-moniteur-D1920-..> 18-Oct-2012 16:43 2.7M
Dell-Systemes-Dell-P..> 18-Oct-2012 16:43 2.8M
Dell-Latitude-XT3-Ma..> 18-Oct-2012 16:42 2.7M
AlienwareArea-51Area..> 18-Oct-2012 16:42 2.7M
Dell-Imprimante-lase..> 18-Oct-2012 16:41 2.7M
Dell-Baie-de-stockag..> 18-Oct-2012 16:41 2.7M
Dell-Streak-Manuel-d..> 18-Oct-2012 16:40 2.7M
Imprimante-Dell-Phot..> 18-Oct-2012 16:39 2.6M
Dell-Systemes-Dell-P..> 18-Oct-2012 16:39 2.6M
Dell-Clavier-Axim-Ma..> 18-Oct-2012 16:38 2.6M
Dell-Latitude-ST-Man..> 18-Oct-2012 16:38 2.6M
Dell-Systemes-Dell-P..> 18-Oct-2012 16:38 2.5M
alienwareX51.htm 18-Oct-2012 16:37 2.5M
Dell-Manuel-du-propr..> 18-Oct-2012 16:37 2.5M
Dell-Systemes-Dell-P..> 18-Oct-2012 16:36 2.5M
Dell-Imprimante-lase..> 18-Oct-2012 16:36 2.5M
Dell-Photo-All-In-On..> 18-Oct-2012 16:35 2.3M
Dell-Manuel-de-maint..> 18-Oct-2012 16:35 2.2M
Dell-Manuel-d-utilis..> 18-Oct-2012 16:35 2.3M
Dell-PowerVault-MD32..> 18-Oct-2012 16:34 2.2M
Dell-XP-M1530-Manuel..> 18-Oct-2012 16:34 2.2M
Dell-Inspiron-1100-M..> 18-Oct-2012 16:33 2.2M
Dell-MANUEL-ALIENWAR..> 18-Oct-2012 16:33 2.1M
Dell-Matrices-de-sto..> 18-Oct-2012 16:33 2.1M
Dell-Inspiron-9400-E..> 18-Oct-2012 16:32 2.0M
Dell-Imprimante-lase..> 18-Oct-2012 16:32 1.9M
Dell-Laser-Printer-1..> 18-Oct-2012 16:32 1.6M
Dell-Inspiron-1525-1..> 18-Oct-2012 16:31 1.5M
Dell-Tout-en-un-Dell..> 18-Oct-2012 16:31 1.2M
Dell-Laser-Printer-1..> 18-Oct-2012 16:31 1.0M
Dell-Dimension-3100-..> 18-Oct-2012 16:31 906K
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGCover.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 – FOR PROOF ONLY
Template Last Updated -03/06/2010
Dell PowerConnect
5500 Series
System User Guide
Regulatory Models: PowerConnect 5524, 5524P, 5548, 5548PNotes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you
make better use of your system.
CAUTION: A CAUTION indicates potential damage to
hardware or loss of data if instructions are not followed.
WARNING: A WARNING indicates a potential for property
damage, personal injury, or death.
____________________
Information in this document is subject to change without notice.
© 2013 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written
permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell™, the DELL logo, Dell Precision™,
OptiPlex™, Latitude™, PowerEdge™, PowerVault™, PowerConnect™,
OpenManage™, EqualLogic™, KACE™, FlexAddress™ and Vostro™ are
trademarks of Dell Inc. Intel®, Pentium®, Xeon®, Core™ and Celeron® are
registered trademarks of Intel Corporation in the U.S. and other countries.
AMD® is a registered trademark and AMD Opteron™, AMD Phenom™, and
AMD Sempron™ are trademarks of Advanced Micro Devices, Inc. Microsoft®,
Windows®, Windows Server®, MS-DOS® and Windows Vista® are either
trademarks or registered trademarks of Microsoft Corporation in the United
States and/or other countries. Red Hat Enterprise Linux® and Enterprise Linux®
are registered trademarks of Red Hat, Inc. in the United States and/or other
countries. Novell® is a registered trademark and SUSE ™ is a trademark of
Novell Inc. in the United States and other countries. Oracle® is a registered
trademark of Oracle Corporation and/or its affiliates. Citrix®, Xen®, XenServer®
and XenMotion® are either registered trademarks or trademarks of Citrix
Systems, Inc. in the United States and/or other countries. VMware®, Virtual
SMP®, vMotion®, vCenter®, and vSphere® are registered trademarks or
trademarks of VMWare, Inc. in the United States or other countries.
Other trademarks and trade names may be used in this publication to refer to
either the entities claiming the marks and names or their products. Dell Inc.
disclaims any proprietary interest in trademarks and trade names other than its
own.
Regulatory Models PC5524, PC5524P, PC5548 and PC5548P
March 2013 A07FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
Contents 3
Contents
1 Preface . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2 Features. . . . . . . . . . . . . . . . . . . . . . . . . . 15
IP Version 6 (IPv6) Support . . . . . . . . . . . . . . . 16
Stack Support . . . . . . . . . . . . . . . . . . . . . . 16
Power over Ethernet. . . . . . . . . . . . . . . . . . . 16
Green Ethernet. . . . . . . . . . . . . . . . . . . . . . 17
Head of Line Blocking Prevention. . . . . . . . . . . . 17
Flow Control Support (IEEE 802.3X) . . . . . . . . . . . 17
Back Pressure Support . . . . . . . . . . . . . . . . . 17
Virtual Cable Testing (VCT) . . . . . . . . . . . . . . . 18
Auto-Negotiation . . . . . . . . . . . . . . . . . . . . 18
MDI/MDIX Support. . . . . . . . . . . . . . . . . . . . 18
MAC Address Supported Features . . . . . . . . . . . 18
Layer 2 Features . . . . . . . . . . . . . . . . . . . . . 20
IGMP Snooping . . . . . . . . . . . . . . . . . . . . . 20
Port Mirroring . . . . . . . . . . . . . . . . . . . . . . 20
Broadcast Storm Control . . . . . . . . . . . . . . . . 20FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
4 Contents
VLAN Supported Features . . . . . . . . . . . . . . . . 21
Spanning Tree Protocol Features . . . . . . . . . . . . 22
Link Aggregation. . . . . . . . . . . . . . . . . . . . . 24
Quality of Service Features . . . . . . . . . . . . . . . 24
Device Management Features. . . . . . . . . . . . . . 25
Security Features . . . . . . . . . . . . . . . . . . . . 29
Port Profile (CLI Macro) . . . . . . . . . . . . . . . . . 31
DHCP Server . . . . . . . . . . . . . . . . . . . . . . . 32
Protected Ports. . . . . . . . . . . . . . . . . . . . . . 32
iSCSI Optimization . . . . . . . . . . . . . . . . . . . . 32
Proprietary Protocol Filtering . . . . . . . . . . . . . . 32
3 Hardware Description . . . . . . . . . . . . . . 35
Device Models . . . . . . . . . . . . . . . . . . . . . . 36
Device Structure . . . . . . . . . . . . . . . . . . . . . 36
LED Definitions. . . . . . . . . . . . . . . . . . . . . . 40
Power Supplies . . . . . . . . . . . . . . . . . . . . . 44
4 Stacking Overview. . . . . . . . . . . . . . . . . 45
Stack Overview . . . . . . . . . . . . . . . . . . . . . 46
Stack Members and Unit IDs . . . . . . . . . . . . . . 49FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
Contents 5
5 Configuring the Switch . . . . . . . . . . . . . . 57
Configuration Work Flow . . . . . . . . . . . . . . . . 58
Connecting the Switch to the Terminal . . . . . . . . . 59
Booting the Switch . . . . . . . . . . . . . . . . . . . 60
Configuring the Stack . . . . . . . . . . . . . . . . . . 61
Configuration Using the Setup Wizard . . . . . . . . . 61
6 Advanced Switch Configuration . . . . . . . 67
Using the CLI. . . . . . . . . . . . . . . . . . . . . . . 68
Accessing the Device Through the CLI . . . . . . . . . 71
Retrieving an IP Address . . . . . . . . . . . . . . . . 72
Security Management and Password Configuration . . 75
Configuring Login Banners . . . . . . . . . . . . . . . 78
Startup Menu Procedures . . . . . . . . . . . . . . . . 80
Software Download . . . . . . . . . . . . . . . . . . . 83
7 Using Dell OpenManage Administrator. . 87
Starting the Application . . . . . . . . . . . . . . . . . 88
Understanding the Interface. . . . . . . . . . . . . . . 88
Using the Switch Administrator Buttons . . . . . . . . 91
Field Definitions . . . . . . . . . . . . . . . . . . . . . 93
Common GUI Features . . . . . . . . . . . . . . . . . . 93FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
6 Contents
GUI Terms. . . . . . . . . . . . . . . . . . . . . . . . . 94
CLI Commands . . . . . . . . . . . . . . . . . . . . . . 94
8 Network Security. . . . . . . . . . . . . . . . . . 97
Port Security . . . . . . . . . . . . . . . . . . . . . . . 98
ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . 103
ACL Binding . . . . . . . . . . . . . . . . . . . . . . 123
Proprietary Protocol Filtering . . . . . . . . . . . . . 125
Time Range. . . . . . . . . . . . . . . . . . . . . . . 127
Dot1x Authentication. . . . . . . . . . . . . . . . . . 132
9 Configuring System Information . . . . . . 155
General Switch Information . . . . . . . . . . . . . . 156
Time Synchronization . . . . . . . . . . . . . . . . . 169
Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . 195
IP Addressing . . . . . . . . . . . . . . . . . . . . . 209
Diagnostics. . . . . . . . . . . . . . . . . . . . . . . 255
Management Security . . . . . . . . . . . . . . . . . 261
DHCP Server . . . . . . . . . . . . . . . . . . . . . . 297
SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
File Management. . . . . . . . . . . . . . . . . . . . 337
Stack Management . . . . . . . . . . . . . . . . . . 367FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
Contents 7
sFlow . . . . . . . . . . . . . . . . . . . . . . . . . . 375
10 Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
Overview. . . . . . . . . . . . . . . . . . . . . . . . . 385
Jumbo Frames . . . . . . . . . . . . . . . . . . . . . . 388
Green Ethernet Configuration . . . . . . . . . . . . . . 390
Protected Ports . . . . . . . . . . . . . . . . . . . . . 394
Port Profile. . . . . . . . . . . . . . . . . . . . . . . . 397
Port Configuration . . . . . . . . . . . . . . . . . . . . 403
LAG Configuration . . . . . . . . . . . . . . . . . . . . 409
Storm Control . . . . . . . . . . . . . . . . . . . . . . 414
Port Mirroring . . . . . . . . . . . . . . . . . . . . . . 417
11 Address Tables . . . . . . . . . . . . . . . . . . . 422
Overview. . . . . . . . . . . . . . . . . . . . . . . . . 423
Static Addresses. . . . . . . . . . . . . . . . . . . . . 424
Dynamic Addresses . . . . . . . . . . . . . . . . . . . 427
12 GARP . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
GARP Overview . . . . . . . . . . . . . . . . . . . . . 431
GARP Timers . . . . . . . . . . . . . . . . . . . . . . . 432FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
8 Contents
13 Spanning Tree . . . . . . . . . . . . . . . . . . . . 434
Spanning Tree Protocol Overview. . . . . . . . . . . 435
Global Settings. . . . . . . . . . . . . . . . . . . . . 437
STP Port Settings. . . . . . . . . . . . . . . . . . . . 442
STP LAG Settings. . . . . . . . . . . . . . . . . . . . 447
Rapid Spanning Tree. . . . . . . . . . . . . . . . . . 450
Multiple Spanning Tree . . . . . . . . . . . . . . . . 454
14 VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . 466
Virtual LAN Overview . . . . . . . . . . . . . . . . . 467
VLAN Membership . . . . . . . . . . . . . . . . . . . 472
Port Settings . . . . . . . . . . . . . . . . . . . . . . 475
LAGs Settings . . . . . . . . . . . . . . . . . . . . . 481
Protocol Groups . . . . . . . . . . . . . . . . . . . . 484
Protocol Port . . . . . . . . . . . . . . . . . . . . . . 488
GVRP Parameters . . . . . . . . . . . . . . . . . . . 490
Private VLAN. . . . . . . . . . . . . . . . . . . . . . 494
Voice VLAN. . . . . . . . . . . . . . . . . . . . . . . 498
15 Link Aggregation . . . . . . . . . . . . . . . . . . 508
Link Aggregation Overview . . . . . . . . . . . . . . 509
LACP Parameters. . . . . . . . . . . . . . . . . . . . 511FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
Contents 9
LAG Membership . . . . . . . . . . . . . . . . . . . . 514
16 Multicast . . . . . . . . . . . . . . . . . . . . . . . . 516
Multicast Support Overview. . . . . . . . . . . . . . . 517
Global Parameters. . . . . . . . . . . . . . . . . . . . 519
Bridge Multicast Groups . . . . . . . . . . . . . . . . 521
Bridge Multicast Forward All . . . . . . . . . . . . . . 525
IGMP Snooping . . . . . . . . . . . . . . . . . . . . . 527
Unregistered Multicast . . . . . . . . . . . . . . . . . 533
Multicast TV VLAN. . . . . . . . . . . . . . . . . . . . 535
17 LLDP . . . . . . . . . . . . . . . . . . . . . . . . . . . 540
LLDP Overview. . . . . . . . . . . . . . . . . . . . . . 541
LLDP Properties . . . . . . . . . . . . . . . . . . . . . 542
LLDP Port Settings . . . . . . . . . . . . . . . . . . . . 546
MED Network Policy . . . . . . . . . . . . . . . . . . 549
LLDP MED Port Settings . . . . . . . . . . . . . . . . . 552
Neighbors Information. . . . . . . . . . . . . . . . . . 557
18 Dynamic ARP Inspection . . . . . . . . . . . . 560
Dynamic ARP Inspection Overview. . . . . . . . . . . 561
Global Settings. . . . . . . . . . . . . . . . . . . . . . 562FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
10 Contents
Dynamic ARP Inspection List . . . . . . . . . . . . . 564
Dynamic ARP Inspection Entries . . . . . . . . . . . 566
VLAN Settings . . . . . . . . . . . . . . . . . . . . . 568
Trusted Interfaces . . . . . . . . . . . . . . . . . . . 570
19 DHCP Snooping . . . . . . . . . . . . . . . . . . . 572
DHCP Snooping . . . . . . . . . . . . . . . . . . . . 573
DHCP Relay. . . . . . . . . . . . . . . . . . . . . . . 586
20 iSCSI Optimization . . . . . . . . . . . . . . . . . 594
Optimizing iSCSI Overview . . . . . . . . . . . . . . 595
Global Parameters . . . . . . . . . . . . . . . . . . . 598
iSCSI Targets . . . . . . . . . . . . . . . . . . . . . . 601
iSCSI Sessions . . . . . . . . . . . . . . . . . . . . . 603
Configuring iSCSI Using CLI . . . . . . . . . . . . . . 605
21 Statistics/RMON . . . . . . . . . . . . . . . . . . 606
Table Views . . . . . . . . . . . . . . . . . . . . . . 607
RMON Components . . . . . . . . . . . . . . . . . . 625
Charts. . . . . . . . . . . . . . . . . . . . . . . . . . 643FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
Contents 11
22 Quality of Service . . . . . . . . . . . . . . . . . 650
QoS Features and Components . . . . . . . . . . . . . 651
General. . . . . . . . . . . . . . . . . . . . . . . . . . 653
QoS Basic Mode . . . . . . . . . . . . . . . . . . . . . 669
QoS Advanced Mode . . . . . . . . . . . . . . . . . . 678
QoS Statistics . . . . . . . . . . . . . . . . . . . . . . 698
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720
Revision History . . . . . . . . . . . . . . . . . . . . . . 735FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance
Projects\Dell Contax\sources\Dell_ContaxUG_PrintTOC.fm
12 ContentsDell PowerConnect 55xx Systems User Guide 13
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
1
Preface
PowerConnect 5524/5548 and PowerConnect 5524P/5548P are stackable,
advanced multi-layer devices.
This guide contains the information needed for installing, configuring, and
maintaining the device through the web-based management system, called
the OpenManage Switch Administrator.
This guide describes how to configure each system through the web-based
management system and through CLI commands.
The CLI Reference Guide, which is available on the Documentation CD,
provides additional information about the CLI commands. 14 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGPrefix.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLYDell PowerConnect 55xx Systems User Guide 15
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2
Features
This section describes the features of the PowerConnect 5524/P and 5548/P
switches.
For a complete list of all updated device features, see the latest software
version Release Notes.
This section contains the following topics:
• IP Version 6 (IPv6) Support
• Stack Support
• Power over Ethernet
• Green Ethernet
• Head of Line Blocking Prevention
• Flow Control Support (IEEE 802.3X)
• Back Pressure Support
• Virtual Cable Testing (VCT)
• Auto-Negotiation
• MDI/MDIX Support
• MAC Address Supported Features
• Layer 2 Features
• IGMP Snooping
• Port Mirroring
• Broadcast Storm Control
• VLAN Supported Features
• Spanning Tree Protocol Features
• Link Aggregation
• Quality of Service Features
• Quality of Service Features
• Device Management Features16 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Security Features
• DHCP Server
• Protected Ports
• iSCSI Optimization
• Proprietary Protocol Filtering
IP Version 6 (IPv6) Support
The device functions as an IPv6-compliant host, as well as an IPv4 host (also
known as dual stack). This enables device operation in a pure IPv6 network as
well as in a combined IPv4/IPv6 network.
For more information, see "IP Addressing" on page 209.
Stack Support
The system supports up to eight units with two fixed HDMI stacking ports.
The HDMI ports are 1.3a specification, Category 2 High Speed cables, 340
MHz (10.2 Gbit/s).
it is recommended to use HDMI cable version 1.4
The stacking feature supports the following features:
• Fast-link failover
• Software auto-synch.
• Improved response time to events, such as master failover
• Auto-numbering algorithm when choosing unit number
For more information, see "Stacking Overview" on page 45
Power over Ethernet
Power over Ethernet (PoE) provides power to devices over existing LAN
cabling, without updating or modifying the network infrastructure. When
PoE is used, the network devices do not have to be placed next to a power
source. PoE can be used in the following applications:
• IP Phones
• Wireless Access PointsDell PowerConnect 55xx Systems User Guide 17
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• IP Gateways
• PDAs
• Audio and video remote monitoring
For more information, see "Power over Ethernet" on page 162.
Green Ethernet
Green Ethernet, also known as Energy Efficient Ethernet (EEE), is an effort
to make networking equipment environmentally friendly, by reducing the
power usage of Ethernet connections.
The Short-Reach method, which reduces power over Ethernet cables shorter
than 40m, is supported by the device.
For more information, see "Green Ethernet Configuration" on page 390.
Head of Line Blocking Prevention
Head of Line (HOL) blocking results in traffic delays and frame loss caused
by traffic competing for the same egress port resources. To prevent HOL
blocking, the device queues packets, and packets at the head of the queue are
forwarded before packets at the end of the queue.
Flow Control Support (IEEE 802.3X)
Flow control enables lower-speed devices to communicate with higher-speed
devices, by requesting that the higher-speed device refrain from sending
packets. Transmissions are temporarily halted to prevent buffer overflows.
For more information, see "Flow Control" on page 386.
Back Pressure Support
On half-duplex links, the receiving port prevents buffer overflows by
occupying the link so that it is unavailable for additional traffic.
For more information, see "Protected Ports" on page 394.18 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Virtual Cable Testing (VCT)
VCTdetects and reports copper link cabling faults, such as open cables and
cable shorts.
For more information, see "Diagnostics" on page 255.
Auto-Negotiation
Auto-negotiation enables the device to advertise modes of operation. The
auto-negotiation function enables an exchange of information between two
devices that share a point-to-point link segment, and automatically
configures both devices to take maximum advantage of their transmission
capabilities.
The PowerConnect 5500 series enhances auto-negotiation by providing port
advertisement. Port advertisement enables the system administrator to
configure the port speeds that are advertised.
For more information, see "Port Configuration" on page 403 or "LAG
Configuration" on page 409.
MDI/MDIX Support
Standard wiring for end stations is known as Media-Dependent Interface
(MDI), and standard wiring for hubs and switches is known as MediaDependent Interface with Crossover (MDIX).
If auto-negotiation is enabled, the device automatically detects whether the
cable connected to an RJ-45 port is MDIX (crossed) or MDI (straight). This
enables both types to be used interchangeably.
If auto-negotiation is not enabled, only MDI (straight) cables can be used.
For more information, see "Port Configuration" on page 403 or "LAG
Configuration" on page 409.
MAC Address Supported Features
MAC Address Capacity Support
The device supports up to 16K MAC addresses and it reserves specific MAC
addresses for system use.Dell PowerConnect 55xx Systems User Guide 19
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Static MAC Entries
MAC entries can be manually entered in the Bridging Table, as an alternative
to learning them from incoming frames. These user-defined entries are not
subject to aging, and are preserved across resets and reboots.
For more information, see "Static Addresses" on page 424.
Self-Learning MAC Addresses
The device enables controlled MAC address learning from incoming packets.
The MAC addresses are stored in the Bridging Table.
For more information, see "Dynamic Addresses" on page 427.
Automatic Aging for MAC Addresses
MAC addresses from which no traffic is received for a given period, are aged
out. This prevents the Bridging Table from overflowing.
For more information, see "Dynamic Addresses" on page 427.
VLAN-Aware MAC-Based Switching
The device always performs VLAN-aware bridging. Classic bridging
(IEEE802.1D), in which frames are forwarded based only on their destination
MAC address, is not performed. However, a similar functionality can be
configured for untagged frames. Frames addressed to a destination MAC
address that is not associated with any port are flooded to all ports of the
relevant VLAN.
MAC Multicast Support
Multicast service is a limited Broadcast service that enables one-to-many and
many-to-many connections for information distribution. In Layer 2 Multicast
service, a single frame is addressed to a specific Multicast address, from which
copies of the frame are transmitted to the relevant ports. When Multicast
groups are statically enabled, you can set the destination port of registered
groups, as well as define the behavior of unregistered Multicast frames.
For more information, see "Multicast" on page 516.20 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Layer 2 Features
IGMP Snooping
Internet Group Membership Protocol (IGMP) Snooping examines IGMP
frame contents, when they are forwarded by the device from work stations to
an upstream Multicast router. From the frame, the device identifies work
stations configured for Multicast sessions, and which Multicast routers are
sending Multicast frames. The IGMP Querier simulates the behavior of a
Multicast router. This enables snooping of the Layer 2 Multicast domain even
if there is no Multicast router.
For more information, see "IGMP Snooping" on page 527.
Port Mirroring
Port mirroring monitors network traffic by forwarding copies of incoming and
outgoing packets from a monitored port to a monitoring port. Users specify
which target port receives copies of all traffic passing through a specified
source port.
For more information, see "Port Mirroring" on page 417.
Broadcast Storm Control
Storm Control enables limiting the number of Multicast and Broadcast
frames accepted by and forwarded by the device.
When Layer 2 frames are forwarded, Broadcast and Multicast frames are
flooded to all ports on the relevant VLAN. This occupies bandwidth, and
loads all nodes connected on all ports.
For more information, see "Storm Control" on page 414.Dell PowerConnect 55xx Systems User Guide 21
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
VLAN Supported Features
VLAN Support
VLANs are collections of switching ports that comprise a single Broadcast
domain. Packets are classified as belonging to a VLAN, based on either the
VLAN tag or on a combination of the ingress port and packet contents.
Packets sharing common attributes can be grouped in the same VLAN.
For more information, see "VLANs" on page 466.
Port-Based Virtual LANs (VLANs)
Port-based VLANs classify incoming packets to VLANs, based on their ingress
port.
For more information, see "Defining VLAN Membership Using CLI
Commands" on page 473.
Full 802.1Q VLAN Tagging Compliance
IEEE 802.1Q defines an architecture for virtual, bridged LANs, the services
provided in VLANs, and the protocols and algorithms involved in the
provision of these services.
For more information, see "Virtual LAN Overview" on page 467.
GVRP Support
GARP VLAN Registration Protocol(GVRP) provides IEEE 802.1Qcompliant VLAN pruning and dynamic VLAN creation. When GVRP is
enabled, the device registers and propagates VLAN membership on all ports
that are part of the active underlying Spanning Tree Protocol topology.
For more information, see "GVRP Parameters" on page 490.
Voice VLAN
Voice VLAN enables network administrators to enhance VoIP service by
configuring ports to carry IP voice traffic from IP phones on a specific VLAN.
VoIP traffic has a preconfigured OUI prefix in the source MAC address.
Network administrators can configure VLANs from which voice IP traffic is 22 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
forwarded. Non-VoIP traffic is dropped from the Voice VLAN in Auto-Voice
VLAN Secure mode. Voice VLAN also provides QoS to VoIP, ensuring that the
quality of voice does not deteriorate if the IP traffic is received unevenly.
For more information, see "Voice VLAN" on page 498.
Guest VLAN
Guest VLAN provides limited network access to unauthorized ports. If a port
is denied network access via port-based authorization, but the Guest VLAN is
enabled, the port receives limited network access through the Guest VLAN.
For more information, see "Dot1x Authentication" on page 132.
Private VLAN
The Private VLAN feature provides Layer 2 isolation between ports that share
the same Broadcast domain, or in other words, it creates a point-tomultipoint Broadcast domain. The ports can be located anywhere in the
Layer 2 network (compared to the Protected Ports feature, where the ports
must be in the same stack).
For more information, see "Private VLAN" on page 494.
Multicast TV VLAN
The Multicast TV VLAN feature provides the ability to supply multicast
transmissions to Layer 2-isolated subscribers, without replicating the
multicast transmissions for each subscriber VLAN. The subscribers are the
only receivers of the multicast transmissions.
For more information, see "Multicast TV VLAN" on page 535.
Spanning Tree Protocol Features
Spanning Tree Protocol (STP)
802.1d Spanning tree is a standard Layer 2 switch requirement that enables
bridges to automatically prevent and resolve Layer 2 forwarding loops.
Switches exchange configuration messages using specifically-formatted
frames, and selectively enable and disable forwarding on ports.
For more information, see "Spanning Tree" on page 434. Dell PowerConnect 55xx Systems User Guide 23
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Fast Link
STP can take 30–60 seconds to converge. During this time, STP detects
possible loops, enabling time for status changes to propagate and for relevant
devices to respond. This period of 30-60 seconds is considered too long a
response time for many applications. The Fast Link option bypasses this
delay, and can be used in network topologies, where forwarding loops do not
occur.
For more information on enabling Fast Link for ports and LAGs, see "STP
Port Settings" on page 442 or "Static Addresses" on page 424.
IEEE 802.1w Rapid Spanning Tree
Spanning Tree takes 30–60 seconds for each host to decide whether its ports
are actively forwarding traffic. Rapid Spanning Tree (RSTP) detects uses of
network topologies to enable faster convergence, without creating forwarding
loops.
For more information, see "Spanning Tree" on page 434.
IEEE 802.1s Multiple Spanning Tree
Multiple Spanning Tree (MSTP) operation maps VLANs into STP instances.
MSTP provides a different load balancing scenario. Packets assigned to various
VLANs are transmitted along different paths within MSTP Regions (MST
Regions). Regions are one or more MSTP bridges by which frames can be
transmitted. The standard lets administrators assign VLAN traffic to
unique paths.
For more information, see "Spanning Tree" on page 434.
STP BPDU Guard
BPDU Guard is used as a security mechanism, to protect the network from
invalid configurations.
BPDU Guard is usually used either when fast link ports (ports connected to
clients) are enabled or when the STP feature is disabled. When it is enabled
on a port, the port is shut down if a BPDU message is received and an
appropriate SNMP trap is generated.
For more information, see "Spanning Tree" on page 434.24 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Link Aggregation
Up to 32 Aggregated Links may be defined, each with up to eight member
ports, to form a single Link Aggregated Group (LAG). This enables:
• Fault tolerance protection from physical link disruption
• Higher bandwidth connections
• Improved bandwidth granularity
• High bandwidth server connectivity
A LAG is composed of ports with the same speed, set to full-duplex
operation.
For more information, see "LAG Configuration" on page 409.
Link Aggregation and LACP
LACP uses peer exchanges across links to determine, on an ongoing basis, the
aggregation capability of various links, and continuously provides the
maximum level of aggregation capability achievable between a given pair of
devices. LACP automatically determines, configures, binds, and monitors the
port binding within the system.
For more information, see "Link Aggregation" on page 508.
BootP and DHCP Clients
DHCP enables additional setup parameters to be received from a network
server upon system startup. DHCP service is an on-going process. DHCP is an
extension of BootP.
For more information, see "DHCP IPv4 Interface" on page 214.
Quality of Service Features
Class of Service 802.1p Support
The IEEE 802.1p signaling technique is an OSI Layer 2 standard for marking
and prioritizing network traffic at the data link/MAC sub-layer. 802.1p traffic
is classified and sent to the destination. No bandwidth reservations or limits Dell PowerConnect 55xx Systems User Guide 25
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
are established or enforced. 802.1p is a spin-off of the 802.1Q (VLANs)
standard. 802.1p establishes eight levels of priority, similar to the IP
Precedence IP Header bit-field.
Advanced QoS
Frames that match an ACL and were permitted entrance are implicitly
labeled with the name of the ACL that permitted their entrance. Advanced
mode QoS actions defined in network policies can then be applied to these
flows.
The switch can set DSCP values and map IPv6 DSCP to egress queues in the
same way it does for IPv4. The switch detects IPv6 frames by the IPv6 ethertype.
For more information about Advanced QoS, see "QoS Advanced Mode" on
page 678.
TCP Congestion Avoidance
The TCP Congestion Avoidance feature activates an algorithm that breaks up
or prevents TCP global synchronization on a congested node, where the
congestion is due to multiple sources sending packets with the same byte
count.
For more information, see "The following is an example of the CLI
commands:" on page 666.
Device Management Features
SNMP Alarms and Trap Logs
The system logs events with severity codes and timestamps. Events are sent as
SNMP traps to a Trap Recipient List.
For more information, see "SNMP" on page 314.26 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
SNMP Versions 1, 2, and 3
Simple Network Management Protocol (SNMP) over the UDP/IP protocol
controls access to the system. A list of community entries is defined, each
consisting of a community string and its access privileges. There are three
levels of SNMP security: read-only, read-write, and super. Only a super user
can access the Community table.
For more information, see "SNMP" on page 314.
Web-Based Management
Web-based management enables managing the system from any web browser.
The system contains an Embedded Web Server (EWS) that serves HTML
pages, through which the system can be monitored and configured. The
system internally converts web-based input into configuration commands,
MIB variable settings, and other management-related settings.
Management IP Address Conflict Notification
This feature validates the uniqueness of the switch's IP address, whether it is
assigned manually or through DHCP. If the IP address is not unique, the
switch performs actions according to the address type. If the IP address is
static, see more information about this in "IPv4 Interface Parameters" on
page 210. If the IP address is dynamic, see more information about this
in"DHCP IPv4 Interface" on page 214.
Flow Monitoring (sflow)
The switch supports statistics collection, using a sampling technology called
sFlow that is based on RFC 3176. The sFlow sampling technology is
embedded within the switch, and provides the ability to continuously
monitor traffic flows on some or all the interfaces simultaneously.
For more information, see "sFlow" on page 375.
Configuration File Download and Upload
The device configuration is stored in a configuration file. The configuration
file includes both system-wide and port-specific device configuration. The
system can display configuration files as a collection of CLI commands that
are stored and manipulated as text files.Dell PowerConnect 55xx Systems User Guide 27
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Auto-Update of Configuration/Image File
This feature facilitates installation of new devices. When you enable the
various auto-update options, the device automatically downloads a new
image or configuration file when it receives its IP address from a TFTP server,
and automatically reboots, using the image or configuration file it received.
For more information, see "Auto-Update/Configuration Feature" on page 338.
TFTP Trivial File Transfer Protocol
The device supports boot image, software, and configuration
upload/download via TFTP.
USB File Transfer Protocol
The device supports boot image, software, and configuration
upload/download via USB.
Remote Monitoring
Remote Monitoring (RMON) is an extension to SNMP that provides
comprehensive network traffic monitoring capabilities. RMON is a standard
MIB that defines MAC-layer statistics and control objects, enabling real-time
information to be captured across the entire network.
For more information, see "Statistics/RMON" on page 606.
Command Line Interface
Command Line Interface (CLI) syntax and semantics conform as much as
possible to common, industry standards. CLI is composed of mandatory and
optional elements. The CLI interpreter provides command and keyword
completion to assist users and save typing.
Syslog
Syslog is a protocol that enables event notifications to be sent to a set of
remote servers, where they can be stored, examined, and acted upon. The
system sends notifications of significant events in real time, and keeps a
record of these events for after-the-fact usage.
For more information on Syslog, see "Logs" on page 195.28 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
SNTP
The Simple Network Time Protocol (SNTP) assures accurate network
Ethernet Switch clock time synchronization up to the millisecond. Time
synchronization is performed by a network SNTP server. Time sources are
prioritized by strata. Strata define the distance from the reference clock. The
higher the stratum (where zero is the highest), the more accurate the clock.
For more information, see "Time Synchronization" on page 169.
Domain Name System
Domain Name System (DNS) converts user-defined domain names into IP
addresses. Each time a domain name is assigned, the DNS service translates
the name into a numeric IP address. For example, www.ipexample.com is
translated into 192.87.56.2. DNS servers maintain domain name databases
containing their corresponding IP addresses.
For more information, see "Domain Name System" on page 242.
802.1ab (LLDP-MED)
The Link Layer Discovery Protocol (LLDP) enables network managers to
troubleshoot, and enhances network management by discovering and
maintaining network topologies over multi-vendor environments. LLDP
discovers network neighbors by standardizing methods for network devices to
advertise themselves to other systems, and to store discovered information.
The multiple advertisement sets are sent in the packet Type Length Value
(TLV) field. LLDP devices must support chassis and port ID advertisement,
as well as system name, system ID, system description, and system capability
advertisements.
LLDP Media Endpoint Discovery (LLDP-MED) increases network flexibility
by enabling various IP systems to co-exist on a single network LLDP. It
provides detailed network topology information, emergency call service via IP
phone location information, and troubleshooting information.
For more information, see "LLDP" on page 540.Dell PowerConnect 55xx Systems User Guide 29
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Security Features
SSL
Secure Socket Layer (SSL) is an application-level protocol that enables secure
transactions of data through privacy, authentication, and data integrity. It
relies upon certificates and public and private keys.
Port-Based Authentication (Dot1x)
Port-based authentication enables authenticating system users on a per-port
basis via an external server. Only authenticated and approved system users
can transmit and receive data. Ports are authenticated via the Remote
Authentication Dial-In User Service (RADIUS) server using the Extensible
Authentication Protocol (EAP). Dynamic VLAN Assignment (DVA) enables
network administrators to automatically assign users to VLANs during the
RADIUS server authentication.
For more information, see "Dot1x Authentication" on page 132.
Locked Port Support
Locked Port increases network security by limiting access on a specific port to
users with specific MAC addresses. These addresses are either manually
defined or learned on that port. When a frame is seen on a locked port, and
the frame source MAC address is not tied to that port, the protection
mechanism is invoked.
For more information, see "Port Security" on page 98.
RADIUS Client
RADIUS is a client/server-based protocol. A RADIUS server maintains a user
database that contains per-user authentication information, such as user
name, password, and accounting information.
RADIUS Accounting
This feature enables recording device management sessions (Telnet, serial,
and WEB but not SNMP) and/or 802.1x authentication sessions.30 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Due to the complexity of 802.1x setup and configuration, many mistakes can
be made that might cause loss of connectivity or incorrect behavior. The
802.1x Monitor mode enables applying 802.1x functionality to the switch,
with all necessary RADIUS and/or domain servers active, without actually
taking any action that may cause unexpected behavior. In this way, the user
can test the 802.1x setup before actually applying it.
For more information, see "RADIUS" on page 291.
SSH
Secure Shell (SSH) is a protocol that provides a secure, remote connection to
a device. SSH version 2 is currently supported. The SSH server feature
enables an SSH client to establish a secure, encrypted connection with a
device. This connection provides functionality that is similar to an inbound
telnet connection. SSH uses RSA and DSA Public Key cryptography for
device connections and authentication.
For more information, see "Security Management and Password
Configuration" on page 75.
TACACS+
TACACS+ provides centralized security for validation of users accessing the
device. TACACS+ provides a centralized, user management system, while
still retaining consistency with RADIUS and other authentication processes.
For more information, see "TACACS+" on page 282.
Password Management
Password management provides increased network security and improved
password control. Passwords for SSH, Telnet, HTTP, HTTPS, and SNMP
access are assigned security features.
For more information, see "Password Management" on page 286.
The switch provides the ability to demand strong passwords, meaning that
they must contain both upper and lower-case letters, numbers, and
punctuation marks.
For more information, see "Password Management" on page 286.Dell PowerConnect 55xx Systems User Guide 31
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Access Control Lists (ACL)
Access Control Lists (ACL) enable network managers to define classification
actions and rules for specific ingress ports. Packets entering an ingress port
with an active ACL, are either admitted or denied entry and the ingress port is
disabled. If they are denied entry, the user can disable the port.
Dynamic ACL/Dynamic Policy Assignment (DACL/DPA)
The network administrator can specify the user's ACL in the RADIUS server.
After successful authentication, the user is assigned that ACL.
For more information, see "Network Security" on page 97.
DHCP Snooping
DHCP Snooping expands network security by providing firewall security
between untrusted interfaces and DHCP servers. By enabling DHCP
Snooping, network administrators can differentiate between trusted
interfaces connected to end-users or DHCP servers and untrusted interfaces
located beyond the network firewall.
For more information, see "DHCP Snooping" on page 573.
ARP Inspection
Dynamic ARP inspection is a security feature that validates ARP packets in a
network. It intercepts, logs, and discards ARP packets with invalid IP-to-MAC
address bindings. This capability protects the network from certain man-inthe-middle attacks.
Port Profile (CLI Macro)
Macros provide a convenient way to save and share a common configuration.
A macro is a set of CLI commands with a unique name. When a macro is
applied to a port, the CLI commands contained within it are executed and
added to the Running Configuration file.
For more information, see "Dynamic ARP Inspection" on page 560.32 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
DHCP Server
Dynamic Host Configuration Protocol (DHCP) provides a means of passing
configuration information (including the IP address of a TFTP server and a
configuration file name) to hosts on a TCP/IP network. The switch can serve
as a DHCP server or client.
For more information on the device serving as a DHCP server, see "DHCP
Server" on page 297.
For more information on the device serving as a DHCP client, see "DHCP
IPv4 Interface" on page 214.
Protected Ports
The Protected Ports feature provides Layer 2 isolation between interfaces
(Ethernet ports and LAGs) that share the same Broadcast domain (VLAN)
with other interfaces.
For more information, see "Protected Ports" on page 394.
iSCSI Optimization
iSCSI optimization provides the iSCSI flows with specific priority over other
network traffic. In addition, the feature provides monitoring of iSCSI
sessions.
For more information, see "iSCSI Optimization" on page 594.
Proprietary Protocol Filtering
This feature enables user control over the filtering of packets with proprietary
protocols such as CDP, VTP, DTP, UDLD, PaGP, and SSTP. The user can
select any combination of the protocols to be filtered, for example: CDP and
VTP and UDLD.
For more information, see "Network Security" on page 97.
DHCP Relay and Option 82
A DHCP relay agent detects DHCP Broadcasts from DHCP clients and relays
them to DHCP servers that may reside on different subnets.Dell PowerConnect 55xx Systems User Guide 33
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The relay agent information option (Option 82) in the DHCP protocol
enables a DHCP relay agent to send additional client information, upon
requesting an IP address.
Option 82 specifies the relaying switch's MAC address, the port identifier, and
the VLAN that forwarded the packet.
For more information, see "DHCP Relay" on page 586.
Identifying a Switch via LED
The switch provides the ability to turn on a LED (through the GUI interface)
on a specific unit or on all units in a stack for a specific length of time.
For more information, see Unit Identification (Location).34 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGFeatures.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLYDell PowerConnect 55xx Systems User Guide 35
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3
Hardware Description
This section describes PowerConnect 5500 hardware.
It contains the following topics:
• Device Models
• Device Structure
• LED Definitions
• Power Supplies36 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Device Models
The PowerConnect 5500 switches combine versatility with minimal
management requirements. This series includes the following device types:
• PowerConnect 5524 — Provides 24 10/100/1000Mbps Base-T ports
• PowerConnect 5524P (with PoE) — Provides 24 10/100/1000Mbps Base-T
ports, along with Power-over-Ethernet (PoE) support
• PowerConnect 5548 — Provides 48 10/100/1000Mbps Base-T ports
• PowerConnect 5548P (with PoE) — Provides 24 10/100/1000Mbps Base-T
ports, along with Power-over-Ethernet (PoE) support
Each of these devices provides, in addition to the above ports, two HDMI
ports, two SPF+ ports, an RS-232 console port, and a USB port, as shown in
Figure 3-1.
NOTE: 10/100/1000Mbps Baset-T ports are also known as Gigabit ports or G ports.
Device Structure
This section describes the structure of the devices.
It contains the following topics:
• Front Panel
• Buttons and LEDs
• Back Panel
• Ventilation System
• System LEDs
• Port LEDsDell PowerConnect 55xx Systems User Guide 37
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Front Panel
Figure 3-1 shows the front panel of the PowerConnect 5548 device with its
various ports labelled. The PowerConnect 5524 device from the
PowerConnect 5548 device in that there are 24 G ports and not 48.
Figure 3-2 shows the buttons/LEDs on the right side in greater detail.
Figure 3-1. PowerConnect 5548 Ports
The following ports are found on the devices.
• 24/48 G Ports
• Two XG Ports (also known as Small Form Factor Plugable (SFP)+ Ports)
These are 10 Gigabit ports, designated as 1000Base-X-SFP+. The SFP+
ports are fiber transceivers designated as 10000 Base-SX or LX. They
include TWSI (Two-Wire Serial Interface) and internal EPROM.
• RS-232 Console Port
This port is used for a terminal connection for debugging and software
downloads. The default baud rate is 9,600 bps. The baud rate can be
configured from 2400 bps up to 115,200 bps.
• Two HDMI Ports
The HDMI ports are 1.3a specification, category 2 high-speed cables, 340
MHz (10.2 Gbit/s). They are used for stacking purposes.
Console
SPF+ Ports
USB Port
HDMI Ports
Giga Ports (even numbered)
Port
Giga Ports (odd numbered)38 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
NOTE: it is recommended to use HDMI cable version 1.4
• Single USB Port
This port is used for firmware upgrade from a USB device.
Buttons and LEDs
LEDs on Front Panel
Figure 3-2 shows the extreme, right-hand part of the front panel, which
contains buttons and LEDs, in addition to ports.
Figure 3-2. Button/LED Panel
These LEDs are described in Table 3-1 and Table 3-2.
Reset Button
The PowerConnect 5500 switches have a reset button, located on the front
panel that is used for manual reset (reboot) of the device.
The single reset circuit of the switch is activated by power-up or low-voltage
conditions.
Power Status
Fan
RPS
Reset
Stacking Unit ID
Master Port LEDs
Console PortDell PowerConnect 55xx Systems User Guide 39
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The Reset button does not extend beyond the unit’s front, and it must be
activated with a pin.
Back Panel
The back panel of the non-PoE models, shown in Figure 3-3, contains a
Redundant Power Supply (RPS) connector, Location LED, and power
connector.
The back panel of the PoE models, shown in Figure 3-4, contains a Modular
Power Supply (MPS) connector, Location LED, power connector, and two fan
outlets.
Figure 3-3. PowerConnect 5524/48 Back Panel
Figure 3-4. PowerConnect 5524/48/P Back Panel
The elements on the back panel are used as follows:
• Locator LED — This LED is lit when the Unit Identification feature is
selected. See "Unit Identification (Location)" on page 373 for more
information about this feature.
• RPS/MPS — Connector for auxiliary power supply. See "Power Supplies"
on page 44 for more information.
RPS
A/C Power Supply
Locator
Locator MPS Fan Fan A/C Power Supply40 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• A/C Power Supply — Connector for AC power supply. See "Power
Supplies" on page 44 for more information.
• Fans — Fan outlets. See "Ventilation System" on page 40 for more
information.
Ventilation System
The PowerConnect 5500/P switches have two built-in fans. Operation can be
verified by observing the LED that indicates if one or more fans are faulty
(see Table 3-1).
The fan outlets are shown in Figure 3-4.
LED Definitions
The front panel contains light emitting diodes(LEDs) that indicate the
status of links, power supplies, fans, and system diagnostics.
These are described below.
System LEDs
The system LEDs of the PowerConnect 5500 devices provide information
about the power supplies, fans, thermal conditions, and diagnostics.
Figure 3-2 shows the location of the system LEDS on the device.
Table 3-1 describes the meaning of the colors of the system LEDs.
Table 3-1. System LED Indicators
LED Color Description
Power Supply
(PWR)
Green Static The switch is turned on.
Green Flashing The Locator function is enabled.
Off The switch is turned off.
Status Green Static The switch is operating normally.
Green Flashing The switch is booting.
Red Static A critical system error has occurred.
Red Flashing A non-critical system error has occurred.Dell PowerConnect 55xx Systems User Guide 41
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Stacking No. Indicates the unit ID of the device in the
stack.
Modular/Redundan
cy Power Supply
(MPS/RPS)
Green Static The MPS/RPS is currently operating.
Red Static The MPS/RPS failed.
Off The MPS/RPS is not plugged in.
Locator Green Flashing Locator function is enabled.
Green Static Locator function is disabled.
Master Green Static The device is a master unit.
Off The device is not a master unit.
Fan (FAN) Green Static All device fans are operating normally.
Red Static One or more of the device fans are not
operating.
Table 3-1. System LED Indicators (Continued)
LED Color Description 42 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port LEDs
Gigabit Ports
Each Giga port has two LEDs associated with it. The speed/link (LNK) LED
is located on the left side of the port, while the activity/PoE LED is located on
the right side of the port. The activity/PoE LED is labelled ACT in non-PoE
devices, and is labelled PoE in PoE-enabled devices, as shown in Figure 3-5.
Figure 3-5. Giga Port LEDs
Table 3-2 describes the LED indications for the Gigabit ports:
Table 3-2. Giga Port s on non-PoE-enabled Devices LEDs
LED Color Description
LNK Green Flashing Link is up and the port is either transmitting
or receiving at 1000 Mbs.
Yellow Flashing Link is up and the port is either transmitting
or receiving data at 100 Mbps.
Solid green
Solid amber
Link is up high speed.
Link is up at lower speeds.
OFF The port is currently not operating.
ACT Green Flashing There is activity on the port.
Off There is no activity on the port.
LNK ACT/PoE
LNK ACT/PoEDell PowerConnect 55xx Systems User Guide 43
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Table 3-3 describes the LED indications for Gigabit ports on PoE-enabled
devices.
HDMI Port LEDs
The HDMI ports have a Speed/link (LNK) LED on their left side and an
activity (ACT) LED on their right side.
Table 3-4 describes the HDMP port LEDs:
Table 3-3. Giga Port s on PoE-enabled Devices LEDs
LED Color Description
LNK Flashing green Link is up and the port is either transmitting or
receiving at 1000 Mbs.
Flashing amber Link is up and the port is either transmitting or
receiving data at 100 Mbps.
Solid green
Solid amber
Link is up high speed.
Link is up at lower speeds.
Off Port is currently not operating.
PoE Flashing green There is activity on the port and the PoE is off.
Flashing amber There is activity on the port and the PoE is on.
Amber solid There is no activity on the port and the PoE power is
on.
Off There is no activity on the port and the PoE is off.
Table 3-4. HDMI (Stacking) Port LEDs
LED Color Description
Speed/Link Solid green Port is linked to device.
Off Port is currently not operating.
ACT Flashing green Port is either transmitting or receiving.
Off Port is not transmitting or receiving.44 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGHardware.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
SFP LEDs
The SFP+ ports each have two LEDs, marked as LNK and ACT, associated
with them. Figure 3-5 describes these LEDs.
Stack ID LED
The front panel of the device contains a Stack ID panel used to display the
Unit ID for the Stack Master and members, as shown in Figure 3-2.
Power Supplies
The device has an internal power supply unit (AC unit) and a connector to
connect PowerConnect 5500/P devices to a PowerConnect EPS-470 unit, or
to a PowerConnect MPS-600 unit.
The PowerConnect 5500/P devices have the following internal power
supplies:
• 24 Port non-PoE devices — 54 Watt.
• 48 Port non-PoE devices — 100 Watt.
• 24/48 Port PoE devices — 600 Watt.
Operation with both power supply units is regulated through load sharing.
Power supply LEDs indicate the status of the power supply.
The AC power supply unit operates from 90 to 264 VAC, 47 to 63 Hz. The AC
power supply unit uses a standard connector. A LED, shown in Figure 3-3,
indicates whether the AC unit is connected.
When the device is connected to a supplementary power source, the
probability of failure in the event of a power outage decreases.
Table 3-5. SFP Port LEDs
LED Color Description
LNK Solid green Link is at highest speed.
Solid amber Link is at lowest speed.
Off Port is currently not linked.
ACT Flashing green Port is either transmitting or receiving.Template Last Updated - 2/7/2007Dell PowerConnect 55xx Systems User Guide 45
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
4
Stacking Overview
This section describes how the Stacking feature of the PowerConnect 5500
series functions.
It contains the following topics:
• Stack Overview
• Stack Members and Unit IDs46 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Stack Overview
The PowerConnect 5500 Stacking feature provides multiple switch
management through a single switch, so that all units in the stack are treated
as if they were a single switch. All stack members are accessed through the
management IP address, through which the stack is managed.
Each switch is a member in a stack, although the stack may consist of only a
single switch.
Up to eight units can be stacked.
This section covers the following topics:
• Stack Operation Modes
• Stacking Units
• Stack Topology
Stack Operation Modes
All stacks must have a Master unit, and may have a Master Backup unit. All
other units are connected to the stack as members (slaves).
A unit in the stack can be in one of the following modes:
• Stack Master — Runs the fully operational software of a switch. In
addition, it runs configures and manages all other units in the stack. All
protocols run in the context of the Master unit. It is responsible for
updating and synchronizing the Master Backup.
The Stack Master detects and reconfigures the ports with minimal
operational impact in the event of:
Unit failure
Inter-unit stacking link failure
Unit insertion
Unit removal
When the Master unit boots, or when inserting or removing a stack
member, the Master unit initiates a stacking discovering process. Dell PowerConnect 55xx Systems User Guide 47
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Slave Unit — Runs a slave version of the software that enables the
applications running on the Master’s CPU to control and manage the
resources of the slave unit.
• Master Backup — Runs as a slave unit, as described above, and in
addition, continuously monitors the existence and operation of the stack
master. If the master unit fails, the master-backup unit assumes the Master
Backup role.
Stacking Units
PowerConnect 5500 series switches use two HDMI 10G ports for stacking.
To connect the units in the stack:
1 Insert one end of an HDMI cable into the left-hand HDMI port on the
unit at the top of the stack and the other end into the right-hand HDMI
port of the unit immediately below it (this is called crossover).
2 Repeat this process until all units are connected.
3 (Optional) Connect the left-hand HDMI port of the unit at the bottom of
the stack to the right-hand HDMI port of the unit at the top of the stack.
This step provides increased bandwidth and redundancy.48 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The results of this process are shown in Figure .
Figure 4-1. Stacking Ring Topology
HDMI Ports
Front Panel
HDMI Ports
Front Panel
HDMI Ports
Front Panel
Front Panel
HDMI PortsDell PowerConnect 55xx Systems User Guide 49
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Stack Topology
The PowerConnect 5500 series systems operates in a ring or chain topology.
Ring Topology
In a ring topology all units in the stack are connected to each other, forming a
circle. Each unit in the stack accepts data and sends it to the unit to which it
is attached. The packet continues through the stack until it reaches its
destination. The system discovers the optimal path on which to send traffic.
Figure 4-1 shows units of a stack connected in a ring topology.
Stacking Failover Topology - Chain Topology
Difficulties occur when a unit in the ring becomes non-functional, or a link is
severed. In this case, the system automatically switches to a chain topology,
without any system downtime.
In chain topology, each unit in the stack is connected to neighboring unit
except for the last unit, which is not connected to any other unit.
In the chain topology, the stack continues to function as long as there is a
master- or backup-enabled unit in each segment of the stack.
When the ring topology is switched to chain topology, an SNMP message is
automatically generated, but no stack management action is required. The
unit that failed must be repaired to restore full stacking operation in the ring
topology.
After the stacking issues are resolved, the units can be reconnected without
interruption, and the ring topology is restored.
Stack Members and Unit IDs
This section describes how to configure the stack.
It contains the following topics:
• Adding a Unit to the Stack
• Assigning Unit IDs
• Selecting the Master and Master Backup Units
• Switching from the Master to the Master Backup
• Replacing Stacking Members50 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Loading Software onto Stack Members
• Rebooting the Stack
• Managing Configuration Files on the Stack
Adding a Unit to the Stack
The recommended procedure to add a unit to a stack is as follows:
1 Place the powered-off unit in its physical place in the stack, and insert the
stacking link in the unit (but do not connect it to the rest of the stack).
2 Power up the unit, and set the correct Unit ID, as described below.
3 Reboot the unit and connect it to the rest of the stack through the stack
link.
Assigning Unit IDs
Each unit in the stack has a unique ID that defines the unit’s position and
function in the stack, as shown in Figure 3-2.
The unit that is assigned Unit ID 1 is the Master unit, by default. The unit
that is assigned Unit ID 2 is the Master Backup unit.
When you power-up the stack, each unit is assigned a unique Unit ID. This is
displayed on the front panel of the unit, as shown in Figure 3-2.
The Unit ID of each unit can be either automatically assigned or manually
assigned, as described in step 1 to step 4 below.
To assign IDs to the units in the stack, do the following for each unit in the
stack:
1 Connect the unit to the terminal.Dell PowerConnect 55xx Systems User Guide 51
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Turn on the unit to begin auto boot and press Return or Esc to abort and
enter the Start Up menu.
3 Select Stack Menu to open the Stack Menu.
4 Select Set Unit Stack ID. Enter either a Unit ID for manual assignment or
0 to indicate that the unit ID will be assigned automatically.
NOTE: The entire stack should be connected, as shown in Figure 4-1, before
powering up the units.
Selecting the Master and Master Backup Units
A unit is master-enabled if it assigned Unit ID 1 and Unit 2. All other units in
the stack (slaves) have unit IDs of 3-8.
The stack master assignment is performed during the configuration boot
process. One master-enabled stack member is elected as Master, and the
other master-enabled stack member is selected as Master Backup, according
to the following decision process:
• A master is selected from the set of the two Master-enabled units. Priority
is given to the lowest unit ID, but also takes into account the amount of
time the unit is UP (Up Time) as follows:
Startup Menu
[1]Download Software
[2]Erase Flash File
[3]Password Recovery Procedure
[4]Set Terminal Baud-Rate
[5]Stack Menu
[6]Back
[1]Show Unit Stack ID
[2]Set Unit Stack ID
[3]Back52 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– When a master-enabled unit is inserted to a running stack, (or when
Master and Backup master both start at the same time), they
exchange each other’s UP TIME (the time since they powered up). If
the time difference is smaller than 10 minutes, the unit with the
lowest unit ID is elected; otherwise, the unit with the longest UP time
is elected.
– If a Master-enabled unit (with ID 1 or 2) is inserted into an
operational stack, it will be elected as a backup master.
– If a Master unit and/or a backup Master unit is removed from the
stack and the user wishes to configure one of the slave units
(numbered 3-8) to be a Master backup, the user must reset the unit’s
ID. This can be done as follows:
• If there is a Master-enabled unit in the stack: Do -switch n
renumber 2 (through CLI or GUI). This makes the nth unit a
master-enabled unit.
• If there is no Master-enabled unit in the stack: Press the reset
button on the unit to be master-enabled, and assign it a unit ID=
1 using the boot menu.
• The user can force a master-enabled unit to be the master unit of the
stack, even if the master election process did not select it. This is done by
switching over to the backup unit.
NOTE: Two stacking member are considered the same age if they were
inserted within a ten minute interval, for example, if Unit 2 is inserted in the
first minute of a ten-minute cycle, and Unit 1 is inserted in fifth minute of the
same cycle, the units are considered to be the same age.
NOTE: If two stack members are discovered to have the same Unit ID, only
the older unit is included in the stack. The stack continues to function and a
message is sent notifying that a unit failed to join the stack.
The Stack Master and the Master Backup maintain a Warm Standby. The
Warm Standby ensures that the Master Backup takes over for the Stack
Master if a failover occurs, so that the stack continues to operate normally.
During the Warm Standby, the Master and the Master Backup are
synchronized with the static configuration. When the Stacking Master is
configured, it must synchronize the Master Backup. The dynamic Dell PowerConnect 55xx Systems User Guide 53
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
configuration is not saved, for example, dynamically-learned MAC addresses
are not saved, but dynamic information is learned quickly and automatically
by network traffic.
Switching from the Master to the Master Backup
The Master Backup replaces the Stack Master if one or more of the following
events occur:
• The Stack Master fails or is removed from the stack.
• Links from the Stack Master to the stacking members fails.
• User performs soft switchover via the Web interface or the CLI.
Switching between the Stack Master and the Master Backup results in limited
service loss. Dynamic tables are relearned if a failure occurs. The Running
Configuration file is synchronized between Stack Master and the Master
Backup, and continues running on the Master Backup.
Replacing Stacking Members
If a unit is removed from the stack, and replaced with a unit with the same
unit ID, the stack member is configured with the original unit configuration.
Otherwise, if the new unit has either more or fewer ports than the previous
unit, the results depend on the device type of the new and original units, as
defined in Table 4-1:
Table 4-1. Port Configurations when Replacing Units
New Unit Original Unit New Port Configuration
5548P or 5548 5548P or 5548 Port configurations remain the same.
5524 or 5524P The first 24 Giga (GE) ports receive the
respective 5524/P 24 GE port
configurations. The 10 G port
configurations remain the same. 54 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Loading Software onto Stack Members
Software can be downloaded to all units simultaneously, or to the master unit
alone. If software is only loaded to the master unit, when new software is
selected, and the Master is rebooted, the Master updates the software on the
remaining units.
In this way, all units in the stack run the same software version.
Rebooting the Stack
Whenever a reboot occurs, topology discovery is performed, and the Master
learns all units IDs in the stack.
Configuration files are changed only through explicit user configuration, and
are not automatically modified when units are added, removed or reassigned
unit IDs.
Each time the system reboots, the Startup Configuration file in the Master
unit is used to configure the stack.
Managing Configuration Files on the Stack
The Startup Configuration and Running Configuration file are stored on the
stack master.
Each port in the stack is referenced in the configuration files by its port type
and unit ID/0/port number, for example "gi1/0/24", which means Giga port 24
on unit 1 (the middle 0 is reserved for future use).
Configuration files are managed from the Stack Master, including:
• Saving to flash memory
5524P or 5524 5548P or 5548 The PowerConnect 5524/P 24 Gigabit
ports receives the first 24 Giga 5548/P port
configurations. The 10 Giga port
configurations remain the same. The
remaining ports receive the default port
configuration.
5524P or 5524 Port configurations remain the same.
Table 4-1. Port Configurations when Replacing Units (Continued)
New Unit Original Unit New Port ConfigurationDell PowerConnect 55xx Systems User Guide 55
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Uploading configuration files to an external TFTP server/HTTP client
• Downloading configuration files from an external TFTP server/HTTP
client
• Download/upload through the USB port
NOTE: Stack configuration for all configured ports is saved, even if the stack
is reset and/or the ports are no longer present.56 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStacking.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLYTemplate Last Updated - 2/7/2007Dell PowerConnect 55xx Systems User Guide 57
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
5
Configuring the Switch
This section describes the configuration that must be performed after the
switch is installed and connected to power supplies. Additional advanced
functions are described in "Advanced Switch Configuration" on page 67.
NOTE: Before proceeding further, read the release notes for this product. You can
download the release notes from the Dell Support website at support.dell.com.
NOTE: We recommend that you obtain the most recent revision of the user
documentation from the Dell Support website at support.dell.com.
It contains the following topics:
• Configuration Work Flow
• Connecting the Switch to the Terminal
• Booting the Switch
• Configuring the Stack
• Configuration Using the Setup Wizard58 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuration Work Flow
To configure the switches:
1 For each switch in the stack:
a Connect it to a terminal, as described in the "Connecting the Switch
to the Terminal" on page 59.
b Boot the switch, as described in the "Booting the Switch" on page 60.
c Assign a unit ID to the switch, as described in "Assigning Unit IDs" on
page 50.
2 Connect the units in the stack to each other, as described in "Configuring
the Stack" on page 61.
3 Connect the Master unit to the terminal, reboot the unit and the Setup
Wizard is run automatically, as described in "Configuration Using the
Setup Wizard" on page 61.
4 Respond to the Setup Wizard prompts.
5 Continue managing the switch, either through the console or Telnet, using
the CLI or the web GUI.Dell PowerConnect 55xx Systems User Guide 59
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Connecting the Switch to the Terminal
The switch is configured and monitored through a terminal desktop system
that runs terminal emulation software. The switch connects to the terminal
through the console port.
To connect the switch to a terminal:
1 Connect an RS-232 cable to a VT100-compatible terminal or the serial
connector of a desktop system running terminal emulation software.
2 Connect the RS-232 cable to the switch console port on the front panel of
the switch (see Figure 5-1) using an 8-pin RJ-45 male connector.
Figure 5-1. Front-Panel Console Port
3 Set the terminal emulation software as follows:
a Select the appropriate serial port to connect to the switch.
b Set the data rate to 9600 baud.
c Set the data format to 8 data bits, 1 stop bit, and no parity.
d Set Flow Control to none.
e Select VT100 for Emulation mode within your communication
software.
f Select Terminal keys for Function, Arrow, and Ctrl keys. Ensure that
the setting is for Terminal keys (not Windows keys).
NOTE: You can connect a console to the console port on any unit in the stack, but
stack management is performed only from the stack master (Unit ID 1 or 2).
Console Port60 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Booting the Switch
After the local terminal is connected, turn on power. The switch then goes
through power-on self-test (POST). POST runs every time the switch is
started and checks hardware components, to determine if the switch is
operational before completely booting. If the system detects a critical
problem, the boot process stops. If POST passes successfully, a valid
executable image is loaded into RAM. POST messages are displayed on the
terminal and indicate test success or failure.
The boot process runs for approximately 40-45seconds.
When the boot process completes, the following LEDs are lit, as shown in
Figure 5-2:
• Power
• Status
• Fan (should be green)
• RPS (if it is being used)
Figure 5-2. Initial LEDs
Power Status
Fan
RPSDell PowerConnect 55xx Systems User Guide 61
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring the Stack
The switch is always considered to be a stack of switches even if the stack only
contains a single switch. If there is more than one switch in the stack, each
switch must be configured individually. See "Assigning Unit IDs" on page 50
for instructions on how to configure the stack.
Configuration Using the Setup Wizard
The Setup Wizard guides you through the initial switch configuration to get
the system up and running as quickly as possible. Note that you can skip the
Setup Wizard and configure the switch manually through the CLI.
The Setup Wizard configures the following fields:
• SNMP Community String and SNMP Management System IP address
(optional)
• Username and password
• Management switch IP address
• IP subnet mask
• Default gateway IP address
NOTE: The Setup Wizard assumes the following:
• The PowerConnect switch was never configured before and is in the same
state as when you received it.
• The PowerConnect switch booted successfully.
• The console connection is established and the console prompt is displayed on
the screen of a VT100 terminal switch.
Connect the Master unit to a terminal. You can identify the Master unit by
the illuminated Master LED on the front panel of the switch (see Figure 3-2).
To configure the system using the Setup Wizard:
1 Obtain the following information from the network administrator:
• SNMP Community String and SNMP Management System IP
address (optional)
• Username and password62 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• The IP address to be assigned to the VLAN 1 interface through which
the switch is to be managed (by default, every external and internal
port is a member of the VLAN 1)
• The IP subnet mask for the network
• The default gateway (next hop router) IP address for configuring the
default route
2 Boot the Master unit. The system automatically prompts you to use the
Setup Wizard.
The Setup Wizard displays the following information:
Welcome to Dell Easy Setup Wizard
The Setup Wizard guides you through the initial
switch configuration and gets you up and running
easily and quickly. You can skip the Setup Wizard
and enter CLI mode to manually configure the
switch. The system will prompt you with a default
answer; by pressing Enter, you accept the default
value.
You must respond to the next question to run the
Setup Wizard within 60 seconds, otherwise the
system will continue with normal operation using
the default system configuration.
Would you like to enter the Setup Wizard (you must
answer this question within 60 seconds)? (Y/N)
3 Enter [Y] to run the wizard. If you enter [N] or if you do not respond
within 60 seconds, the Setup Wizard automatically exits and the CLI
console prompt appears.
If you enter [Y] the wizard provides interactive guidance through the
initial switch configuration.
The following information is displayed:
You can exit the Setup Wizard at any time by
entering [ctrl+Z].
The system is not set up for SNMP management by
default. Dell PowerConnect 55xx Systems User Guide 63
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To manage the switch using SNMP (required for Dell
Network Manager) you can:
• Setup the initial SNMP version 2 account now.
• Return later and set up the SNMP version account.
For more information on setting up a SNMP version
2 account, see the user documentation.
Would you like to set up the SNMP management
interface now? [Y/N]
4 Enter [N] to skip to Step 7 or enter [Y] to continue the Setup Wizard. If
you enter [Y] the following information is displayed:
To set up the SNMP management account you must
specify the management system IP address and the
"community string" or password that the particular
management system uses to access the switch. The
wizard automatically assigns the highest access
level [Privilege Level 15] to this account.
You can use Dell Network Manager or other
management interfaces to change this setting later
and to add additional management system later. For
more information on adding management systems, see
the user documentation.
To add a management station:
Please enter the SNMP community string to be used:
5 Enter the SNMP community string. You can use the default name "public"
Please enter the IP address of the Management
System (A.B.C.D) or wildcard (0.0.0.0) to manage
from any Management Station:[0.0.0.0].
6 Enter the SNMP Management System IP.
7 Set up user account privilege level, as follows:
The following information is displayed:
Now we need to set up your initial privilege
(Level 15) user account. This account is used to
login to the CLI and Web interface. You may set up 64 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
other accounts and change privilege levels later.
For more information on setting up user accounts
and changing privilege levels, see the user
documentation.
To set up a user account:
Enter the user name:
Please enter the user password:
Please reenter the user password:
8 Enter the following:
• User name, for example "admin"
• Password and password confirmation.
9 Press Enter.
The following information is displayed:
Next, an IP address is setup. The IP address is
defined on the default VLAN (VLAN 1). This is the
IP address you use to access the Telnet, Web
interface, or SNMP interface for the switch.
To set up an IP address:
Please enter the IP address of the device
(A.B.C.D):
Please enter the IP subnet mask (A.B.C.D or nn):
10 Enter the management IP address and IP subnet mask, for example
192.168.2.100 as the IP address and 255.255.255.0 as the IP subnet mask.
11 Press Enter.
The following information is displayed:
Finally, set up the default gateway.
Please enter the IP address of the gateway from
which this network is reachable
(e.g. 192.168.2.1).Default gateway
(A.B.C.D):[0.0.0.0] Dell PowerConnect 55xx Systems User Guide 65
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
12 Enter the default gateway.
13 Press Enter. The following is displayed (example):
This is the configuration information that has
been collected:
SNMP Interface = "Dell Network
Manager"@192.168.2.10
User Account setup = admin
Password = **********
Management IP address = 192.168.2.100
255.255.255.0
Default Gateway = 192.168.2.1
The following information is displayed:
If the information is correct, please select (Y)
to save the configuration and copy to the start-up
configuration file. If the information is
incorrect, select (N) to discard configuration and
restart the wizard: [Y/N]
14 Enter [N] to restart the wizard or enter [Y] to complete the Setup Wizard.
If you enter [Y] the following is displayed:
Configuring SNMP management interface.
Configuring user account.......
Configuring IP and subnet......
Thank you for using Dell Easy Setup Wizard. You
will now enter CLI mode.
The CLI prompt is displayed. You have finished the initial configuration.
After the initial configuration is complete, you can manage the switch from
the connected console port using the CLI or remotely through the
management interface, using Telnet or the Web GUI. See the Dell
PowerConnect 5500 Series User Guide found on the Documentation CD.66 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUG_InitialConfiguration_gsg.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLYDell PowerConnect 55xx Systems User Guide 67
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
6
Advanced Switch Configuration
This section describes how to perform various configuration operations
through the CLI.
It includes the following topics:
• Using the CLI
• Accessing the Device Through the CLI
• Retrieving an IP Address
• Security Management and Password Configuration
• Configuring Login Banners
• Startup Menu Procedures
• Software Download68 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Using the CLI
This section provides some general information for using the CLI.
For a complete description of CLI commands, refer to the Dell
PowerConnect 55xx Systems CLI Reference Guide.
Command Mode Overview
The CLI is divided into command modes, each with a specific command set.
Entering a question mark at the terminal prompt displays a list of commands
available for that particular command mode.
In each mode, a specific command is used to navigate from one mode to
another.
These modes are described below.
User EXEC Mode
During CLI session initialization, the CLI is in User EXEC mode. Only a
limited subset of commands is available in User EXEC mode. This level is
reserved for tasks that do not change the terminal configuration and is used
to access configuration sub-systems.
After logging into the device, User EXEC command mode is enabled. The
user-level prompt consists of the host name followed by the angle bracket
(>). For example: console>
NOTE: The default host name is console unless it has been modified during
initial configuration.
The User EXEC commands enable connecting to remote devices, changing
terminal settings on a temporary basis, performing basic tests, and listing
system information.
To list the User EXEC commands, enter a question mark at the command
prompt.
To enter the next level, Privileged EXEC mode, a password is required (if
configured).
Privileged EXEC Mode
Privileged EXEC mode provides access to the device global configuration. Dell PowerConnect 55xx Systems User Guide 69
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Privileged access can be protected, to prevent unauthorized access and to
secure operating parameters. Passwords are displayed on the screen, and are
case-sensitive.
NOTE: The enable command is only necessary if you login with privilege level less
than 15.
To access and list the Privileged EXEC mode commands:
1 At the prompt type enable and press .
2 When a password prompt displays, enter the password and press
.
The Privileged EXEC mode prompt displays as the device host name
followed by #. For example: console#
To list the Privileged EXEC commands, type a question mark at the
command prompt.
To return from Privileged EXEC mode to User EXEC mode, type disable
and press .
The following example illustrates accessing privileged EXEC mode and then
returning to the User EXEC mode:
Use the exit command to return to a previous mode.
To configure the device, enter the next level, Global Configuration mode.
Global Configuration Mode
The Global Configuration mode manages device configuration on a global
level. Global Configuration commands apply to system features, rather than a
specific protocol or interface.
console> enable
Enter Password: ******
console#
console# disable
console>70 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To access Global Configuration mode, at the Privileged EXEC Mode prompt,
type configure and press . The Global Configuration mode displays
as the device host name followed by (config) and the pound sign #.
To list the Global Configuration commands, enter a question mark at the
command prompt.
The following example illustrates how to access Global Configuration mode
and return back to the Privileged EXEC mode:
Interface Configuration Mode
The Interface Configuration mode configures the device at the physical
interface level (port, VLAN, or LAG). Interface commands that require
subcommands have another level, called the Subinterface Configuration
mode. A password is not required to access this level.
The following example, places the CLI in Interface Configuration mode on
port 1/0/1. The sntp command is then applied to that port.
To run a command in a mode, which does not contain it, use do before the
command, as in the following example:
console# configure
console(configure)#
console#
console# configure
console(config)# exit
console#
console# configure
console(config)# interface gi1/0/1
console(config-if)# sntp client enable
console# configure
console(config)# interface gi1/0/1
console(config-if)# sntp client enable
console(config-if)# do show sntp configurationDell PowerConnect 55xx Systems User Guide 71
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Accessing the Device Through the CLI
You can manage the device using CLI commands, over a direct connection to
the terminal console, or via a Telnet connection.
Direct Connection
Connect the device to the console and enter the CLI commands upon
receiving a prompt.
Telnet Connection
Telnet is a terminal emulation TCP/IP protocol. RS-232 terminals can be
virtually connected to the local device through a TCP/IP protocol network.
Telnet is an alternative to a local login terminal, where a remote login is
required.
The device supports up to four simultaneous Telnet sessions. All CLI
commands can be used over a Telnet session.
If access is via a Telnet connection, ensure that the device has an IP address
and that software has been downloaded to the device.
To start a Telnet session:
1 Select Start > Run.
The Run window opens.
2 Type cmd.
The cmd window opens.
3 In the cmd window, type Telnet .
The Telnet session begins.72 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Retrieving an IP Address
Receiving an IP Address from a DHCP Server
When using the DHCP protocol to retrieve an IP address, the device acts as a
DHCP client. When the device is reset, the DHCP command is saved in the
configuration file, but the IP address is not.
To retrieve an IP address from a DHCP server, perform the following steps:
1 Select and connect any port to a DHCP server or to a subnet that has a
DHCP server on it.
2 Type the following commands to use the selected port for receiving the IP
address.
a Assigning dynamic IP Addresses on a port:
b Assigning a dynamic IP Addresses on a VLAN:
The interface receives the IP address automatically.
console# configure
console(config)# interface gi1/0/1
console(config-if)# ip address dhcp
console# configure
console(config)# interface vlan 1
console(config-if)# ip address dhcpDell PowerConnect 55xx Systems User Guide 73
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 To verify the IP address, type show ip interface at the system prompt, as
shown in the following example.
When configuring/receiving IP addresses through DHCP and BOOTP (an
older version of DHCP), the configuration received from these servers
includes the IP address and may include the subnet mask and default
gateway.
NOTE: It is not necessary to delete the device configuration to retrieve an IP
address from the DHCP server.
NOTE: When copying configuration files, avoid using a configuration file that
contains an instruction to enable DHCP on an interface that connects to the same
DHCP server, or to one with an identical configuration. In this instance, the device
retrieves the new configuration file and boots from it. The device then enables
DHCP, as instructed in the new configuration file, and the DHCP instructs it to reload
the same file.
NOTE: If you configure a DHCP IP address, this address is dynamically retrieved,
and the ip address dhcp command is saved in the configuration file. In the event of
master failure, the backup will again attempt to retrieve a DHCP address. This could
result in one of the following:
• The same IP address may be assigned.
• A different IP address may be assigned, which could result in loss of
connectivity to the management station.
• The DHCP server may be down, which would result in IP address retrieval
failure, and possible loss of connectivity to the management station.
Receiving an IP Address From a BOOTP Server
The standard BOOTP protocol is supported and enables the device to
automatically download its IP host configuration from any standard BOOTP
server in the network. In this case, the device acts as a BOOTP client.
console# show ip interface
IP Address I/F Type Directed Precedence Status
Broadcast
----------------- --------- -------- -------- -------- -----
0.0.0.0/32 gi2/0/1 DHCP disable No Valid
10.5.234.232/24 vlan 1 Static disable No Valid74 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To retrieve an IP address from a BOOTP server:
1 Select and connect any port to a BOOTP server or subnet containing such
a server.
2 At the system prompt, enter the delete startup configuration command to
delete the Startup Configuration from flash.
The device reboots with no configuration and in 60 seconds starts sending
BOOTP requests. The device receives the IP address automatically.
NOTE: When the device reboot begins, any input at the ASCII terminal or keyboard
automatically cancels the BOOTP process before completion and the device does
not receive an IP address from the BOOTP server.
The following example illustrates the process:
To display the IP address, enter the show ip interface command.
The device is now configured with an IP address.
console> enable
console# delete startup-config
Startup file was deleted
console# reload
You haven’t saved your changes. Are you sure you want to
continue (Y/N) [N]?
This command will reset the whole system and disconnect
your current session. Do you want to continue (Y/N) [N]?
************************************************
/* the device reboots */Dell PowerConnect 55xx Systems User Guide 75
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Security Management and Password
Configuration
System security is handled through the Authentication, Authorization, and
Accounting (AAA) mechanism that manages user access rights, privileges,
and management methods. AAA uses both local and remote user databases.
Data encryption is handled through the SSH mechanism.
Passwords can be configured for the following services:
• Terminal
• Telnet
• SSH
• HTTP
• HTTPS
NOTE: When creating a user name, the default priority is 1, which provides access
but not configuration rights. A priority of 15 must be set to enable access and
configuration rights to the device. Although user names can be assigned privilege
level 15 without a password, it is recommended to always assign a password. If
there is no specified password, privileged users can access the Web interface with
any password.
NOTE: Passwords can be secured by using password management commands to
force aging out of passwords, or expiration of passwords. For more information, see
"Management Security" on page 261.
Initial Configuration and Password Recovery
The system is delivered without a default password, and all passwords must be
defined by the user. If a user-defined password is lost, a password recovery
procedure can be invoked from the Startup menu. This procedure is
applicable for the local terminal only and enables a single access to the device
from the local terminal with no password entered.
The full mode of password recovery mechanism can be enabled/disabled
through the CLI (service password-recovery command).
This affects password recovery in the following way:
• Enabled: When the password-recovery mechanism is invoked, one-time
access to the device without a password is enabled and all configuration
and user files are retained.76 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Disabled: When the password-recovery mechanism is invoked, one-time
access to the device without a password is stilled enabled, however all
configuration files (startup and backups) are removed and the following
log message is generated to the terminal after boot process completed: “All
configuration and user files were removed”
Configuring an Initial Terminal Password
To configure an initial terminal password, enter the following commands:
Configuring an Initial Telnet Password
To configure an initial Telnet password, enter the following commands:
console(config)# aaa authentication login default line
console(config)# aaa authentication enable default line
console(config)# line console
console(config-line)# login authentication default
console(config-line)# enable authentication default
console(config-line)# password george
console(config)# aaa authentication login default line
console(config)# aaa authentication enable default line
console(config)# line telnet
console(config-line)# login authentication default
console(config-line)# enable authentication default
console(config-line)# password bobDell PowerConnect 55xx Systems User Guide 77
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring an Initial SSH Password
To configure an initial SSH password, enter the following commands:
Configuring an Initial HTTP Password
To configure an initial HTTP password, enter the following commands:
Configuring an Initial HTTPS Password
To configure an initial HTTPS password, enter the following commands:
Enter the following commands once when configuring use of a terminal, a
Telnet, or an SSH session, for an HTTPS session.
NOTE: In the Web browser, enable SSL 2.0 or greater for the page content to be
displayed.
NOTE: HTTP and HTTPS services require privilege level 15 access and connect
directly to the configuration level access.
console(config)# aaa authentication login default line
console(config)# aaa authentication enable default line
console(config)# line ssh
console(config-line)# login authentication default
console(config-line)# enable authentication default
console(config-line)# password jones
console(config)# ip http authentication aaa loginauthentication local
console(config)# username admin password user1 privilege
15
console(config)# ip http authentication aaa loginauthentication local
console(config)# username admin password user1 privilege
15
console(config)# crypto certificate 1 generate keygenerate
console(config)# ip http secure-server78 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring Login Banners
Banners can be defined for each line, such as console and telnet) or for all
lines. They are disabled by default.
The following types of banners can be defined:
• Message-of-the-Day Banner (motd) — Displayed when the user connects
to the device, before login. The following defines a message-of-the-day for
the console:
console# configure
console(config)# line console
console(config-line)# motd-banner
console(config-line)# exit
console (config)# banner motd *
Welcome*
console# do show banner motd
Welcome
Would you like to enable this banner to all lines?
(Y/N)[Y] Y
console(config)#Dell PowerConnect 55xx Systems User Guide 79
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Login Banner— Displayed after the Message-of-the-Day Banner, and
before the user has logged in. The following defines a login banner for the
console:
• Exec Banner — Displayed after successful login (in all privileged levels
and in all authentication methods). The following defines an exec banner
for the console:
console# configure
console(config)# line console
console(config-line)# login-banner
console(config-line)# exit
console (config)# banner login *
Please log in*
console# do show banner login
Would you like to enable this banner to all lines?
(Y/N)[Y] Y
Please log in
console# configure
console(config)# line console
console(config-line)# exec-banner
console(config-line)# exit
console (config)# banner exec *
Successfully logged in*
Would you like to enable this banner to all lines?
(Y/N)[Y] Y
console# do show banner exec
Successfully logged in80 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Startup Menu Procedures
The Startup menu enables performing various tasks, such as software
download, flash handling and password recovery.
You can enter the Startup menu when booting the device. User input must be
entered immediately after the POST test.
To enter the Startup menu:
• Turn the power on. After the auto-boot messages appear, the following
menu is displayed:
The following sections describe the available Startup menu options.
NOTE: When selecting an option from the Startup menu, take time-out into
account. If no selection is made within 10 seconds (default), the device times out.
This default value can be changed through the CLI.
Download Software - Option[1]
The software download procedure is used to replace corrupted files or
upgrade system software, when the device does not have IP connectivity or
when both software images of the device are corrupted and therefore you
cannot use the web-based management system.
NOTE: it is highly recommended that, before loading via xmodem, the baud rate of
the device and terminal be set to 115200.
Startup Menu
[1]Download Software
[2]Erase Flash File
[3]Password Recovery Procedure
[4]Set Terminal Baud-Rate
[5]Stack menu
[6]BackDell PowerConnect 55xx Systems User Guide 81
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To download software through the Startup menu:
1 From the Startup menu, press [1]. The following prompt is displayed:
2 When using the HyperTerminal, click Transfer on the HyperTerminal
Menu Bar and select Send File.
3 In the Filename field, enter the file path for the file to be downloaded.
4 Ensure that the Xmodem protocol is selected in the Protocol field.
5 Press Send. The software is downloaded.
NOTE: After software download, the device reboots automatically.
Erase FLASH File - Option[2]
In some cases, the device Startup Configuration file must be erased. If the
configuration is erased, all parameters configured via CLI, web-management
or SNMP must be reconfigured.
To erase the device configuration in the Startup Configuration file:
1 From the Startup menu, select [2]. The following message is
displayed:
Warning! About to erase a Flash file.
Are you sure (Y/N)?
2 Press Y. The following message is displayed.
Write Flash file name (Up to 8 characters, Enter for
none.):
3 Enter config ("config" is the standard name for the Startup configuration
file although you can use any name).
The following is displayed:
Downloading code using XMODEM
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
File config (if present) will be erased after system
initialization
======== Press Enter To Continue ========82 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The configuration is erased when the system is reset.
Password Recovery - Option[3]
If a password is lost, the Password Recovery procedure can be called from the
Startup menu. The procedure enables entry to the device a single time
without entering a password.
To recover a lost password when entering the local terminal only:
1 From the Startup menu, select [3].
2 Continue the regular startup by logging in without a password.
3 Enter a new password or press 'ESC' to exit.
NOTE: To ensure device security, reconfigure passwords for applicable
management methods.
Set Terminal Baud-Rate - Option[4]
To set the terminal baud-rate:
1 Type [4] and press .
2 Enter the new baud rate. The following is displayed:
Note that after this step, your terminal will no longer respond. Adjust your
terminal speed to the configured one.
Stack Menu - Option[5]
To configure the stack, type [5] and press .
For more information, see "Assigning Unit IDs" on page 50.
Set new device baud-rate: 38,400Dell PowerConnect 55xx Systems User Guide 83
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Software Download
This section contains instructions for downloading device software (system
and boot images) through a TFTP server or USB port. The TFTP server must
be configured before downloading the software.
Software Auto Synch in Stack
When several units are stacked, they must all run the same software version.
When a new slave device is inserted into the stack, it is first checked for
compatibility (meaning that the master can run firmware upgrade/downgrade
to the slave unit), and if found compatible, its boot and image software
versions are automatically updated with the Master’s. If the slave is found not
compatible, it is shutdown.
A SYSLOG message is sent when a master synchronizes a slave's software.
System Image Download
When the device boots, it decompresses the system image from the flash
memory area and runs it. When a new image is downloaded, it is saved in the
other area allocated for the other system image copy.
On the next boot, the device decompresses and runs the image from the
currently active system image.
A system image can be downloaded through a USB port or a TFTP server.
To download the system image from a TFTP server, ensure that an IP address
is configured on one of the device ports and pings can be sent to the TFTP
server. In addition, ensure that the file to be downloaded is saved on the
TFTP server.
To download a system image through the USB port or TFTP server:
1 Enter the show version command, to verify which software version is
currently running on the device. The following is an example of the
information that appears:
Unit SW version Boot version HW version
------ ------------------- ------------------- --------
2 1.0.0.24 1.0.0.11
console#84 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Enter the show bootvar command, to verify which system image is
currently active. The following is an example of the information that is
displayed:
3 Enter the one of the following commands to copy a new system image to
the current unit:
– copy {tftp://|usb://}{tftp address}/{file name}
image (current unit)
or
To copy a new system image to all units in the stack:
– copy tftp://{tftp address}/{file name}
unit://*/image
4 When the new image is downloaded, it is saved in the area allocated for
the other copy of system image (image-2, as shown in the example). The
following is an example of the information that appears:
Exclamation symbols indicate that a copying process is in progress. Each
symbol (!) corresponds to 512 bytes transferred successfully. A period
indicates that the copying process is timed out. Many periods in a row
indicate that the copying process failed.
console# show bootvar
Unit Image Filename Version Date Status
---- ----- --------- --------- --------------------- ---------
2 1 image-1 1.0.0.13 04-Aug-2010 08:27:30 Active*
2 2 image-2 1.0.0.12 29-Jul-2010 17:02:26 Not active
console#
console# copy tftp://176.215.31.3/file1.ros image
Accessing file ‘file1’ on 176.215.31.3Ö
Loading file1 from 176.215.31.3:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Copy took 00:01:11 [hh:mm:ss]Dell PowerConnect 55xx Systems User Guide 85
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
5 Select the image for the next boot by entering the boot system command.
After this command, enter the show bootvar command to verify that the
copy indicated as a parameter in the boot system command is selected for
the next boot.
The following is an example of the information that appears:
If the image for the next boot is not selected by entering the boot system
command, the system boots from the currently active image.
6 Enter the reload command. The following message is displayed:
7 Enter Y. The device reboots.
Boot Image Download
Loading a new boot image from the TFTP server or USB port, updates the
boot image. The boot image is loaded when the device is powered on. A user
has no control over the boot image copies.
To download a boot image through the TFTP server:
console# boot system image-2
console# show bootvar
Images currently available on the Flash
Image-1 active
Image-2 not active (selected for next boot)
console# reload
This command will reset the whole system and
disconnect your current session. Do you want to
continue (y/n) [n]?86 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdvanced Configuration.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
1 Enter the show version command to verify which software version is
currently running on the device. The following is an example of the
information that appears:
2 Enter the copy {tftp://|usb://}{tftp address}/{file
name} boot command to copy the boot image to the device. The
following is an example of the information that appears:
3 Enter the reload command. The following message is displayed:
4 Enter Y. The device reboots.
console# show version
Unit SW version Boot version HW version
----- -------------- ----------------- ----------
2 1.0.0.24 1.0.0.11
console#
console# copy tftp://50.1.1.7/contax-10014.ros image
01-Oct-2006 11:57:35 %COPY-I-FILECPY: Files Copy - source URL
tftp://50.1.1.7/contax-10014.ros destination URL flash://image
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
01-Sep-2010 11:57:38 %INIT-I-Startup: Cold Startup
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
01-Sep-2010 11:59:05 %COPY-N-: The copy operation was completed
successfully!
Copy: 5954757 bytes copied in 00:01:30 [hh:mm:ss]
console# reload
This command will reset the whole system and
disconnect your current session. Do you want to
continue (Y/N) [N]?Dell PowerConnect 55xx Systems User Guide 87
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
7
Using Dell OpenManage
Administrator
This section provides an introduction to the Dell OpenManage Switch
Administrator user interface.
It contains the following topics:
• Starting the Application
• Understanding the Interface
• Using the Switch Administrator Buttons
• Field Definitions
• Common GUI Features
• CLI Commands88 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Starting the Application
NOTE: Before starting the application the IP address must be defined. For more
information, see "Accessing the Device Through the CLI" on page 71.
1 Open a web browser.
2 Enter the device’s IP address in the address bar and press .
3 When the Log In window displays, enter a user name and password.
NOTE: Passwords are both case sensitive and alpha-numeric.
4 Click OK.
The Dell OpenManage Switch Administrator home page displays.
Understanding the Interface
The home page contains the following views:
• Tree view — Located on the left side of the home page, the tree view
provides an expandable view of the features and their components. The
branches in the tree view can be expanded to view all the components
under a specific feature, or retracted to hide the feature's components. By
dragging the vertical bar to the right, the tree area can be expanded to
display the full name of a component.
• Device View — Located in on the top center of the home page, the device
view provides information about device ports, current configuration and
status, table information, and feature components. For further
information, see "Device Representation" on page 89
• Components List — Located in the bottom center of the home page,
contains a list of the feature components. When a feature is expanded, the
GUI page for that feature is displayed.
• Information Buttons— Located at the top of the home page, provide
access to information about the device and access to Dell Support. For
more information, see "Information Buttons" on page 91.Dell PowerConnect 55xx Systems User Guide 89
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Device Representation
The home page contains a graphical representation of the units in the stack’s
front panels. Figure 7-1 displays the 5548 model, but the display for the other
models are similar.
Figure 7-1. PowerConnect Device Port Indicators
The graphic display on the home page displays the Unit ID and port
indicators that specify whether a specific port is currently active. Table 7-1
describes the port colors that are displayed and their meaning:
Table 7-1. Port Colors
NOTE: For more information about LEDs, see "LED Definitions" on page 40.
To configure a port double-click on its icon.
Only ports that are physically present are displayed in the PowerConnect
OpenManage Switch Administrator home page, and can be configured
through the web management system. Non-present ports can be configured
through the CLI or SNMP interfaces.
Port Representation
Ports are referred to in the notation: [gi/te]x/0/z, where:
Component Description
Amber The port is currently connected at 100 Mbps.
Green The port is currently connected at 1000 Mbps
Grey The port is currently disconnected
Stacking Unit ID
Giga Ports (odd numbered)
Giga Ports (even numbered)90 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• gi—Giga port
• te —Ten Giga port
• x — Unit ID
• z — Port numberDell PowerConnect 55xx Systems User Guide 91
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Using the Switch Administrator Buttons
This section describes the buttons found on the OpenManage Switch
Administrator interface.
Information Buttons
Table 7-2 describes the information buttons that provide access to online
support and online help, as well as information about the OpenManage
Switch Administrator interfaces. These are displayed at the top of each page.
Device Management Icons
Table 7-3 describes the device management buttons.
Table 7-2. Information Buttons
Button Description
Support Opens the Dell Support page at support.dell.com
About Contains the version and build number and Dell copyright
information.
Logout Opens the Log Out window.
Table 7-3. Device Management Icons
Button Icon Description
Apply&Save Saves changes to the Running and Startup Configuration
files.
Help Open online help. The online help pages are
context-sensitive. For example, if the IP Addressing page is
open, the help topic for that page is displayed when Help is
clicked.
Print Prints the Network Management System page and/or table
information.92 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Refresh Refreshes device information from the Running
Configuration file.
Table 7-3. Device Management Icons (Continued)Dell PowerConnect 55xx Systems User Guide 93
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Field Definitions
Fields that are user-defined can contain between 1–159 characters, unless
otherwise noted on the OpenManage Switch Administrator web page. All
letters or characters can be used, except the following: "\ / : * ? < >"
Common GUI Features
Table 7-4 describes the common functions that can be performed on many
GUI pages.
Table 7-4. Common GUI Elements
Button Description
Apply Save changes entered in GUI page to the Running
Configuration file.
Back Go to previous page.
Cancel Cancel changes entered in GUI page.
Clear All Counters Delete counters.
Clear Counters Delete selected counters.
Clear Log Delete entries from log.
Clear Statistics Delete statistics.
Copy parameters
from
Copy the parameters from a selected row to the selected
target rows.
Copy parameters
from port
Copy the parameters from a selected port to the selected
target ports.
Details Shows further details relevant to the current page.
Next Go to next page.
Query Run a query after query criteria have been entered.
Remove Remove checked elements in the page. If Select All is
selected, all elements are removed.
Reset All Counters Delete all counters.
Restore Defaults Restores parameters entered in page to default values.94 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
GUI Terms
Each GUI page in the tree view is described in the following sections. A brief
introduction is provided along with steps specifying how to enter information
in the page. The following terms are used:
• Enter — Indicates that information may be entered in the field. It does
not imply that the field is mandatory.
• Select —Indicates that information may be selected from a drop-down list
or from radio buttons.
• Displays —Indicates that the field is display only.
CLI Commands
There are certain command entry conventions that apply to all commands.
The following table describes these conventions.
Table 7-5. Common GUI Elements
Telnet Opens a Telnet window. This only works in the Explorer 6 and
Firefox browsers.
Button Description
[ ] In a command line, square brackets indicate an optional
entry..
{ } In a command line, curly brackets indicate a selection of
compulsory parameters separated by the | character. One
option must be selected. For example: flowcontrol
{auto|on|off} means that for the flowcontrol command
either auto, on, or off must be selected.
Italic Font Indicates a parameter value.
Bold Italic Font Indicates a parameter key word.
Any individual key on the keyboard. For example click
.
Table 7-4. Common GUI Elements (Continued)
Button DescriptionDell PowerConnect 55xx Systems User Guide 95
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Ctrl+F4 Any combination of keys clicked simultaneously, for example:
Ctrl and F4.
Screen Display Indicates system messages and prompts appearing on the
console.
all When a parameter is required to define a range of ports or
parameters and all is an option, the default for the command
is all when no parameters are defined. For example, the
command interface range port-channel has the option of
either entering a range of channels, or selecting all. When the
command is entered without a parameter, it automatically
defaults to all.
Button Description96 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGAdmin.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLYDell PowerConnect 55xx Systems User Guide 97
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
8
Network Security
This section describes the various mechanisms for providing security on the
switch.
It contains the following topics:
• Port Security
• ACLs
• ACL Binding
• Proprietary Protocol Filtering
• Absolute Time Range
• Time Range Recurrence
• Dot1x Authentication98 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port Security
Network security can be enhanced by limiting access on a port to users with
specific MAC addresses. The MAC addresses can be dynamically learned, or
they can be statically configured.
Port security has the following modes:
• Classic Lock — Locked port security monitors both received and learned
packets that are received on specific ports. Access to the locked port is
limited to users with specific MAC addresses. These addresses are either
manually defined on the port, or learned on that port before it was locked.
• Limited Dynamic Lock — When a packet is received on a locked port,
and the packet’s source MAC address is not tied to that port (either it was
learned on a different port, or it is unknown to the system), a protection
mechanism, which provides various options is invoked. Unauthorized
packets arriving to a locked port are either:
– Forwarded
– Discarded with no trap
– Discarded with a trap
– The port is shutdown
Locked port security enables storing a list of MAC addresses in the
configuration file. The MAC addresses are restored when the device is reset.
Disabled ports can be activated from the Port Configuration page. Dell PowerConnect 55xx Systems User Guide 99
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To configure port security:
1 Click Switching > Network Security > Port Security to display the Port
Security: Summary page.
Figure 8-1. Port Security: Summary
Security parameters are displayed for all ports or LAGs, depending on the
selected interface type.
2 To modify the security parameters for a port, select it, and click Edit.
3 Enter the following fields:
– Interface — Select the interface to be configured.
– Current Port Status — Displays the current port status.
– Set Port — Select to either lock or unlock the port.
– Learning Mode — Set the locked port type. The Learning Mode field
is enabled only if Locked is selected in the Set Port field. The possible
options are:
• Classic Lock — Locks the port using the classic lock mechanism.
The port is immediately locked, regardless of the number of
addresses that have already been learned. 100 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Limited Dynamic Lock — Locks the port by deleting the
dynamic MAC addresses associated with the port. The port learns
up to the maximum addresses allowed on the port. Both
relearning and aging MAC addresses are enabled.
– Max Entries (0-128) — Enter the maximum number of MAC
addresses that can be learned on the port. The Max Entries field is
enabled only if Locked is selected in the Set Port field, and the
Limited Dynamic Lock mode is selected in Learning Mode field.
– Action on Violation — Select the action to be applied to packets
arriving on a locked port. The possible options are:
• Discard — Discard the packets from any unlearned source.
• Forward — Forward the packets from an unknown source,
without learning the MAC address.
• Shutdown — Discard the packet from any unlearned source, and
shut down the port. Ports remain shutdown until they are
reactivated, or the device is reset.
– Trap — Enable/disable traps being sent when a packet is received on a
locked port.
– Trap Frequency (1-1000000) — Enter the amount of time (in
seconds) between traps.
Configuring Port Security Using CLI Commands
The following table summarizes the CLI commands for configuring port
security.
.
Table 8-1. Port Security CLI Commands
CLI Command Description
set interface active
{[gigabitethernet|tengigabitethern
et] interface|port-channel LAGnumber}
Reactivates an interface that is
shutdown due to port security
reasons.Dell PowerConnect 55xx Systems User Guide 101
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
port security max {max-addr}
no port security max
Specifies the maximum number of
MAC addresses that can be learned
on the port.
Use the no form of this command
to restore the default
port security mode {lock | maxaddresses }
no port security mode
Configures the port security
learning mode.
Use the no form of this command
to restore the default
configuration.
port security [forward | discard |
discard-shutdown] [trap seconds]
no port security
Enables port security on an
interface.
Use the no form of this command
to disable port security on an
interface.
port security
[forward|discard|discard-shutdown]
[trap seconds]
no port security
Configures port security on an
interface.
Use the no form of this command
to disable port security.
show ports security
[[gigabitethernet|tengigabitethern
et] port-number ]|port-channel
LAG-number]
Displays lock status of specified
interface or of all interfaces.
Table 8-1. Port Security CLI Commands (Continued)
CLI Command Description102 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console # show ports security
Port Status Learning Action Maximum Trap Frequency
------- -------- -------- -------- ------- ---- ---------
gi1/0/1 Disabled Max-Addresses - 10 - -
gi1/0/2 Disabled Lock - 1 - -
gi1/0/3 Disabled Lock - 1 - -
gi1/0/4 Disabled Lock - 1 - -
gi1/0/5 Disabled Lock - 1 - -
gi1/0/6 Disabled Lock - 1 - -
gi1/0/7 Disabled Lock - 1 - -
gi1/0/8 Disabled Lock - 1 - -
gi1/0/9 Disabled Lock - 1 - -
gi1/0/10Disabled Lock - 1 - -
gi1/0/11Disabled Lock - 1 - -
gi1/0/12Disabled Lock - 1 - -Dell PowerConnect 55xx Systems User Guide 103
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
ACLs
This section describes Access Control Lists (ACLs), which enable defining
classification actions and rules for specific ingress or egress ports.
It contains the following topics:
• ACL Overview
• MAC-Based ACLs
• MAC-Based ACEs
• IPv4-Based ACLs
• IPv4-Based ACEs
• IPv6-Based ACLs
• IPv6-Based ACEs
ACL Overview
Access Control Lists (ACLs) enable network managers to define classification
actions and rules for specific ingress or egress ports. Packets entering an
ingress or egress port, with an active ACL, are either admitted or denied entry.
If entry is denied, the ingress or egress port may be disabled, for example, a
network administrator defines an ACL rule that states that port number 20
can receive TCP packets, however, if a UDP packet is received, the packet is
dropped.
ACLs are composed of Access Control Entries (ACEs) that are rules that
determine traffic classifications. Each ACE is a single rule, and up to 256
rules may be defined on each ACL, and up to 3000 rules globally.
Rules are not only used for user configuration purposes, they are also used for
features like DHCP Snooping, Protocol Group VLAN and iSCSI, so that not
all 3000 rules are available for ACEs. It is expected that there will be at least
2000 rules available. If there are fewer rules available, this may be due to
DHCP Snooping or iSCSI optimization. Reduce the number of entries in
DHCP Snooping or reduce the max number of TCP connections in the iSCSI
configuration in order to free rules for ACEs.
The following types of ACLs can be defined:
• MAC-based ACL — Examines Layer 2 fields only
• IPv4-based ACL —Examines the Layer 3 layer of IPv4 frames104 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• IPv6-based ACL —Examines the Layer 3 layer of IPv6 frames
MAC-Based ACLs
To define a MAC-based ACL:
1 Click Switching > Network Security > MAC Based ACL to display the
MAC Based ACL: Summary page.
Figure 8-2. MAC Based ACL: Summary
The currently-defined MAC-based ACLs are displayed.
2 To add a new ACL, click Add ACL, and enter the name of the new ACL.Dell PowerConnect 55xx Systems User Guide 105
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring MAC-Based ACLs Using CLI Commands
The following table summarizes the CLI commands for configuring
MAC-based ACLs.
The following is an example of some of the CLI commands:
Table 8-2. MAC Based ACL CLI Commands
CLI Command Description
mac access-list extended aclname
no mac access-list extended aclname
Defines an ACL and places the device
in MAC-extended ACL configuration
mode.
Use the no form of this command to
remove the ACL.
show interfaces access-lists Displays access lists applied on
interfaces.
console# show access-lists
Extended IP access list ACL1
permit 234 172.30.40.1 0.0.0.0 any
permit 234 172.30.8.8 0.0.0.0 any106 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
MAC-Based ACEs
To add rules to an ACL:
1 Click Switching > Network Security > MAC Based ACE to display the
MAC Based ACE: Summary page.
Figure 8-3. MAC Based ACE: Summary
The currently-defined rules for the selected ACL are displayed.
2 To add a rule click Add ACE.
3 Select the ACL for which a rule is being created.
4 Enter the fields:
– New Rule Priority — Enter the priority of the ACE. ACEs with higher
priority are processed first. One is the highest priority
– Source MAC Address — Match the source MAC address from which
packets have arrived to this source address. In addition to the Source
MAC address, you can enter a Wildcard Mask that specifies which
bits in the source address are used for matching and which bits are
ignored. A wildcard of 00:00:00:00:00:00 means the bits must be
matched exactly; ff:ff:ff:ff:ff:ff means the bits are irrelevant. Any
combination of 0s and ffs can be used.
– Any — Check to indicate that the source address is not matched.Dell PowerConnect 55xx Systems User Guide 107
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Dest. MAC Address — Match the destination MAC address to which
packets are addressed to this address. In addition to the Destination
MAC address, you can enter a Wildcard Mask that specifies which
bits in the source address are used for matching and which bits are
ignored. A wildcard of 00:00:00:00:00:00 means the bits must be
matched exactly; ff:ff:ff:ff:ff:ff means the bits are irrelevant. Any
combination of 0s and ffs can be used.
– Any — Check to indicate that the destination address is not matched.
– VLAN ID — Match the packet’s VLAN ID to this VLAN ID. The
possible VLAN IDs are 1 to 4095.
– CoS — Match the packet’s CoS value to this CoS value.
– Cos Mask — Match the packet’s CoS value to one of these CoS
values.
– Ether type — Match the packet’s Ethertype to this one.
– Time Range Name — Check to associate a time range with the ACE.
Select one of the time ranges defined in the Time Range page.
– Action — Select the action taken upon a match. The following
options are available:
• Permit — Forward packets that meet the ACL criteria.
• Deny — Drop packets that meet the ACL criteria.
• Shutdown — Drop packets that meet the ACL criteria, and
disable the port to which the packet was addressed.
– Logging of Dropped Packets — Check to activate logging of dropped
packets. 108 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring MAC-Based ACEs Using CLI Commands
The following table summarizes the CLI commands for configuring MACbased ACEs.
The following is an example of some of the CLI commands:
Table 8-3. MAC Based ACE CLI Commands
CLI Command Description
permit {any|source-ip-address
source-wildcard}
{any|destination destinationwildcard} [eth-type
0|aarp|amber|decspanning|decnetiv|diagnostic|dsm|etype-6000]
[vlan vlan-id] [cos cos coswildcard] [time-range timerange-name]
Sets permit conditions for an MAC
access list (in MAC ACL configuration
mode).
deny {any|source sourcewildcard} {any|destination
destination-wildcard} [eth-type
0|aarp|amber|decspanning|decnet-iv | diagnostic
|dsm|etype-6000] [vlan vlan-id]
[cos cos cos-wildcard] [timerange time-range-name][disableport|log-input]
Sets deny conditions for an MAC
access list.
console(config)# mac access-list extended server1
console(config-mac-al)# permit 00:00:00:00:00:01
00:00:00:00:00:ff anyDell PowerConnect 55xx Systems User Guide 109
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
IPv4-Based ACLs
To define an IPv4-based ACL:
1 Click Switching > Network Security > IPv4 Based ACL to display the
IPv4 Based ACL: Summary page.
Figure 8-4. IPv4 Based ACL: Summary
The previously-defined IPv4 ACLs are displayed.
2 To add a new ACL, click Add ACL.
3 Enter the name of the new ACL. Names are case-sensitive.110 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring IP-based ACLs Using CLI Commands
The following table summarizes the CLI commands for configuring IP-based
ACLs.
The following is an example of some of the CLI commands:
IPv4-Based ACEs
To add a rule to an ACL:
1 Click Switching > Network Security > IPv4 Based ACE to display the
IPv4 Based ACE page.
Figure 8-5. IPv4 Based ACE: Summary
Table 8-4. IP-Based ACL CLI Commands
CLI Command Description
ip access-list extended aclname
no ip access-list extended aclname
Defines an IPv4 access list and places
the device in IPv4 access list
configuration mode
Use the no form of this command to
remove the access list.
console(config)# ip access-list extended server-aclDell PowerConnect 55xx Systems User Guide 111
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The currently-defined rules for the selected ACL are displayed.
2 To add a rule, click Add ACE.
3 Select a user-defined ACL, and enter the following fields:
– New ACE Priority (1-2147483647) —Enter the priority of the ACE.
ACEs with higher priority are processed first. One is the highest
priority.
– Protocol Select From List — Select to create an ACE, based on a
specific protocol. The following options are available:
• ICMP — Internet Control Message Protocol (ICMP). The ICMP
enables the gateway or destination host to communicate with the
source host, for example, to report a processing error.
• IGMP — Internet Group Management Protocol (IGMP).
Enables hosts to notify their local switch or router that they want
to receive transmissions assigned to a specific multicast group.
• IPinIP — IP in IP. Encapsulates IP packets to create tunnels
between two routers. This ensures that IPIP tunnel appears as a
single interface, rather than several separate interfaces. IPIP
enables tunnel intranets occur the internet, and provides an
alternative to source routing.
• TCP — Transmission Control Protocol (TCP). Enables two hosts
to communicate and exchange data streams. TCP guarantees
packet delivery, and guarantees that packets are transmitted and
received in the order they are sent.
• EGP — Exterior Gateway Protocol (EGP). Permits exchanging
routing information between two neighboring gateway hosts in an
autonomous systems network.
• IGP — Interior Gateway Protocol (IGP). Enables for routing
information exchange between gateways in an autonomous
network.
• UDP — User Datagram Protocol (UDP). Communication
protocol that transmits packets but does not guarantee their
delivery.112 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• HMP — Host Mapping Protocol (HMP). Collects network
information from various networks hosts. HMP monitors hosts
spread over the internet as well as hosts in a single network.
• RDP — Reliable Data Protocol (RDP). provide a reliable data
transport service for packet-based applications.
• IDPR— Matches the packet to the IDPR protocol.
• IDRP— Matches the packet to the Inter-Domain Routing
Protocol (IDRP).
• RVSP — Matches the packet to the ReSerVation Protocol
(RSVP).
• AH — Authentication Header (AH). Provides source host
authentication and data integrity.
• EIGRP — Enhanced Interior Gateway Routing Protocol
(EIGRP). Provides fast convergence, support for variable-length
subnet mask, and supports multiple network layer protocols.
• OSPF — The Open Shortest Path First (OSPF) protocol is a
link-state, hierarchical interior gateway protocol (IGP) for
network routing Layer Two (2) Tunneling Protocol, an extension
to the PPP protocol that enables ISPs to operate Virtual Private
Networks (VPNs).
• IPIP — IP over IP (IPinIP). Encapsulates IP packets to create
tunnels between two routers. This ensures that IPIP tunnel
appears as a single interface, rather than several separate
interfaces. IPIP enables tunnel intranets occur the internet, and
provides an alternative to source routing.
• PIM — Matches the packet to Protocol Independent Multicast
(PIM).
• L2TP— Matches the packet to Internet Protocol (L2IP).
• ISIS — Intermediate System - Intermediate System (ISIS).
Distributes IP routing information throughout a single
autonomous system in IP networks.
– Protocol ID To Match— Enter a protocol number if you did not
select a protocol by name.
– Any(IP) — Check to use any protocol. Dell PowerConnect 55xx Systems User Guide 113
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Source Port (0 - 65535) — Enter the TCP/UDP source port. Enter
either Single, Range or select Any to include all ports.
– Destination Port (0 - 65535) — Enter the TCP/UDP destination port.
Enter either a Single, Range or select Any to include all ports.
– Source IP Address — Enter the source IP address to which addresses
in the packet are compared.
• Wildcard Mask —In addition to the Source MAC address, you
can enter a mask that specifies which bits in the source address are
used for matching and which bits are ignored. A wildcard of
0.0.0.0 means the bits must be matched exactly in addition to the
IP source address; ff.ff.ff.ff means the bits are irrelevant. Any
combination of 0s and ffs can be used.
• Any — Check to indicate that the source address is not matched.
– Dest. IP Address — Enter the destination IP address to which
addresses in the packet are compared.
• Wildcard Mask —In addition to the Destination MAC address,
you can enter a mask that specifies which bits in the source
address are used for matching and which bits are ignored. A
wildcard of 0.0.0.0 means the bits must be matched exactly in
addition to the IP destination address; ff.ff.ff.ff means the bits are
irrelevant. Any combination of 0s and ffs can be used.
• Any — Check to indicate that the destination address is not
matched.
– TCP Flags — To use TCP flags, check the TCP Flag checkbox and
then check the desired flag(s).
– ICMP — Specifies an ICMP message type for filtering ICMP packets.
This field is available only when ICMP is selected in the Protocol
field. The following options are available:
• Select from List — Select an ICMP type from the list.
• ICMP Type — Enter the ICMP type.
• Any — Check to use all ICMP types.114 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– ICMP Code — Enter an ICMP message code for filtering ICMP
packets that are filtered by ICMP message type or ICMP message
code. This field is available only when ICMP is selected in the
Protocol field. The following options are available:
• ICMP Code — Enter an ICMP code.
• Any — Check to use all ICMP codes.
– IGMP — IGMP packets can be filtered by IGMP message type. This
field is available only when IGMP is selected in the Protocol field. The
following options are available:
• Select from List — Select an IGMP message type from the list.
• IGMP Type — Enter the IGMP message type.
• Any — Check to use all IGMP message types.
– Classification — Select one of the following matching options:
• Match DSCP(0-63) — Matches the packet DSCP value to the
ACL.
• Match IP Precedence(0-7) — Check to enable matching
IP-precedence with the packet IP-precedence value. IPprecedence enables marking frames that exceed the CIR
threshold. In a congested network, frames containing a higher DP
value are discarded before frames with a lower DP value. If this
field is checked, enter a value to be matched.
– Time Range Name — Check to associate a time range with the ACE.
Select one of the time ranges defined in the Time Range page.
– Action — Select the ACL forwarding action. The following options
are available:
• Permit — Forward packets which meet the ACL criteria.
• Deny — Drop packets which meet the ACL criteria.
• Shutdown — Drop packet that meet the ACL criteria, and disable
the port to which the packet was addressed.
– Logging of Dropped Packets — Check to activate logging of dropped
packets. Dell PowerConnect 55xx Systems User Guide 115
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring IP-based ACEs Using CLI Commands
The following table summarizes the CLI commands for configuring IP-based
ACLs.
Table 8-5. IP-Based ACE CLI Commands
CLI Command Description
permit protocol {any|source-ip-address
source-wildcard} {any|destination-ipaddress destination-wildcard} [dscp
number|precedence number] [time-range
time-range-name]
permit icmp {any|source-ip-address sourcewildcard} {any|destination-ip-address
destination-wildcard} [any|icmptype][any|icmp-code]] [dscp
number|precedence number] [time-range
time-range-name]
permit igmp {any|source-ip-address sourcewildcard} {any|destination-ip-address
destination-wildcard}[igmp-type] [dscp
number|precedence number] [time-range
time-range-name]
permit tcp {any|source-ip-address sourcewildcard} {any|source-port/portrange}{any|destination-ip-address
destination-wildcard} {any|destinationport/port-range } [dscp number|precedence
number] [match-all list-of-flags] [timerange time-range-name]
permit udp {any|source-ip-address sourcewildcard} {any|source-port|port-range}
{any|destination-ip-address destinationwildcard} {any|destination-port/port-range
} [dscp number|precedence number] [matchall time-range-name] [time-range timerange-name]
Sets conditions to
allow a packet to pass
a named IP access list
( in access list
configuration mode).
The list of protocols is
found above.116 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of some of the CLI commands:
deny protocol {any|source-ip-address
source-wildcard} {any|destination-ipaddress destination-wildcard} [dscp
number|precedence number] [time-range
time-range-name] [disable-port|log-input]
deny icmp {any|source-ip-address sourcewildcard} {any|destination-ip-address
destination-wildcard{any|icmp-type}
{any|icmp-code} [dscp number|precedence
number] [time-range time-range-name]
[disable-port|log-input]
deny igmp {any|source-ip-address sourcewildcard} {any|destination-ip-address
destination-wildcard}[igmp-type] [dscp
number|precedence number] [time-range
time-range-name] [disable-port|log-input]
deny tcp {any|source-ip-address sourcewildcard} {any|source-port|portrange}{any|destination-ip-address
destination-wildcard} {any|destinationport/port-range } [dscp number|precedence
number] [match-all list-of-flags] [timerange time-range-name] [disable-port|loginput]
deny udp {any|source-ip-address sourcewildcard} {any|source-port|port-range}
{any|destination-ip-address destinationwildcard} {any|destination-port|port-range
} [dscp number|precedence number] [matchall time-range-name] [time-range timerange-name] [disable-port|log-input]
Sets deny conditions
for IPv4 access list (in
access list
configuration mode).
console(config)# ip access-list extended server
console(config-ip-al)# permit ip 1.1.1.0 0.0.0.255
1.1.2.0 0.0.0.0
Table 8-5. IP-Based ACE CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 117
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
IPv6-Based ACLs
The IPv6 Based ACL Page displays and enables the creation of IPv6 ACLs,
which check pure IPv6-based traffic. IPv6 ACLs do not check IPv6-over-IPv4
or ARP packets.
To define IPv6-based ACLs:
1 Click Switching > Network Security > IPv6 Based ACL to display the
IPv6 Based ACL: Summary page.
Figure 8-6. IPv6 Based ACL: Summary
A list of all of the currently defined IPv6-based ACLs is displayed.
2 To add a new ACL, click Add ACL.
3 Enter the name of the new ACL. Names are case-sensitive.118 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring IPv6-based ACLs Using CLI Commands
The following table summarizes the CLI commands for configuring
IPv6-based ACLs.
The following is an example of some of the CLI commands:
IPv6-Based ACEs
To add a rule to an IPv6-based ACL:
1 Click Switching > Network Security > IPv6 Based ACE to display the
IPv6 ACE: Summary page.
Figure 8-7. IPv6 Based ACE: Summary
Table 8-6. IP-Based ACL CLI Commands
CLI Command Description
ipv6 access-list [access-listname]
no ipv6 access-list [accesslist-name]
Defines an IPv6 access list and places
the device in IPv6 access list
configuration mode
Use the no form of this command to
remove the access list.
console(config)# ipv6 access-list server-aclDell PowerConnect 55xx Systems User Guide 119
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The currently-defined rules for the selected ACL are displayed.
2 To add a rule click Add ACE.
3 Select a user-defined ACL for which a rule is being created.
4 Enter the following fields:
– New Rule Priority — Enter the ACE priority that determines which
ACE is matched to a packet, based on a first match.
– Protocol Select from List — Select to create an ACE, based on a
specific protocol. The following options are available:
• TCP — Transmission Control Protocol (TCP). Enables two
hosts to communicate and exchange data streams. TCP
guarantees packet delivery, and guarantees packets are
transmitted and received in the order the are sent.
• UDP — User Datagram Protocol (UDP). Communication
protocol that transmits packets but does not guarantee their
delivery.
• ICMP — Internet Control Message Protocol (ICMP). The
ICMP allows the gateway or destination host to communicate
with the source host. For example, to report a processing error.
• IPV6 — Matches the packet to the IPV6 protocol.
– Protocol ID To Match — Enter a protocol.
– Any — Check to use any protocol.
– Source Port — Enter the TCP/UDP source port. Enter either a Single,
Range or select Any to include all ports.
– Destination Port — Enter the TCP/UDP destination port. Enter
either a Single, Range or select Any to include all ports.
– TCP Flags — To use TCP flags, check the TCP Flag checkbox and
then check the desired flag(s).
– ICMP — Specifies an ICMP message type for filtering ICMP packets.
This field is available only when ICMP is selected in the Protocol
field. The following options are available:
• Select from List — Select an ICMP type from the list.
• ICMP Type — Enter the ICMP type.120 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Any — Check to use all ICMP types.
– ICMP Code — Specifies an ICMP message code for filtering ICMP
packets that are filtered by ICMP message type or ICMP message
code. This field is available only when ICMP is selected in the
Protocol field. The following options are available:
• ICMP Code — Enter an ICMP code.
• Any — Check to use all ICMP codes.
– Source IP Address — Enter the source IP address to which addresses
in the packet are compared. The following options are available:
• Prefix Length —The number of bits that comprise the source IP
address prefix of the subnetwork.
• Any — Check to indicate that the source address is not matched.
– Dest. IP Address — Enter the destination IP address to which
addresses in the packet are compared. The following options are
available:
• Prefix Length —The number of bits that comprise the
destination IP address prefix of the subnetwork.
• Any — Check to indicate that the destination address is not
matched.
– Traffic Class — Select one of the following options:
• Match DSCP — Matches the packet DSCP value to the ACL.
• Match IP Precedence — Matches the IP-precedence with the
packet IP-precedence value. IP-precedence enables marking
frames that exceed CIR threshold. In a congested network, frames
containing a higher DP value are discarded before frames with a
lower DP value.
– Time Range Name — Check to associate a time range with the ACE.
Select one of the time ranges defined in the Time Range page.
– Action — The ACL forwarding action. The following options are
available:
• Permit — Forwards packets that meet the ACL criteria.
• Deny — Drops packets that meet the ACL criteria.Dell PowerConnect 55xx Systems User Guide 121
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Shutdown — Drops packet that meet the ACL criteria, and disables
the port to which the packet was addressed.
– Logging of Dropped Packets — Check to activate logging of dropped
packets.
Configuring IP-based ACEs Using CLI Commands
The following table summarizes the CLI commands for configuring IP-based
ACLs.
Table 8-7. IP-Based ACE CLI Commands
CLI Command Description
permit protocol {any|{source-prefix/length
}{any|destination- prefix/length } [dscp
number|precedence number] [time-range
time-range-name]
permit icmp {any|{source-prefix/length
}{any|destination-prefix/length }
{any|icmp-type}{any|icmp-code} [dscp
number|precedence number] [time-range
time-range-name]
permit tcp {any|{source-prefix/length }
{any|source-port/port-range}
}{any|destination prefix/length }
{any|destination-port/port-range} [dscp
number|precedence number] [match-all listof-flags] [time-range time-range-name]
permit udp {any|{source-prefix/length }}
{any|source-port|port-range}
}{any|destination prefix/length }
{any|destination-port/port-range} [dscp
number|precedence number] [time-range
time-range-name]
Sets permit conditions
for IPv6 access list.122 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of some of the CLI commands:
deny protocol {any|{source-prefix/length
}{any|destination-prefix|length} [dscp
number|precedence number] [time-range
time-range-name] [disable-port|log-input]
deny icmp {any|{source-prefix/length
}{any|destination-prefix/length }
{any|icmp-type} {any|icmp-code} [dscp
number|precedence number] [time-range
time-range-name] [disable-port|log-input]
deny tcp {any|{source-prefix/length }
{any|source-port/port-range}
}{any|destination-prefix/length}
{any|destination-port/port-range} [dscp
number|precedence number] [match-all listof-flags] [time-range time-range-name]
[disable-port|log-input]
deny udp {any|{source-prefix/length }}
{any|source-port/port-range}
}{any|destination-prefix|length}
{any|destination-port/port-range} [dscp
number|precedence number] [time-range
time-range-name] [disable-port|log-input]
Sets deny conditions
for IPv4 access list (in
Access List
Configuration mode).
console(config)# ipv6 access-list server
console(config-ipv6-al)# permit tcp 3001::2/64 any any 80
Table 8-7. IP-Based ACE CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 123
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
ACL Binding
When an ACL is bound to an interface, all the rules that have been defined
for the ACL are applied to that interface. Whenever an ACL is assigned on a
port or LAG, flows from that ingress or egress interface that do not match the
ACL, are matched to the default rule, which is to Drop unmatched packets.
To change the default action for unmatched packets to an action other than
Drop, do the following:
• Add an additional ACE to the ACL with "Any" in all fields
• Set its action other than Drop
• Set the priority to the lowest in the ACL.
To bind ACLs to interfaces:
1 Click Switching > Network Security > ACL Binding to display the ACL
Binding: Summary page.
Figure 8-8. ACL Binding: Summary
The ports on the selected unit are displayed along with their associated
ACLs.124 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 To bind an ACL to an interface, select an interface and click Edit.
3 Select an ACL(s). You can select one of each type (MAC-based ACL,
IPv4-based ACL or IPv6-based ACL) or one IPv4-based ACL and one
IPv6-based ACL.
Configuring ACL Bindings Using CLI Commands
The following table summarizes the CLI commands for configuring ACL
Bindings.
.
The following is an example of some of the CLI commands:
Table 8-8. ACL Bindings CLI Commands
CLI Command Description
service-acl input acl-name1
[acl-name2]
no service-acl input
Controls access to an interface
Use the no form of the command to
remove access control.
show access-lists [acl-name] Displays access control lists (ACLs)
configured on the switch.
console(config)# mac access-list extended server
console(config-mac-al)# permit 00:00:00:00:00:01
00:00:00:00:00:ff any
console(config-mac-al)# exit
console(config)# interface gi1/0/1
console(config-if)# service-acl input serverDell PowerConnect 55xx Systems User Guide 125
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Proprietary Protocol Filtering
Protocol filters are used to disallow receiving specific proprietary protocol
packets through an interface. These can be enabled for specific ports.
If a protocol filter is enabled on a port, you cannot enable a QoS ACL on this
port.
To configure Proprietary Protocol Filtering:
1 Click Switching > Network Security > Proprietary Protocol Filtering to
display the Proprietary Protocol Filtering: Summary page.
Figure 8-9. Proprietary Protocol Filtering: Summary
A list of the ports and their filtered protocols is displayed.
2 Click Edit to modify the filtered protocols for a specific port.
3 Select a unit and an interface.126 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
4 Move the required protocols from the Available Protocols list to the
Filtered Protocols list. The following displays the protocols and the
addresses that are blocked:
Configuring Proprietary Protocol Filtering Using CLI Commands
The following table summarizes the CLI commands for setting fields in the
Proprietary Protocol Filtering pages.
Only one of the following CLI commands can be active on a port at the same
time. To add other protocol filters, the command must be negated and then
run again with all the required protocol names.
.
The following is an example of some of the CLI commands:
Table 8-9. Protocol Filtering
Protocol Destination Address Protocol Type
blockcdp 0100.0ccc.cccc 0x2000
blockvtp 0100.0ccc.cccc 0x2003
blockdtp 0100.0ccc.cccc 0x2004
blockudld 0100.0ccc.cccc 0x0111
blockpagp 0100.0ccc.cccc 0x0104
blocksstp 0100.0ccc.cccd -
blockall 0100.0ccc.ccc0 - 0100.0ccc.cccf -
Table 8-10. Proprietary Protocol Filtering CLI Commands
CLI Command Description
service-acl input protocol1
[protocol2 … protocol6]
no service-acl input
Discards packets that are classified to
specific protocols.
Use the no form of those commands
to disable discarding of the packets.
console (Config-if)# service-acl input blockcdp blockvtpDell PowerConnect 55xx Systems User Guide 127
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Time Range
Time ranges can be defined and associated with an QoS ACL, so that it is
applied only during that time range.
There are two types of time ranges:
• Absolute —This type of time range begins on a specific date or
immediately and ends on a specific date or extends infinitely. It is created
in the Time Range pages. A recurring element can be added to it.
• Recurring — This is a time range element that is added to an absolute
range, and begins and ends on a recurring basis. It is defined in the Time
Range Recurrence pages.
If a time range includes both absolute and recurring ranges, the ACL is
activated only if both absolute start time and the recurring time range have
been reached. The ACL is deactivated when either of the time ranges is
reached.
The switch supports a maximum of 10 absolute time ranges.
All time specifications are interpreted as local time (Daylight Savings Time
does not affect this).
To ensure that the time range entries take effect at the desired times, the
system time must be set. For more information on setting the system time,
see "Time Synchronization" on page 169.
A possible use for this feature is to limit access of computers to the network
only during business hours, after which they are locked, and access to the rest
of the network is blocked.128 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Absolute Time Range
To define an absolute time range:
1 Click Switching > Network Security > Time Range to display the Time
Range: Summary page.
Figure 8-10. Time Range: Summary
The existing Time Ranges are displayed.
2 To add a new time range, click Add.
3 Enter the name of the time range in the Time Range Name field.
4 Define the Absolute Start time.
– To begin the Time Range immediately, click Immediate.
– To determine at what time in the future the Time Range will begin,
enter values in the Date and Time fields.Dell PowerConnect 55xx Systems User Guide 129
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
5 Define the Absolute End time.
– To indicate that the Time Range should not end, click Infinite.
– To determine the time at which the Time Range ends, enter values in
the Date and Time fields.
See "Configuring Time Ranges Using CLI Commands" on page 130 for the
CLI commands for creating time ranges.
Time Range Recurrence
To add a recurring time range element to an absolute time range:
1 Click Switching > Network Security > Time Range Recurrence to display
the Recurring Time Range: Summary page.
Figure 8-11. Recurring Time Range: Summary
A daily and weekly recurring element of the time range that is selected is
displayed if they exist.130 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 To add a recurring time range element to a time range, click Add.
3 Select the Time Range Name to which you want to add the Time Range
Recurrence. The Absolute Start and Absolute End fields are displayed.
4 Check if the recurrence is Daily or Weekly in Recurrence type.
5 If the recurrence is Daily, enter:
– Start Time — Select the time on which the time range starts.
– End Time— Select the time on which the time range ends.
– Weekday — Select the day of the week on which the time range
occurs.
6 If the recurrence is Weekly, enter:
• Start — Select the Day of the Week and Time on which the time
range starts.
• End —Select the Day of the Week and Time on which the time
range ends.
Configuring Time Ranges Using CLI Commands
The following table summarizes the CLI commands for configuring time
ranges.
Table 8-11. Time Range CLI Commands
CLI Command Description
time-range time-range-name
no time-range time-range-name
Enables time-range configuration
mode, and defines time ranges for
functions (such as access lists).
Use the no form of this command
to remove the time range
configuration.
absolute start hh:mm day month
year
no absolute start
absolute end hh:mm day month year
no absolute end
Adds start and end times to the
time range.
Use the no form of the commands
to remove the start and end times
from the time range.Dell PowerConnect 55xx Systems User Guide 131
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of some of the CLI commands:
periodic day-of-the-week hh:mm to
day-of-the-week hh:mm
no periodic day-of-the-week hh:mm
to day-of-the-week hh:mm periodic
list hh:mm to hh:mm day-of-theweek1 [day-of-the-week2… day-ofthe-week7]
no periodic list hh:mm to hh:mm
day-of-the-week1 [day-of-theweek2… day-of-the-week7]
periodic list hh:mm to hh:mm all
no periodic list all hh:mm to
hh:mm all
Adds a recurring time range to the
time range.
Use the no form of the commands
to remove the recurring time
range.
console (config)# time-range http-allowed
console (config-time-range)# absolute start 12:00 1 jan
2005 end 12:00 31 dec 2005
console (config-time-range)# periodic monday 8:00 to
friday 20:00
Table 8-11. Time Range CLI Commands (Continued)
CLI Command Description132 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Dot1x Authentication
This section describes Dot1x authentication.
It contains the following topics:
• Port-Based Authentication Overview
• Dot1x Overview
• Port-Based Authentication Global
• Port-Based Authentication Interface Settings
• Monitoring Users
• Host Authentication
• Port Authentication Users
Port-Based Authentication Overview
Port-based authentication enables authenticating system users on a per-port
basis via an external server. Only authenticated and approved system users
can transmit and receive data. Ports are authenticated via the RADIUS server
using the Extensible Authentication Protocol (EAP). Port Authentication
includes:
• Authenticators — Specifies the device port that is authenticated before
permitting system access.
• Supplicants — Specifies the host connected to the authenticated port hat
is requesting to access the system services.
• Authentication Server — Specifies the external server, for example, a
RADIUS server, which performs authentication on behalf of the
authenticator, and indicates whether the supplicant is authorized to access
system services.
Port-based authentication creates two access states:
• Controlled Access — Permits communication between the supplicant and
the system, if the supplicant is authorized.
• Uncontrolled Access — Permits uncontrolled communication, regardless
of the port authorization state.Dell PowerConnect 55xx Systems User Guide 133
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The device supports Port Based Authentication via RADIUS servers.
Dot1x Overview
Dot1x is an IEEE standard for port-based network access control. The Dot1x
framework enables a device (the supplicant) to request port access from a
remote device (authenticator) to which it is connected. The supplicant is
permitted to send data to the port only after it is authenticated and
authorized. If it is not authenticated and authorized, the authenticator
discards the supplicant data, unless the data is sent to a Guest VLAN and/or
non-authenticated VLANs.
Authentication of the supplicant is performed by an external RADIUS server
through the authenticator. The authenticator monitors the results of the
authentication.
In the Dot1x standard, a device can be a supplicant and an authenticator at a
port, simultaneously requesting and granting port access. However, this
device can only act as an authenticator, and does not take on the role of a
supplicant.
The following varieties of Dot1x exist:
• Single session Dot1x:
– A1—Single-session/Single Host — In this mode, the switch, as an
authenticator, supports a single Dot1x session, and grants permission
to use the port to an authorized supplicant. All other access requests,
made by other devices received from the same port, are denied until
the authorized supplicant is no longer using the port, or the access
request is to an unauthenticated or guest VLAN.
– Single-session/Multiple Hosts—This follows the Dot1x standard. In
this mode, the switch, as an authenticator, enables any device to use a
port, as long as it has been granted permission as a supplicant at the
port.
• Multi-Session Dot1x—Every device (supplicant) connecting to a port
must be authenticated and authorized by the switch (authenticator),
separately in a different Dot1x session. This is the only mode that supports
Dynamic VLAN Assignment (DVA).134 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Dynamic VLAN Assignment (DVA)
Dynamic VLAN Assignment (DVA) is also referred to as RADIUS VLAN
Assignment in this guide. When a port is in Multiple Session mode and is
DVA-enabled, the switch automatically adds the port as an untagged member
of the VLAN that is assigned by the RADIUS server during the authentication
process. The switch classifies untagged packets to the assigned VLAN if the
packets originated from the devices or ports that are authenticated and
authorized.
For a device to be authenticated and authorized at a DVA-enabled port:
• The RADIUS server must authenticate the device and dynamically assign
a VLAN to the device.
• The assigned VLAN must not be the default VLAN and must have been
created on the switch.
• The switch must not be configured to use both a DVA and a MAC-based
VLAN group.
• A RADIUS server must support DVA with RADIUS attributes tunnel-type
(64) = VLAN (13), tunnel-media-type (65) = 802 (6), and tunnel-privategroup-id = a VLAN ID.
Dynamic Policy/ACL Assignment
The Dynamic Policy/ACL Assignment feature enables specifying a userdefined ACL or policy in the RADIUS server. After a successful
authentication, the user is assigned that ACL.
Authentication Methods
The possible authentication methods are:
• Dot1x — The switch supports this authentication mechanism, as
described in the standard, to authenticate and authorize Dot1x
supplicants.
• MAC-based — The switch can be configured to use this method to
authenticate and authorize devices that do not support Dot1x. The switch
emulates the supplicant role on behalf of the non-Dot1x-capable devices,
and uses the MAC address of the devices as the username and password,
when communicating with the RADIUS servers. MAC addresses for Dell PowerConnect 55xx Systems User Guide 135
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
username and password must be entered in lower case and with no
delimiting characters (for example: aaccbb55ccff). To use MAC-based
authentication at a port:
– A Guest VLAN must be defined.
– The port must be Guest-VLAN-enabled.
– The packets from the first supplicant, at the port before it is
authorized, must be untagged.
You can configure a port to use Dot1x only, MAC-based only, or Dot1x and
MAC-based authentication. If a port is configured to use both Dot1x and
MAC-based authentication, a Dot1x supplicant has precedence over a
non-Dot1x device. The Dot1x supplicant preempts an authorized, but
non-Dot1x device, at a port that is configured with a single session.
Unauthenticated VLAN and Guest VLANs
Unauthenticated VLANs and Guest VLANs provide access to services that do
not require the subscribing devices or ports to be Dot1x or MAC-Based
authenticated and authorized.
An unauthenticated VLAN is a VLAN that allows access by authorized and
unauthorized devices or ports. You can configure one or more VLAN to be
unauthenticated in the VLAN Membership pages in "VLANs" on page 466.
An unauthenticated VLAN has the following characteristics:
• It must be a static VLAN, and cannot be the Guest VLAN or the default
VLAN.
• The VLAN’s member ports must be manually configured as tagged
members.
• The member ports must be trunk and/or general ports. An access port
cannot be member of an unauthenticated VLAN.
The Guest VLAN, if configured, is a static VLAN with the following
characteristics.
• It must be manually defined from an existing, static VLAN.
• It is automatically available only to unauthorized devices, or to ports of
devices that are connected and Guest VLAN enabled. 136 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• If a port is Guest-VLAN-enabled, the switch automatically adds the port as
an untagged member of the Guest VLAN when the port is not authorized,
and removes the port from the Guest VLAN when the first supplicant of
the port is authorized.
• The Guest VLAN cannot be used as both the Voice VLAN and an
unauthenticated VLAN.
The switch also uses the Guest VLAN for authentication at ports configured
with Multiple Session mode and MAC-based authentication. Therefore, you
must configure a Guest VLAN before you can use the MAC-based
authentication mode.
For authentication to function, it must be activated both globally, in the PortBased Authentication Global page and individually on each port, in the PortBased Authentication Interface Settings pages.
Monitoring Mode
Monitoring mode enables providing users who fail authentication with
limited network access. This enables these users to correct the reason that the
authentication failed.
The following are the main aspects of this feature:
• Enables successful authentications using the returned RADIUS
information
• Provides a mechanism to report unsuccessful authentications without
negative repercussions to the user due to administrator errors
• Accurately reports the data received from the successful and nonsuccessful operations so that appropriate changes to problem areas may be
made.
The Dot1x monitoring activation command includes a special VLAN that is
used when there is no access interface configuration present and the client(s)
unsuccessfully authenticates. These clients are placed in the special VLAN.
For users that unsuccessfully authenticate during re-authentication process,
but already have existing VLANs configured, the failure to authenticate does
not put them in a disabled state but places them back to the existing
configuration.Dell PowerConnect 55xx Systems User Guide 137
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port-Based Authentication Global
To globally configure authentication:
1 Click Switching > Network Security > Dot1 Authentication > Port
Based Authentication Global to display the Port Based Authentication
Global page.
Figure 8-12. Port Based Authentication Global
2 Enter the following fields:
– Port Based Authentication State — Enable/disable port-based
authentication.
– Authentication Method — Select an authentication method. The
possible options are: 138 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• RADIUS, None — Perform port authentication first by using the
RADIUS server. If no response is received from RADIUS (for
example, if the server is down), then no authentication is
performed, and the session is permitted.
• RADIUS — Authenticate the user on the RADIUS server. If no
authentication is performed, the session is not permitted.
• None — Do not authenticate the user. Permit the session.
– Guest VLAN — Enable/disable the use of a Guest VLAN for
unauthorized ports. If a Guest VLAN is enabled, all unauthorized
ports automatically join the VLAN selected in the Guest VLAN ID
field. If a port is later authorized, it is removed from the Guest VLAN.
– VLAN List — Select the Guest VLAN from the VLAN list.
– Monitoring Mode — Enable/disable logging authentication attempts.
– Monitoring VLAN — Enter the ID of the VLAN to which traffic
being monitored is routed after unsuccessful Dot1x authentication.
– Accept Supplicant when Dynamic Policy/ACL Assignment Has No
Resources — If no resources remain in the TCAM, the system can
either reject (disable) or allow (enable) successful authentication.
Enabling Port-Based Authentication Globally Using the CLI Commands
The following table summarizes the CLI commands for enabling the port
based authentication as displayed in the Port Based Authentication Global
page.
Table 8-12. Port-Based Authentication Global CLI Commands
CLI Command Description
aaa authentication dot1x
default method1 [method2]
no aaa authentication dot1x
default
Specifies one or more AAA methods for
use on interfaces running IEEE 802.1X.
Use the no form of this command to
restore the default configuration.
dot1x system-auth-control
no dot1x system-auth-control
Enables 802.1x globally.
Use the no form of this command to
restore the default configuration.Dell PowerConnect 55xx Systems User Guide 139
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
dot1x system-auth-control
monitor [vlan vlan-id]
no dot1x system-auth-control
monitor
Enables 802.1x globally the 802.1x
Monitoring mode and define the Monitor
VLAN.
Use the no format of the command to
return to default.
dot1x guest-vlan
no dot1x guest-vlan
Contains a list of VLANs. The guest
VLAN is selected from the VLAN List.
Use the no form of this command to
disable access.
show dot1x Displays 802.1X status for the device.
console(config)# aaa authentication dot1x default none
console(config)# interface vlan 5
console# show dot1x
802.1x is disabled
Admin Oper Reauth Reauth Username
Port Mode Mode Control Period
-------- ------------------ ------------- -------- ------- --------
gi1/0/1 Force Authorized Authorized* Disabled 3600 n/a
gi1/0/2 Force Authorized Authorized* Disabled 3600 n/a
gi1/0/3 Force Authorized Authorized* Disabled 3600 n/a
gi1/0/4 Force Authorized Authorized* Disabled 3600 n/a
Table 8-12. Port-Based Authentication Global CLI Commands (Continued)
CLI Command Description140 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port-Based Authentication Interface Settings
To configure 802.1x authentication on an interface:
1 Click Switching > Network Security > Dot1 Authentication > Port
Based Authentication Interface Settings to display the Port Based
Authentication Interface Settings: Summary page.
Figure 8-13. Port Based Authentication Interface Settings
Port parameters for the selected unit are displayed.
2 Click Edit.
3 Select a port for which the authentication parameters apply in the
Interface drop-down list.
4 Enter the parameters:
– User Name — Displays the username of the port.
– Admin Interface Control — Select the port authorization state. The
possible options are:
• Auto — Enables port-based authentication on the interface. The
interface moves between an authorized or unauthorized state,
based on the authentication exchange between the device and the
client.Dell PowerConnect 55xx Systems User Guide 141
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Authorized — Places the interface into an authorized state
without being authenticated. The interface resends and receives
normal traffic without client port-based authentication.
• Unauthorized — Denies the selected interface system access by
moving the interface into unauthorized state. The device cannot
provide authentication services to the client through the
interface.
– Current Interface Control — Displays the current port authorization
state.
– Authentication Type — Select the type of authentication on the port.
The possible options are:
• 802.1x Only — 802.1X authentication is the only authentication
method performed on the port.
• MAC Only — Port is authenticated, based on the supplicant
MAC address. Only eight MAC-based authentications can be
used on the port.
• 802.1x & MAC — Both 802.1X and MAC-based authentication
are performed on the switch. The 802.1X authentication takes
precedence.
NOTE: For MAC authentication to succeed, the RADIUS server supplicant
username and password must be the supplicant MAC address. The MAC
address must be in lower case letters and entered without the “:” or “-”
separators; for example: 0020aa00bbcc.
– Dynamic VLAN Assignment — Enable/disable dynamic VLAN
assignment for this port. This feature enables you to automatically
assign users to VLANs during the RADIUS server authentication.
When a user is authenticated by the RADIUS server, the user is
automatically joined to the VLAN configured on a RADIUS server.
• Port Lock and Port Monitor should be disabled when DVA is
enabled.
• Dynamic VLAN Assignment (DVA) can occur only if a RADIUS
server is configured, and port authentication is enabled and set to
802.1x multi-session mode.
• If the RADIUS Accept Message does not contain the supplicant’s
VLAN, the supplicant is rejected.142 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Authenticated ports are added to the supplicant VLAN as
untagged.
• Authenticated ports remain unauthenticated VLAN and Guest
VLAN members. Static VLAN configuration is not applied to the
port.
• The following list of VLANs cannot participate in DVA: an
Unauthenticated VLAN, a Dynamic VLAN that was created by
GVRP, a Voice VLAN, a Default VLAN and a Guest VLAN.
• Delete the supplicant VLAN while the supplicant is logged in.
The supplicant is authorized during the next re-authentication if
this supplicant VLAN is re-created, or a new VLAN is configured
on the RADIUS server.
NOTE: DVA provides the same functionality as the MAC to VLAN Assignment
feature, but does so in a standard way. Therefore, when DVA is available,
MAC to VLAN Assignment is not available.
– Guest VLAN — Enable/disable port access to the Guest VLAN. If
enabled, unauthorized users, connected to this interface, can access
the Guest VLAN.
– Dynamic Policy / ACL Assignment — Enable/disable this feature.
– Periodic Reauthentication — Select to enable port re-authentication
attempts after the specified Reauthentication Period.
– Reauthentication Period (300-4294967295) — Enter the number of
seconds after which the selected port is reauthenticated.
– Reauthenticate Now — Select to enable immediate port
re-authentication.
– Authentication Server Timeout (1-65535) — Enter the time interval
that lapses before the device resends a request to the authentication
server. The field value is specified in seconds.
– Resending EAP Identity Request (1-65535) — Enter the amount of
time that lapses before EAP request are resent.
– Quiet Period (0-65535) — Enter the number of seconds that the
device remains in the quiet state, following a failed authentication
exchange.Dell PowerConnect 55xx Systems User Guide 143
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Supplicant Timeout (1-65535) — Enter the amount of time that
lapses before EAP requests are resent to the supplicant. The field
value is in seconds.
– Max EAP Requests (1-10) — Enter the maximum number of EAP
requests that can be sent. If a response is not received after the defined
period (supplicant timeout), the authentication process is restarted.
Enabling Port-Based Authentication on Interfaces Using the CLI Commands
The following table summarizes the CLI commands for enabling the port
based authentication as displayed in the Port Based Authentication Global
page.
Table 8-13. Port-Based Authentication Interface CLI Commands
CLI Command Description
dot1x port-control {auto |
force-authorized | forceunauthorized}
no dot1x port-control
Enables manual control of the port
authorization state.
Use the no form of this command to
restore the default configuration.
dot1x mac-authentication
{mac-only|mac-and-802.1x}
no dot1x mac-authentication
Enables authentication based on the
station’s MAC address.
Use the no form of this command to
disable access.
dot1x radius-attributes vlan
no dot1x radius-attributes
vlan
Enables user-based VLAN assignment.
Use the no form of this command to
disable user-based VLAN assignment.
dot1x guest-vlan enable
no dot1x guest-vlan enable
Enables unauthorized users on the
interface access to the guest VLAN.
Use the no form of this command to
disable access.
dot1x max-req count
no dot1x max-req
Sets the maximum number of times that
the device sends an EAP to the client,
before restarting the authentication
process.
Use the no form of this command to
restore the default configuration.144 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
dot1x re-authentication
no dot1x re-authentication
Enables periodic re-authentication of the
client.
Use the no form of this command to
restore the default configuration.
dot1x timeout re-authperiod
seconds
no dot1x timeout supp-timeout
Sets the number of seconds between reauthentication attempts.
Use the no form of this command to
restore the default configuration.
dot1x re-authenticate
[[gigabitethernet|tengigabit
ethernet] port-number]
Manually initiates a re-authentication of
all 802.1X-enabled ports or the specified
802.1X-enabled port.
dot1x timeout quiet-period
seconds
no dot1x timeout quiet-period
Sets the number of seconds that the
device remains in the quiet state following
a failed authentication exchange.
Use the no form of this command to
restore the default configuration.
dot1x timeout server-timeout
seconds
no dot1x timeout servertimeout
Sets the time for the retransmission of
packets to the authentication server.
Use the no form of this command to
restore the default configuration.
dot1x timeout supp-timeout
seconds
no dot1x timeout supp-timeout
Sets the time for the retransmission of an
EAP request frame to the client.
Use the no form of this command to
restore the default configuration.
dot1x timeout tx-period
seconds
no dot1x timeout tx-period
Sets the number of seconds that the
device waits for a response to an EAP -
request/identity frame, from the client,
before resending the request.
Use the no form of this command to
restore the default configuration.
show dot1x
[[gigabitethernet|tengigabit
ethernet] port-number]
Displays 802.1X status for the device or
for the specified interface.
Table 8-13. Port-Based Authentication Interface CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 145
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
show dot1x advanced Displays 802.1X advanced features for the
switch or specified interface.
show dot1x users [username
username]
Displays 802.1X users for the device.
dot1x guest-vlan enable
no dot1x guest-vlan enable
Enables using a guest VLAN for
unauthorized ports.
Use the no form of this command to
restore the default configuration.
console(config)# aaa authentication dot1x default none
console(config)# interface vlan 5
console(config-if)# dot1x auth-not-req
console(config)# vlan database
console(config-vlan)# vlan 2
console(config-vlan)# exit
console(config)# interface vlan 2
console(config-if)# dot1x guest-vlan
console# show dot1x
Interface Admin
Mode
Oper Mode Reauth
Control
Reauth
Period
Username
-------- ------- ---------- -------- ------ --------
gi1/0/1 Auto Authorized Enabled 3600 Bob
gi1/0/2 Auto Authorized Enabled 3600 John
gi1/0/3 Auto Unauthoriz
ed
Enabled 3600 Clark
gi1/0/4 Forceauth
Authorized Disabled 3600 n/a
Table 8-13. Port-Based Authentication Interface CLI Commands (Continued)
CLI Command Description146 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Monitoring Users
Use the Monitoring Users page to view rejected users.
1 Click Switching > Network Security > Dot1 Authentication >
Monitoring Users to display the Monitoring Users page.
Figure 8-14. Monitoring Users
2 Select a supplicant that was authenticated on the port. The supplicant’s
information is displayed.
– User Name — Name assigned to this port.
– Port — Number of port.
– VLAN — Port belongs to this VLAN.
– MAC Address — Source of traffic.
– Reject Reason — Reason that traffic was rejected. See Table 8-14 for a
list of the possible reject reasons.
– Time — Time that traffic was rejected.Dell PowerConnect 55xx Systems User Guide 147
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Table 8-14. Reject Reason Description
Abbreviation Description
ACL-DEL ACL was deleted by a user.
ACL-NOTEXST ACL sent by the RADIUS server does not exist on the device.
ACL-OVRFL ACL sent by the RADIUS server cannot be applied because of
TCAM overflow.
AUTH-ERR Rejected by RADIUS due to wrong user name or password in
the RADIUS server.
FLTR-ERR RADIUS accept message contains more than two filter IDs.
FRS-MTH-DENY First method is deny.
IPv6WithMAC RADIUS accept message contains filter with IPv6 DIP and
MAC addresses.
IPV6WithNotIP RADIUS accept message contains IPv6 and not IP
simultaneously.
POL-BasicMode Policy is not supported in the QoS basic mode.
POL-DEL Policy was deleted by a user.
POL-OVRFL Policy sent by radius server can not be applied because of
TCAM overflow.
RAD-APIERR RADIUS API returned error (e.g. No RADIUS server is
configured).
RAD_INVLRES RADIUS server returned invalid packet (e.g. EAP attribute is
missing).
RAD-NORESP RADIUS server is not responding.
VLAN-DFLT VLAN sent by a RADIUS server cannot be applied because it
is the default VLAN.
VLAN-DYNAM VLAN sent by RADIUS server cannot be applied because it is
a dynamic VLAN.
VLAN-GUEST VLAN sent by RADIUS server cannot be applied because it is
the Guest VLAN.148 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Monitoring Users Using the CLI Commands
The following table summarizes the CLI commands for monitoring users:
The following is an example of the CLI commands:
Table 8-15. Monitoring Users CLI Commands
CLI Command Description
show dot1x monitoring result
[username username]
Displays the captured information of each
interface/host on the switch/stack.
console# show dot1x monitoring Tom
Username: Tom
Port g1
Quiet period: 60 Seconds
Tx period: 30 Seconds
Max req: 2
Supplicant timeout: 30 Seconds
Server timeout: 30 Seconds
Session Time (HH:MM:SS): 08:19:17
MAC Address: 00:08:78:32:98:78
Authentication Method: Remote
Assigned VLAN: 207
Reason for Failure:VLAN was not defined on SwitchDell PowerConnect 55xx Systems User Guide 149
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Host Authentication
Use the Host Authentication page to define the authentication mode on the
port, and the action to perform if a violation is detected.
To view ports and their authentication information:
1 Click Switching > Network Security > Dot1 Authentication > Host
Authentication to display the Host Authentication: Summary page.
Figure 8-15. Host Authentication: Summary
A list of the ports and their authentication modes is displayed. The fields
are defined on the Edit page with the exception of the following field:
– Single Host Status — Displays the host status. The possible options
are:
• Unauthorized — The port control is Force Unauthorized, the
port link is down or the port control is Auto, but a client has not
been authenticated via the port.150 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Not in Auto Mode — The port control is Forced Authorized, and
clients have full port access.
• Single-host Lock — The port control is Auto and a single client
has been authenticated via the port.
• No Single Host — Multiple Host is enabled.
– Number of Violations — Displays the number of packets that arrive
on the interface in single-host mode, from a host whose MAC address
is not the supplicant MAC address.
2 Click Edit.
3 In the Port drop-down list, select the port to which you want to apply the
authentication mode.
4 Enter the fields:
– Host Authentication — Define the host authentication type. The
options are:
• Single — Only a single authorized host can access the port. (Port
Security cannot be enabled on a port in single-host mode.)
• Multiple Host — Multiple hosts can be attached to a single
802.1x-enabled port. Only the first host must be authorized, and
then the port is wide-open for all who want to access the network.
If the host authentication fails, or an EAPOL-logoff message is
received, all attached clients are denied access to the network.
• Multiple Session — A number of specific authorized hosts may
access the port. Each host is treated as if it was the first and only
user and must be authenticated. Filtering is based on the source
MAC address.
– Action on Single Host Violation — Select the action to be applied to
packets arriving in Single Session/Single Host mode, from a host
whose MAC address is not the supplicant MAC address. The options
are:
• Discard — Discard the packets from any unlearned source.
• Forward — Forward the packets from an unknown source,
however, the MAC address is not learned.Dell PowerConnect 55xx Systems User Guide 151
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Shutdown — Discard the packet from any unlearned source and
shut down the port. Ports remain shutdown until they are
activated, or the switch is reset.
Host Authentication pages:
The following is an example of the CLI commands:
Table 8-16. Host Authentication CLI Commands
CLI Command Description
dot1x host-mode {multihost|single-host|multisessions}
Allows a single host (client) or multiple
hosts on an IEEE 802.1x-authorized port.
dot1x traps macauthentication failure
no dot1x traps macauthentication failure
Enables sending traps when a MAC
address is successfully authenticated by
the 802.1X mac-authentication access
control.
Use the no form of this command to
disable the traps.
dot1x traps macauthentication success
no dot1x traps macauthentication success
Enables sending traps when MAC address
was failed in authentication of the 802.1X
MAC authentication access control.
Use the no form of this command to
disable the traps.
dot1x violation-mode
{restrict | protect |
shutdown}
no dot1x violation-mode
Configures the action to be taken, when a
station whose MAC address is not the
supplicant MAC address, attempts to
access the interface.
Use the no form of this command to
return to default.
show dot1x advanced
[gigabitethernet|tengigabite
thernet] port-number]
Displays 802.1x advanced features for the
device or specified interface.
console(config)# interface gi1/0/1
console(config-if)# dot1x host-mode multi-host
console(config-if)# dot1x host-mode single-host
console(config-if)# dot1x host-mode multi-sessions152 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port Authentication Users
The Port Authentication Users page enables you to view users that attempted
to be authenticated.
To view ports and their authentication definitions:
1 Click Switching > Network Security > Dot1 Authentication > Port
Authentication Users to display the Port Authentication Users page.
Figure 8-16. Port Authentication Users
The ports and their authentication definitions are displayed.
– User Name — Supplicant names that were authenticated on each
port.
– Port — Number of port.
– Session Time — Amount of time (in seconds) that the supplicant was
logged on the port.Dell PowerConnect 55xx Systems User Guide 153
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Authentication Method — Method by which the last session was
authenticated. The options are:
• None—No authentication is applied; it is automatically
authorized.
• RADIUS—Supplicant was authenticated by a RADIUS server.
• MAC Address—Displays the supplicant MAC address.
– MAC Address — MAC address of user who attempted to be
authenticated.
– VLAN — VLAN assigned to the user.
– Filter — Filter that was applied to the user by receiving the
policy/ACL name from the RADIUS server (Dynamic ACL
Assignment).
2 Click Details to view the names of the VLAN filters (Filter #1 and Filter
#2) defined on the port, in addition to the above fields.154 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxU_Switching_NetworkSecurity.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Display Port Authentication Users Using the CLI Commands
The following table summarizes the CLI commands for displaying port
authentication users:
The following is an example of the CLI commands:
Table 8-17. Display Port Authentication Users CLI Commands
CLI Command Description
show dot1x users Displays active 802.1x authenticated users for the
device.
console# show dot1x users
Port User Session Auth MAC VLAN Filter
Name Time Method Address
------ ----- ----------- -------- -------------- ---- ------
gi1/0/1 Bob 1d 03:08:58 Remote 0008.3b79.8787 3
Port User Session Auth MAC VLAN Filter
Name Time Method Address
------ ----- ----------- -------- -------------- ---- ------
gi1/01 Bob 1d 09:07:38 Remote 0008.3b79.8787 3 OK
gi1/01 Tim 03:08:58 Remote 0008.3b79.3232 9 OK
gi1/03 Paul 02:12:48 Remote 0008.3b89.8237 8 Warning
console# show dot1x users username Bob
Port User Session Auth MAC VLAN Filter
Name Time Method Address
------ ----- ----------- -------- -------------- ---- ------
gi1/01 Bob 1d 09:07:38 Remote 0008.3b79.8787 3 OKTemplate Last Updated - 2/7/2007Dell PowerConnect 55xx Systems User Guide 155
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
9
Configuring System Information
This section describes how to set system parameters, such as security features,
switch software, system time, logging parameters and more.
It contains the following topics:
• General Switch Information
• Time Synchronization
• Logs
• IP Addressing
• Diagnostics
• Management Security
• DHCP Server
• DHCP Server
• File Management
• Stack Management
• sFlow156 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
General Switch Information
This section describes how to view and set general switch parameters.
It contains the following topics:
• Asset Information
• System Health
• Power over Ethernet
Asset Information
Use the Asset page to view and configure general device information,
including the system name, location, contact, system MAC Address, System
Object ID, date, time, and system up time.
To configure general device parameters:
1 Click System > General > Asset in the tree view to display the Asset page.
Figure 9-1. AssetDell PowerConnect 55xx Systems User Guide 157
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Enter/view the parameters:
– System Name (0-159 Characters) — Enter the user-defined device
name.
– System Contact (0-159 Characters) — Enter the name of the contact
person.
– System Location (0-159 Characters) — Enter the location where the
system is currently running.
– MAC Address — Displays the device MAC address.
– Sys Object ID — Displays the vendor's authoritative identification of
the network management subsystem contained in the entity.
– Date — Enter the current date (mandatory). This date can also be
entered in the Manual Time Settings page. If SNTP has been defined,
but the SNTP server is not available, the switch uses the date and time
in this field and the Time field.
– Time — Enter the current time (mandatory). This time can also be
entered in the Manual Time Settings page. If SNTP has been defined,
but the SNTP server is not available, the switch uses the date and time
in this field and the Date field.
– System Up Time — Displays the amount of time since the last device
reset.
3 For each unit in the stack (displayed in Unit No.), the following
information is displayed:
– Service Tag — Displays the service reference number used when
servicing the device.
– Asset Tag — Enter the device asset tag.
– Serial No. — Displays the device serial number.
4 Enter the Asset Tag (0-16 Characters) for each unit in the stack. This is
the user-defined reference for the unit.158 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Entering Asset Information Using the CLI Commands
The following table summarizes the CLI commands for entering fields
displayed on the Asset page.
The following is an example of the CLI commands
Table 9-1. Asset CLI Command
CLI Command Description
snmp-server contact text
no snmp-server contact
Configures the system contact
(sysContact) name.
Use the no form of the command to
remove the system contact
information.
snmp-server location text
no snmp-server location
Configures the system location
string.
Use the no form of this command to
remove the location string.
hostname name
no hostname
Specifies the device host name.
Use the no form of the command to
remove the existing host name.
clock set hh:mm:ss
{month|day} year
Sets the system clock to this time.
asset-tag [unit unit] tag
no asset-tag [unit unit]
Assigns the asset tag to the unit.
Removes the asset tag from the unit.
console (config)# asset-tag 2365491870Dell PowerConnect 55xx Systems User Guide 159
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
System Health
To view the device’s power information and set fan administration state:
1 Click System > General > System Health in the tree view to display the
System Health page.
Figure 9-2. System Health
The System Health page displays the following fields:
– Unit No. — The unit in the stack for which information is displayed.
Power Supply Status —Displays the following columns:
– PS — The power status of the internal power unit. The possible
options are:
• Checked — The power supply is operating normally.
• Unchecked — The power supply is not operating normally.
• Not Present — The power supply is currently not present.160 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– RPS — The device has one of two auxiliary power supplies:
Redundant Power Supply (RPS) for non-PoE devices and Modular
Power Supply (MPS) for PoE devices. Only one of these may be
present at one time. For each type of power supply, the possible
options are:
• Checked — The power supply is operating normally.
• Unchecked — The power supply is not operating normally.
• Not Present — The power supply is currently not present.
– Temperature — Displays the temperature on the device.
– Fan Status — The device has two fans. The device constantly
measures the internal temperature, and powers the fans on/off
according to the temperature. The user can set the fans to be
constantly on. The possible options are:
• Checked — The fans are operating normally.
• Unchecked — At least one of the fans is not operating
normally.
– Fan Admin State — On/Auto status that user configured in the Edit
page.
– Fan Current Level — Specifies whether the fan is actually on or off.
2 The lower block displays the condition under which a fan will be turned on
or off.
– Fan Level — The on or off level.
– Condition — The temperature at which the fans will be turned on or
off. The device temperature is displayed in Celsius. The device
temperature threshold is 40 C (104 F).Table 9-2 displays the
temperature in Fahrenheit in increments of 5.
NOTE: It is recommended to leave Fan User Level at Auto so that the fans
operate according to the temperature of the switch.
3 To control the fans on a unit, or set the default value, click Edit, and enter
the fields:
– Unit ID — Select the unit ID whose fan will be adjusted.Dell PowerConnect 55xx Systems User Guide 161
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Fan Admin State — Set one of the options:
• Auto — Fans are turned on when the internal temperature of the
switch is higher than the threshold displayed on the Summary
page in the Condition field.
• ON — Turns fan on under all conditions
Table 9-2. Celsius to Fahrenheit Conversion Table
Viewing System Health Information Using the CLI Commands
The following table summarizes the CLI commands for viewing fields
displayed on the System Health page.
Celsius Fahrenheit
0 32
5 41
10 50
15 59
20 68
25 77
30 86
35 95
40 104
Table 9-3. System Health CLI Command
CLI Command Description
show system [unit unit] Displays system information.
system fans always-on
[unit unit]
no system fans always-on
Sets the system fans to On regardless of device
temperature.
Use the no form of the command to return to
default
show system fans Displays the fans’ status.162 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
Power over Ethernet
A Power over Ethernet (PoE) switch is a type of PSE (Power Sourcing
Equipment) that delivers electrical power to connected Powered Devices
(PDs) over existing copper cables, without interfering with the network
traffic, updating the physical network or modifying the network
infrastructure.
Using PoE eliminates the need to:
• Place all network devices next to power sources.
• Deploy double-cabling systems, significantly decreasing installation costs.
PoE can be used in any network that deploys relatively low-powered devices
connected to the Ethernet LAN. PDs are devices that receive power from the
PowerConnect power supplies, such as:
• IP phones
console# show system
Unit Type
---- ----------------------
2 PowerConnect 5548
Unit Main Power Supply Redundant Power Supply
---- ----------------- ----------------------
2 OK
Unit Fans Status
---- -------------
2 OK
Unit Temperature (Celsius) Temperature Sensor Status
---- ------------------------- ---------------------
2 41 OK
Unit Up time
---- ---------------
2 02,00:03:32Dell PowerConnect 55xx Systems User Guide 163
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Wireless access points
• IP gateways
• Audio and video remote monitoring devices
PDs are connected to the device via the Gigabit ports.
Error Conditions
Traps are generated when the following occur:
• Status change to port delivering/not delivering power to PD.
• Indication that power usage is above the defined threshold.
• Indication that power usage is below the threshold.164 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring PoE
To configure PoE parameters on devices equipped with PoE:
1 Click System > General > Power over Ethernetin the tree view to display
the Power Over Ethernet: Summary page.
Figure 9-3. Power Over Ethernet: Summary
2 The PoE global parameters are displayed:
– Power Status — The inline power source status.
• On — The power supply unit is functioning.
• Off — The power supply unit is not functioning.
• Faulty — The power supply unit is functioning, but an error has
occurred, for example, a power overload or a short circuit.
– Nominal Power — The actual amount of power the device can supply,
in watts.Dell PowerConnect 55xx Systems User Guide 165
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Consumed Power — The amount of the power used by the device, in
watts.
3 Enter the following parameters:
– Power Limit Mode — Enter one of the following options for the
system power limit mode.
• Port — The power limit of the port depends on port
configuration.
• Max Port Power — In this mode, each port can get up to the
maximum power, which is 15.4W.
– System Usage Threshold (1-99 Percent) — Enter the percentage of
power consumed before a trap is generated.
– Traps — Enable/disable PoE traps on the device. If enabled, traps are
generated if one of the following situations occurs:
• Status change to port delivering/not delivering power to PD
• Indication that power usage is above the defined threshold
• Indication that power usage is below the threshold
NOTE: If traps are enabled, you must also enable SNMP, and configure at least one SNMP
notification recipient.
4 To view PoE port settings for a unit in the stack, select its Unit ID. The
port PoE parameters are displayed for all ports on the unit. The fields
displayed in this block are described in the Edit page.
5 To set PoE settings for a port, click Edit.
6 Select a port in the Port field, and enter the following PoE parameters for
the PDs connected to this port.
– PoE Admin Status — Select the device PoE mode. The possible
options are:
• Auto — Enables the Device Discovery protocol, and provides
power to the device using the PoE unit. The Device Discovery
Protocol enables the device to discover Powered Devices attached
to the device interfaces, and to learn their classification.
• Never — Disables the Device Discovery protocol, and stops the
power supply to the device using the PoE module.166 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Power Priority Level— Enter the priority that determines the power
that is used if the power supply is from Critical to Low. If, for
example, the power supply is running at 99% usage, and port 1 is
prioritized as Critical, but port 3 is prioritized as Low, port 1 is will
receive power before port 3.
– Power Limit (0-15.4) — Enter the maximum amount of power
that the PoE unit may deliver to this port.
– Powered Device (0-24 characters) — Enter a user-defined
description of the PD connected to the port, such as: "Bob Smith’s
telephone".
The following fields are displayed on this page:
– PoE Operational Status — Whether the port is currently providing
power. If it is not providing power, the reason is displayed.
– Power Consumption — The amount of power being consumed by
the powered device.
– Overload Counter — Total power overload occurrences.
– Short Counter — Total power shortage occurrences.
– Denied Counter — Number of times the powered device was
denied power.
– Absent Counter— Number of times the power supply was stopped to
the PD because it was no longer detected.
– Invalid Signature Counter — Number of times an invalid signature
was received. Signatures are the means by which the powered device
identifies itself to the PSE. Signatures are generated during powered
device detection, classification, or maintenance.Dell PowerConnect 55xx Systems User Guide 167
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Managing PoE Using the CLI Commands
The following table describes the CLI commands for viewing fields displayed
on the Power Over Ethernet pages.
Table 9-4. Power Over Ethernet CLI Commands
CLI Command Description
power inline {auto|never} Configures the administrative
status of the inline power on an
interface.
power inline powered-device pdtype
no power inline powered-device
Adds a description of the powered
device type. Use the no version of
the command to remove the
description.
Use the no form of this command
to restore the default
configuration.
power inline priority
{critical|high|low}
no power inline priority
Configures the priority of the
interface from the point of view of
inline power management.
Use the no form of this command
to restore the default
configuration.
power inline usage-threshold
no power inline usage-threshold
Configures the threshold for
triggering alarms.
Use the no form of this command
to restore the default
configuration.
power inline traps enable
no power inline traps enable
Enables PoE device traps.
Use the no form of this command
to disable traps.
power inline limit-mode {maxport-power|port}
no power inline limit-mode
Sets the power limit mode of the
system.
Use the no form of this command
to return to default.168 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
show power inline
[[[gigabitethernet|tengigabitethe
rnet]port-number]|module stackmember-number]
Displays PoE configuration
information for all interfaces or for
a unit in the stack.
console# show power inline
Unit Power Nominal Power Consumed Power Usage Threshold Traps
---- ------- ------------- ------------------ --------------- -----
1 Off 1 Watts 0 Watts (0%) 95 Disable
2 Off 1 Watts 0 Watts (0%) 95 Disable
3 Off 1 Watts 0 Watts (0%) 95 Disable
4 Off 1 Watts 0 Watts (0%) 95 Disable
Table 9-4. Power Over Ethernet CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 169
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Time Synchronization
The system clock runs from the moment the system starts up, and keeps track
of the date and time.
The date and time may be either set manually, or it may be received from an
SNTP server.
This section describes how to set system time, and contains the following
sections:
• Manual Time Settings
– Setting System Time and Daylight Savings Time
– CLI Commands for Setting Manual Time
• System Time from an SNTP Server
– Global Settings (Clock Source)
– SNTP Global Settings
– SNTP Authentication
– SNTP Servers
– SNTP Interfaces
– CLI Script for Receiving Time from an SNTP Server
Manual Time Settings
This section describes how to set the system time manually on the device.
It contains the following topics:
• Setting System Time and Daylight Savings Time
• CLI Commands for Setting Manual Time170 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Setting System Time and Daylight Savings Time
Use the Manual Time Settings page to set system date/time manually (as
opposed to receiving them from an external SNTP server). For more
information on SNTP, see "System Time from an SNTP Server" on page 177.
If system time is kept using an external SNTP clock, and the external SNTP
clock fails, the system time reverts to the time set here or in the Asset page.
In addition to setting the local clock, you can use this page to enable Daylight
Savings Time (DST) on the device.
The following is a list of DST start and end times in various countries:
• Albania — Last weekend of March until the last weekend of October.
• Australia — From the end of October until the end of March.
• Australia - Tasmania — From beginning of October until the end of
March.
• Armenia — Last weekend of March until the last weekend of October.
• Austria — Last weekend of March until the last weekend of October.
• Bahamas — From April to October, in conjunction with U.S. summer
hours.
• Belarus — Last weekend of March until the last weekend of October.
• Belgium — Last weekend of March until the last weekend of October.
• Brazil — From the 3rd Sunday in October until the 3rd Saturday in
March. During the period of Daylight Saving Time, Brazilian clocks go
forward one hour in most of the Brazilian southeast.
• Chile — Easter Island 9th March 12th October. The first Sunday in March
or after 9th March.
• China — China does not operate Daylight Saving Time.
• Canada — From the first Sunday in April until the last Sunday of October.
Daylight Saving Time is usually regulated by provincial and territorial
governments. Exceptions may exist in certain municipalities.
• Cuba — From the last Sunday of March to the last Sunday of October.
• Cyprus — Last weekend of March until the last weekend of October.
• Denmark — Last weekend of March until the last weekend of October.
• Egypt — Last Friday in April until the last Thursday in September. Dell PowerConnect 55xx Systems User Guide 171
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Estonia — Last weekend of March until the last weekend of October.
• Finland — Last weekend of March until the last weekend of October.
• France — Last weekend of March until the last weekend of October.
• Germany — Last weekend of March until the last weekend of October.
• Greece — Last weekend of March until the last weekend of October.
• Hungary — Last weekend of March until the last weekend of October.
• India — India does not operate Daylight Saving Time.
• Iran — From 1st Farvardin until the 1st Mehr.
• Iraq — From 1st April until 1st October.
• Ireland — Last weekend of March until the last weekend of October.
• Israel — Varies year-to-year.
• Italy — Last weekend of March until the last weekend of October.
• Japan — Japan does not operate Daylight Saving Time.
• Jordan — Last weekend of March until the last weekend of October.
• Latvia — Last weekend of March until the last weekend of October.
• Lebanon — Last weekend of March until the last weekend of October.
• Lithuania — Last weekend of March until the last weekend of October.
• Luxembourg — Last weekend of March until the last weekend of October.
• Macedonia — Last weekend of March until the last weekend of October.
• Mexico — From the first Sunday in April at 02:00 to the last Sunday in
October at 02:00.
• Moldova — Last weekend of March until the last weekend of October.
• Montenegro — Last weekend of March until the last weekend of October.
• Netherlands — Last weekend of March until the last weekend of October.
• New Zealand — From the first Sunday in October until the first Sunday
on or after 15th March.
• Norway — Last weekend of March until the last weekend of October.
• Paraguay — From 6th April until 7th September.
• Poland — Last weekend of March until the last weekend of October.
• Portugal — Last weekend of March until the last weekend of October.172 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Romania — Last weekend of March until the last weekend of October.
• Russia — From the 29th March until the 25th October.
• Serbia — Last weekend of March until the last weekend of October.
• Slovak Republic — Last weekend of March until the last weekend of
October.
• South Africa — South Africa does not operate Daylight Saving Time.
• Spain — Last weekend of March until the last weekend of October.
• Sweden — Last weekend of March until the last weekend of October.
• Switzerland — Last weekend of March until the last weekend of October.
• Syria — From 31st March until 30th October.
• Taiwan — Taiwan does not operate Daylight Saving Time.
• Turkey — Last weekend of March until the last weekend of October.
• United Kingdom — Last weekend of March until the last weekend of
October.
• United States of America — From the second Sunday of March at 02:00
to the first Sunday of November at 02:00.Dell PowerConnect 55xx Systems User Guide 173
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To manually set the device time:
1 Click System > Time Synchronization > Manual Time Settingsin the
tree view to display the Manual Time Settings page.
Figure 9-4. Manual Time Settings
2 Enter the following local settings:
– Date — The system date.
– Local Time — The system time.
– Time Zone Offset — The difference between Greenwich Mean Time
(GMT) and local time. For example, the Time Zone Offset for Paris is
GMT +1:00, while the local time in New York is GMT –5:00.
3 To set Daylight Savings Time (DST), select the Daylight Savings field and
select one of the possible options:
– USA — The device switches to DST at 2 a.m. on the second Sunday
of March, and reverts to standard time at 2 a.m. on the first Sunday of
November. 174 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– European — The device switches to DST at 1:00 am on the last
Sunday in March, and reverts to standard time at 1:00 am on the last
Sunday in October. The European option applies to EU members,
and other European countries using the EU standard.
– Other — Specifies that you will set DST manually in the fields
described below.
If you selected USA or European you are finished. If you selected Other,
proceed to the next step.
There are two types of DST possible when Others is selected. You can set a
specific date in a particular year, or you can set a recurring setting,
irrespective of the year. For a specific setting in a particular year, complete
the Daylight Savings area, and for a recurring setting, complete the
Recurring area.
If Other is selected, the From and To fields must be defined either in the
Non-recurring or Recurring section.
4 To enter non-recurring DST parameters, enter the following fields:
– From — The time that DST begins. The possible options are:
• DD/MMM/YY — The date, month, and year at which DST
begins.
• HH/MM — The time (hour and minutes) at which DST begins.
– To — The time that DST ends. The possible options are:
• DD/MMM/YY — The date, month, and year at which DST ends.
• HH/MM — The time (hour and minutes) at which DST ends.
5 To enter recurring DST parameters, select Recurring and enter the
following fields:
– From — The time that DST begins each year, for example, DST
begins locally every second Sunday in April at 5:00 am. The possible
options are:
• Day — The day of the week from which DST begins every year.
• Week — The week within the month from which DST begins
every year.
• Month — The month of the year in which DST begins every year. Dell PowerConnect 55xx Systems User Guide 175
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Time — The time at which DST begins every year.
– To — The recurring time that DST ends each year, for example, DST
ends locally every fourth Friday in October at 5:00 am. The possible
options are:
• Day — The day of the week at which DST ends every year.
• Week — The week within the month at which DST ends every
year.
• Month — The month of the year in which DST ends every year.
• Time — The time at which DST ends every year.
CLI Commands for Setting Manual Time
The following steps (in any order) must be completed before setting time
manually:
• Set system time
• Define the time zone in relation to GMT.
• Configure Daylight Savings Time.
The following table summarizes the CLI commands for setting fields
displayed in the Manual Time Setting pages when the clock source is Local.
Table 9-5. Manual Time Setting CLI Commands
CLI Description
clock set hh:mm:ss {[day
month]|[month day]} year
Set the system clock to this time.
clock summer-time zone
recurring {usa|eu|{week
day month hh:mm week day
month hh:mm}}[offset]
Configures the system to automatically
switch to summer time (according to the
USA and European standards) every year on a
recurring basis. 176 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
clock summer-time zone
date date month year hh:mm
date month year hh:mm
[offset]
clock summer-time zone
date month date year hh:mm
month date year hh:mm
[offset]
no clock summer-time
Configures the system to automatically
switch to summer time (Daylight Savings
Time) for a specific period - date/month/year
format.
Use the no form of the command to
configure the system not to switch to
summer time (Daylight Savings Time).
clock timezone zone hoursoffset [minutes offset]
Sets the time zone and names it "zone" for
display purposes.
show clock Displays the time and date from the system
clock.
Table 9-5. Manual Time Setting CLI Commands (Continued)
CLI DescriptionDell PowerConnect 55xx Systems User Guide 177
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
A sample script to set system time manually is shown below
System Time from an SNTP Server
This section describes how to receive date/time from an SNTP server.
It contains the following topics:
• SNTP Overview
• SNTP Global Settings
• SNTP Authentication
• SNTP Servers
• SNTP Interfaces
Table 9-6. CLI Script to Set Manual System Time
CLI Description
Console# clock set 13:32:00 7 Nov 2010 Set the system time.
console# configure
console(config)# clock timezone Ohio +2
Set the time zone to GMT
plus 2 hours. The name of
the zone "Ohio" is purely for
documentation purposes.
This is not mandatory for
manual time, but is
recommended. It enables
anyone seeing the time to
know what that time is in
respect to their timezone.
console(config)# clock summer-time
Ohio_Summer recurring usa
Set Daylight Savings Time
such that it recurs every year
and is based on the summer
time schedule of the USA.
The name of the zone
"Ohio_Summer" is for
documentation purposes
only.
console(config)# exit
console# show clock
Display the system time.178 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
SNTP Overview
The switch supports the Simple Network Time Protocol (SNTP), which
provides accurate network switch clock time synchronization of up to 100
milliseconds. The implementation of SNTP is based on SNTPv4 (RFC 2030).
SNTP is a simple and lighter version of NTP, and can be used when the
ultimate performance of the full NTP implementation, described in
RFC-1305, is not required. SNTP operates with NTP, thus an SNTP client
can work with both SNTP and NTP servers.
The switch operates only as a client, and cannot provide time services to other
systems.
SNTP Server Types
The switch can accept time information from the following server types:
• Unicast
Polling for Unicast information is used for polling a server whose IP
address is known. This is the preferred method for synchronizing device
time, as it is most secure.
Up to eight SNTP servers can be defined.
If this method is selected, SNTP information is accepted only from SNTP
servers defined in the SNTP Servers page.
Time levels T1 - T4 (see the "Algorithm for Selecting Designated SNTP
Server" on page 180 section) are used to determine from which server time
information is accepted.
If Unicast polling is not enabled or if no servers are defined on the device,
the device accepts time information from any SNTP server of the type that
is enabled, which responds.
• Anycast
Polling for Anycast information is used when the SNTP server’s IP address
is not defined or it cannot be reached. If this method is enabled, time
information can be received from any SNTP server on the network. The Dell PowerConnect 55xx Systems User Guide 179
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
device time and date are synchronized when it proactively requests
synchronization information.
Anycast polling to get time information is preferable to Broadcast polling,
because it is more secure.
Time levels T3 and T4 are used to determine from which server time
information is accepted.
• Broadcast
Broadcast information is used if receiving Broadcast packets has been
enabled, and one of the following situations occurs:
– The SNTP server IP address has not been defined.
– Several time-information packets are received and the Broadcast time
is best according to the algorithm defined in "Algorithm for Selecting
Designated SNTP Server" on page 180.
Broadcast is the least secure method of receiving time, because it is both
unsecured and the time information was not specifically requested by the
device. Anycast is also unsecured, but time-information packets are only
accepted if they were requested.
Stratums
Each SNTP server is characterized by stratums, which define the accuracy of
its clock. The stratum is the distance, in terms of NTP hops, from the most
authoritative time server. The lower the stratum (where zero is the lowest),
the more accurate the clock. The switch accepts time from stratum 1 and
above.
The following provides examples of clocks from various stratums:
• Stratum 0 — A real time clock is used as the time source, for example, a
GPS system.
• Stratum 1 — A server that is directly linked to a Stratum 0 time source is
used.
• Stratum 2 — The time source is distanced from the Stratum 1 server over
a network path, for example, a Stratum 2 server receives the time over a
network link, via NTP, from a Stratum 1 server.180 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Algorithm for Selecting Designated SNTP Server
Messages received from SNTP servers are logged, until there are three
responding servers, or the timer expires. In any event, when the third message
is received, the timer expires.
A server is selected to be the “designated server” according to the following
criteria:
• The stratum (the distance in terms of NTP hops from the best
authoritative time servers) is considered, and the server with the best
(lowest) stratum is selected.
• If there is a tie in stratums, packets from servers defined on the device are
preferred to Anycast packets, which in turn are preferred to Broadcast
packets.
• If multiple servers pass the above criteria, then the server that sent the first
(earliest) time packet is chosen.
If a better server is discovered later, it is selected to be the “designated server”
at that time.
Polling
You can configure the system to acquire time information in the following
ways:
• Enable polling — Time information is requested every polling interval.
• Do not enable polling — Time information is received when the system is
brought up and every time that a topological change is made to the
Running Configuration file, for example when an SNTP Unicast server is
added.
This is configured by the user in the SNTP Global Settings page.
On power up, when the switch sends a request and there is no reply, it issues
another request (three retries at most) after 20 seconds of waiting.
If no SNTP server is found, the process is invoked every “poll interval” (set in
the SNTP Global Settings page), and a management trap is triggered.
Authentication
You can require that SNTP servers be authenticated, although this is not
mandatory (see the SNTP Authentication pages). Dell PowerConnect 55xx Systems User Guide 181
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
MD5 (Message Digest 5) Authentication safeguards device synchronization
paths to SNTP servers. MD5 is an algorithm that produces a 128-bit hash
value. MD5 is a variation of MD4, and increases MD4 security.
MD5 both verifies the integrity of the communication and authenticates the
origin of the communication.
Global Settings (Clock Source)
System time can be set manually, or it may be received from an external
SNTP server. You if wish to set the system time manually, you do not to use
the Global Settings page, because the default is manual (local) system time.
To set the clock source:
1 Click System > Time Synchronization > Global Settings in the tree view
to display the Global Settings page.
Figure 9-5. Global Settings182 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Select the Clock Source. The possible options are:
– Local—System time is taken from the device’s internal clock. Set this
as defined in "Manual Time Settings" on page 169.
– SNTP— System time is set via an SNTP server. Set SNTP parameters
as defined in "System Time from an SNTP Server" on page 177.
Defining the Clock Source Using CLI Commands
The following table summarizes the CLI commands for setting the clock
source.
The following is an example of the CLI commands:
SNTP Global Settings
If SNTP was selected as the clock source in the Global Settings page, you
must define the mechanism of setting time from an SNTP server. This is
done in the SNTP pages, described below.
Table 9-7. Clock Source CLI Command
CLI Description
clock source {sntp}
no clock source
Configures an external time source for the
system clock.
Use the no form of this command to disable
the external time source.
show clock [detail] Displays the time and date from the system
clock and its source.
console# configure
console(config)# clock source sntp
console# show clock detail
3:29:03 UTC Sep 7 2010
Time source is sntp
Time zone:
Offset is UTC+0Dell PowerConnect 55xx Systems User Guide 183
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To define the types of server from which the device accepts SNTP
information and the polling interval:
1 Click System > Time Synchronization > SNTP Global Settings in the
tree view to display the SNTP Global Settings page.
Figure 9-6. SNTP Global Settings
2 Enter the fields:
– Poll Interval (60-86400) — Enter the interval (in seconds) at which
the SNTP servers are polled.
– Receive Broadcast Servers Updates — Enable/disable receiving time
information from Broadcast servers.
– Receive Anycast Servers Updates — Enable/disable receiving time
information from Anycast SNTP servers.
– Receive Unicast Servers Updates — Enable/disable receiving time
information from the SNTP servers defined on the switch.
– Poll Unicast Requests — Enable/disable sending SNTP Unicast server
time information requests to the SNTP server.184 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining SNTP Global Settings Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the SNTP Global Settings pages.
The following is an example of the CLI commands:
SNTP Authentication
Use the SNTP Authentication page to enable/disable SNTP authentication
between the device and an SNTP server, and to set the means by which the
SNTP server is authenticated.
Table 9-8. SNTP Global Parameters CLI Commands
CLI Command Description
sntp client poll timer
seconds
no sntp client poll timer
Sets the polling time for an SNTP client.
Use the no form of this command to
restore the default configuration.
sntp broadcast client
enable
no sntp broadcast client
enable
Enables SNTP Broadcast clients.
Use the no form of this command to
disable SNTP Broadcast clients.
sntp anycast client enable
no sntp anycast client
enable
Enables SNTP Anycast clients.
Use the no form of this command to
disable SNTP Anycast clients.
sntp unicast client enable
no sntp unicast client
enable
Enables SNTP predefined Unicast clients.
Use the no form of this command to
disable SNTP Unicast clients.
show sntp configuration Displays SNTP configuration
console(config)# sntp anycast client enableDell PowerConnect 55xx Systems User Guide 185
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To configure SNTP authentication:
1 Click System > Time Synchronization > SNTP Authentication in the
tree view to display the SNTP Authentication: Summary page.
Figure 9-7. SNTP Authentication: Summary
The previously-defined authentication keys are displayed.
2 Enable/disable SNTP Authentication. This enables/disables
authenticating SNTP sessions between the device and an SNTP server.
3 Multiple keys can be defined. To add a new SNTP authentication key, click
Add, and enter the fields.
– Encryption Key ID (1 - 4294967295) — Enter the number used to
identify this SNTP authentication key internally.
– Authentication Key (1 - 8 Characters) — Enter the key used for
authentication. The SNTP server must send this key for the switch to
use its time/date information.186 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Trusted Key — Check to specify that the encryption key is used to
authenticate the (Unicast) SNTP server. If this is not checked, the
key is not used for authentication (and another key(s) is used).
Defining SNTP Authentication Settings Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the SNTP Authentication pages.
The following is an example of the CLI commands:
Table 9-9. SNTP Authentication CLI Commands
CLI Command Description
sntp authenticate
no sntp authenticate
Defines authentication for received SNTP
traffic from servers.
Use the no form of this command to disable
the feature.
sntp trusted-key keynumber
no sntp trusted-key keynumber
Authenticates the identity of a system to
which SNTP will synchronize.
Use the no form of this command to disable
system identity authentication.
sntp authentication-key
key-number md5 value
no sntp authenticationkey key-number
Defines an authentication key for SNTP.
Use the no form of this command to remove
the authentication key for SNTP.
console(config)# sntp authenticate
console(config)# sntp trusted-key 8
console(config)# sntp authentication-key 8 md5 ClkkeyDell PowerConnect 55xx Systems User Guide 187
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
SNTP Servers
To add an SNTP server or display SNTP server information:
1 Click System > Time Synchronization > SNTP Servers in the tree view to
display the SNTP Servers: Summary page.
Figure 9-8. SNTP Servers: Summary
The following is displayed for the previously-defined servers:
– SNTP Server — IP address of server.
– Polling — Polls the selected SNTP server for system time information,
when enabled.
– Encryption Key ID — Key Identification used to communicate
between the SNTP server and device. 188 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Preference — SNTP server providing SNTP system time information.
The system displays on of the following options:
• Primary — The server from which time was last accepted.
• Secondary — All other servers from which time was received.
– Status — The operating SNTP server status. The possible options are:
• Up — The SNTP server is currently operating normally.
• Down — An SNTP server is currently not available, for example,
the SNTP server is currently not connected or is currently down.
• In progress — The SNTP server is currently sending or receiving
SNTP information.
• Unknown — The progress of the SNTP information currently
being sent is unknown, for example, the device is currently
looking for an interface.
– Last Response — The last time a response was received from the
SNTP server.
– Offset — The estimated offset of the server's clock, relative to the
local clock, in milliseconds. The host determines the value of this
offset, using the algorithm described in RFC 2030.
– Delay — The estimated round-trip delay of the server's clock, relative
to the local clock over the network path between them, in
milliseconds. The host determines the value of this delay, using the
algorithm described in RFC 2030.
2 To add an SNTP Server, click Add, and enter the fields:
– Supported IP Format — Select whether IPv4 or IPv6 format is used
for the IP address of the SNTP server.
– IPv6 Address Type — When the server supports IPv6, this specifies
the type of static address supported. Select one of the possible
options:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.Dell PowerConnect 55xx Systems User Guide 189
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. Select one of the
possible options:
• VLAN — The VLAN on which the IPv6 interface is configured.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
– SNTP Server — Enter the SNTP server’s IP address.
– Poll Interval — Enable/disable polling the selected SNTP server for
system time information, when enabled.
– Encryption Key ID — Check to use an encryption key, and select one
of the encryption keys that was defined in the SNTP Authentication
pages.
Defining SNTP Servers Settings Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the SNTP Server pages.
Table 9-10. SNTP Server CLI Commands
CLI Command Description
sntp server {ipv4-
address|ipv6-address|ipv6-
address|hostname} [poll]
[key key-id]
no sntp server {ipv4-
address|ipv6-address|ipv6-
address|hostname}
Configures the device to use SNTP to
request and accept SNTP traffic from a
server.
Use the no form of this command to
remove a server from the list of SNTP
servers.
sntp unicast client poll
no sntp unicast client poll
Enables polling for the SNTP predefined
Unicast clients.
Use the no form of this command to
disable the polling for the SNTP client.
show sntp status Displays the SNTP server statuses.190 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
SNTP Interfaces
If receiving time information from Anycast servers is enabled, you can
determine through which interface the Anycast packets are sent and received.
If no interface is defined, Anycast requests are not sent.
console(config)# sntp server 100.1.1.1 poll key 10
console# show sntp status
Clock is unsynchronized
Unicast servers:
Server Status Last Response Offset Delay
[mSec] [mSec]
--------------- --------- ------------- -------- -------
Anycast server:
Server Interface Status Last Response Offset Delay
[mSec] [mSec]
--------------- -------- -------------- ------ ------
Broadcast:
Interface IP Address Last Response
------------ --------------- -----------------------
gi1/0/1 00:00:00.0 Jan 1 2010Dell PowerConnect 55xx Systems User Guide 191
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To enable receiving Anycast updates on an interface:
1 Click System > Time Synchronization > SNTP Interface Settings to
display the SNTP Interface Settings: Summary page.
Figure 9-9. SNTP Interface Settings: Summary
The following fields are displayed for every interface for which an SNTP
interface has been enabled:
– Interface — The port, LAG or VLAN on which SNTP is enabled.
– Receive Servers Updates — Displays whether the interface is enabled
to receive updates from the SNTP server.
2 To add an interface that can receive SNTP server updates, click Add.
3 Select an interface and enable/disable State to indicate that the interface
can now receive/not receive SNTP server updates.192 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining SNTP Interface Settings Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the SNTP Interface Settings pages.
Table 9-11. SNTP Interface Settings CLI Commands
CLI Command Description
sntp client enable
{[[gigabitethernet|tengigabitethern
et] port-id|vlan vlan-id|portchannel LAG-number]}
no sntp client enable
{[[gigabitethernet|tengigabitethern
et]port-number|vlan vlan-id|portchannel LAG-number]}
Enables the SNTP client on an
interface in Global
Configuration mode.
Use the no form of this
command to disable the SNTP
client.
sntp client enable
no sntp client enable
Enables SNTP client on an
interface in Interface
Configuration mode.
Use the no form of this
command to disable the SNTP
client.
show sntp configuration Shows the configuration of the
Simple Network Time Protocol
(SNTP).Dell PowerConnect 55xx Systems User Guide 193
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
CLI Script for Receiving Time from an SNTP Server
The following is a sample script that configures receiving system time from an
SNTP server.
console# configure
console(config)# sntp client enable gi1/0/1
console# exit
console# configure
console(config)# interface gi1/0/1
console(config-if)# sntp client enable
console# show sntp configuration
SNTP port : 123.
Polling interval: 1024 seconds.
No MD5 authentication keys.
Authentication is not required for synchronization.
No trusted keys.
Unicast Clients: Disabled
Unicast Clients Polling: Disabled
Server Polling Encryption Key
----------------------------- ---------- -----------
Broadcast Clients: disabled
Anycast Clients: disabled
Broadcast Interfaces: gi1/0/1
Table 9-12. Manual Time Setting CLI Commands
CLI Description
console# configure
console(config)#clock source sntp
Set the source of time as
an SNTP server.194 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
console(config)#sntp client poll timer 6 Set polling time to 6
seconds.
console(config)#sntp unicast client
enable
Enable accepting time
from predefined Unicast
clients.
console(config)#sntp unicast client poll Enable polling predefined
Unicast clients.
console(config)#sntp server 10.4.1.3
poll
Define the server that will
be used as an SNTP
server.
console(config)#exit
console# show sntp configuration
Display SNTP settings.
console# show sntp status Display SNTP servers.
Table 9-12. Manual Time Setting CLI Commands (Continued)
CLI DescriptionDell PowerConnect 55xx Systems User Guide 195
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Logs
The Logs feature enables the switch to keep several, independent logs. Each
log is a set of entries that record system events.
It contains the following topics:
• System Log Overview
• Global Parameters
• RAM Log
• Log File (in Flash)
• Login History
• Remote Log Server
System Log Overview
System logs record events and report errors or informational messages. Some
aspects of system logging can be configured, as described below. When you
configure system logging, the configuration applies to all units in the stack.
Some events are automatically logged, such as hardware problems. You may
enable/disable logging the following types of events:
• Authentication Events in the Global Parameters page
• Copy File Events in the Global Parameters page
• Management Access Events in the Global Parameters page
• Login History in the Login History page
Event messages have a unique format, as per the System Logs (SYSLOG)
protocol recommended message format for all error reporting, for example,
SYSLOG and local device reporting messages are assigned a severity code,
and include a message mnemonic that identifies the source application
generating the message.
Messages may be filtered, based on their urgency or relevancy.
Events may be logged to the following destinations:
• Console
• Logging buffer (RAM)— Messages are stored in a cyclical file buffer.
When the maximum number of messages is reached, messages are written
starting at the beginning of the buffer (overwriting the old messages). 196 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Logs stored on the Logging buffer are deleted when the device is reset.
• Logging file (flash) — Messages are stored in flash memory. When the
buffer is full, messages are written starting at the beginning of the memory
block (overwriting the old messages).
• SYSLOG Server — Messages are sent to a remote server. This is useful for
central and remote management and to provide more space for storage of
messages. Up-to eight SYSLOG servers can be defined in the Remote
Log Server Settings pages.
You can select where to send logging messages according to their severity.
Each of the severity level can be directed to the console, RAM log, flash log
file or SYSLOG server or to any combination of these destinations.
Global Parameters
Use the Global Parameters page to enable/disable logging for the following
logging severity levels.
– Emergency — If the device is down or not functioning properly, an
emergency log message is saved to the specified logging location.
– Alert — An alert log is saved if there is a serious device malfunction,
for example, all device features are down.
– Critical — A critical log is saved if a critical device malfunction
occurs, for example, two device ports are not functioning, while the
rest of the device ports remain functional.
– Error — A device error has occurred, for example, a single port is
offline.
– Warning — The lowest level of a device warning. The device is
functioning, but an operational problem has occurred.
– Notice — Provides device information to which you might have to
respond.
– Informational — Provides device information to which you do not
have to respond.
– Debug — Provides debugging messages. Dell PowerConnect 55xx Systems User Guide 197
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
If you enable logging, some events are automatically logged, and in addition,
you can enable/disable specific types of logging and set their destination.
To configure logging:
1 Click System > Logs > Global Parameters in the tree view to display the
Global Parameters page.
Figure 9-10. Global Parameters
2 Enable/disable logging in the Logging drop-down list. Console logs are
enabled by default, and cannot be disabled.
3 If Logging is enabled, select the types of events to be logged in addition to
the events that are always logged:
– Log Authentication Events — Enable/disable generating logs when
users are authenticated. 198 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Log Copy Files Events — Enable/disable generating logs when files
are copied.
– Log Management Access Events — Enable/disable generating logs
when the device is accessed using a management method, for
example, each time the device is accessed using SSH, a device log is
generated.
4 To select the destination of logging messages, according to their severity
levels, check the minimum severity level that will be associated with the
console log, RAM log, Log file (Flash memory) and remote SYSLOG
servers. When a severity level is selected, all severity levels above the
selection are selected automatically.
Enabling Logs Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Global Parameters page.
Table 9-13. Global Log Parameters CLI Commands
CLI Command Description
logging on
no logging
Enables error message logging.
Turns off error message logging.
logging console level
no logging console level
Limits messages logged to the
console, based on severity.
Use the no form of this command to
disable logging limiting to the
console.
logging file level
no logging file
Limits SYSLOG messages stored in
flash memory, based on severity.
Use the no form of this command to
cancel using the buffer.
file-system logging
{copy|delete-rename}
Enables the logging of file system
events.Dell PowerConnect 55xx Systems User Guide 199
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
management logging {deny}
no management logging {deny}
Enables Management Access List
(ACL) deny events.
Use the no form of this command to
disable logging management access
list events.
aaa logging {login}
no aaa logging {login}
Enables logging authentication login
events.
Use the no form of this command to
disable logging authentication login
events.
console# configure
console(config)# logging on
console(config)# logging console errors
console(config)# logging file alerts
Table 9-13. Global Log Parameters CLI Commands (Continued)
CLI Command Description200 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
RAM Log
To manage the RAM log buffer:
1 Click System > Logs > RAM Log in the tree view to display the RAM Log
page.
Figure 9-11. RAM Log
The Max RAM Log Entries (20-400) line, which contains the maximum
number of RAM log entries permitted, is displayed. When the log buffer is
full, the oldest entries are overwritten. The Current Setting contains how
many entries are currently permitted, and you can change this number in
the New Setting (after reset) field.
The following is displayed for the existing logs:
– Log Index — The log number in the RAM Log table.Dell PowerConnect 55xx Systems User Guide 201
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Log Time — The time at which the log was entered into the RAM Log
table.
– Severity — The log severity.
– Description — The log entry text.
2 To remove all entries from the RAM log, click Clear Log.
Viewing and Clearing the RAM Log Table Using the CLI Commands
The following table summarizes the CLI commands for setting the size of the
RAM log buffer, viewing, and clearing entries in the RAM log.
The following is an example of the CLI commands:
Table 9-14. RAM Log Table CLI Commands
CLI Command Description
logging buffered
size
no logging buffered
Sets the number of SYSLOG messages stored in the
internal buffer (RAM).
Use the no form of this command to cancel using the
buffer.
show logging Displays the RAM logging buffer.
clear logging Clears the RAM logging buffer.
console(config)# logging buffered 300
04-Oct-2010 09:47:04 %SYSLOG-N-LOGGINGBFRSIZE: the number
of syslog messages stored in the internal buffer will be
changed to 300 (after reboot).202 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Log File (in Flash)
To view and/or clear the flash memory log file:
1 Click System > Logs > Log File in the tree view to display the Log File
page.
Figure 9-12. Log File
The following is displayed for the existing logs:
– Log Index — The log number in the Log file.
– Log Time — The time at which the log was entered.
– Severity — The log severity.
– Description — The log entry text.
2 To remove all entries from the log file, click Clear Log.Dell PowerConnect 55xx Systems User Guide 203
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Displaying the Log File Table Using the CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Log File page.
The following is an example of the CLI commands:
Login History
Use the Login History page to monitor users, including the time a user
logged in, and the protocol used to log on to the device.
Table 9-15. Log File Table CLI Commands
CLI Command Description
show logging file Displays the logging state and the SYSLOG
messages stored in the logging file.
console# show logging file
Logging is enabled.
Console Logging: Level info. Console Messages: 0 Dropped.
Buffer Logging: Level info. Buffer Messages: 62 Logged, 62
Displayed, 200 Max.
File Logging: Level debug. File Messages: 11 Logged, 51
Dropped.
SysLog server 1.1.1.1 Logging: info. Messages: 0 Dropped.
01-Jan-2000 01:12:01 :%COPY-W-TRAP: The copy operation was
completed successfully
01-Oct-2010 01:11:49 :%LINK-I-Up: gi/1/0/11
01-Oct-2010 01:11:46 :%LINK-I-Up: gi/1/0/12204 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To enable user history logging and view user login history:
1 Click System > Logs > Login History in the tree view to display the
Login History page.
Figure 9-13. Login History
The login history for the selected user or all users is displayed.
2 Enable/disable Login History to File to record login history.
3 Select a user or All from the User Name drop-down list. The login history
for this user is displayed in the following fields:
• Login Time — The time the selected user logged on to the device.
• User Name — The user that logged on to the device.
• Protocol — The means by which the user logged on to the device.
• Location — The IP address of the station from which the device was
accessed.Dell PowerConnect 55xx Systems User Guide 205
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Displaying the Device Login History Using CLI Commands
The following table summarizes the CLI commands for viewing and setting
fields displayed in the Login History page.
The following is an example of the CLI commands:
Table 9-16. Login History CLI Commands
CLI Command Description
aaa login-history file
no aaa login-history file
Enables writing to the login history file.
Use the no form of this command to disable
writing to the login history file.
show users login-history
[username]
Displays the user’s login history.
console (config)# aaa login-history file
console# show users login-history
Login Time Username Protocol Location
----------- -------- -------- ----------
01-Oct-2010
23:58:17
admin HTTP 172.16.1.8
01-Oct-2010
07:59:23
admin Telnet 172.16.0.8206 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Remote Log Server
Log messages can be sent to remote log servers, using the SYSLOG protocol.
To add a remote log server:
1 Click System > Logs > Remote Server Settings in the tree view to display
the Remote Log Server: Summary page.
Figure 9-14. Remote Log Server: Summary
The previously-defined remote servers are displayed.
2 To add a remote log server, click Add, and enter the fields:
– Supported IP Format — Select whether the IPv4 or IPv6 format is
supported.
– IPv6 Address Type — When the server supports IPv6, this specifies
the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.Dell PowerConnect 55xx Systems User Guide 207
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• VLAN — The VLAN on which the IPv6 interface is configured.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
– New Log Server IP Address — Enter the IP address of the remote
SYSLOG server.
– UDP Port (1-65535) — Enter the UDP port to which the logs are sent
for the selected server.
– Facility — Select a user-defined application from which system logs
are sent to the remote server. Only a single facility can be assigned to a
single server. If a second facility level is assigned, the first facility level
is overridden. All applications defined for a device utilize the same
facility on a server.
– Description (0-64 Characters) — Enter a server description.
– Severity to Include — Check the severity levels to be logged to the
remote server. The event severity levels are listed on this page in
descending order from the highest severity to the lowest. When a
severity level is selected to appear in a log, all higher severity events are
automatically selected to appear in the log. When a security level is
not selected, no lower severity events appear in the log. 208 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Working with Remote Server Logs Using the CLI Commands
The following table summarizes the CLI command for working with remote
log servers.
The following is an example of the CLI commands:
Table 9-17. Remote Log Server CLI Commands
CLI Command Description
logging host {ipv4-address|ipv6-
address|hostname} [port port-id]
[severity level] [facility
facility] [description text]
no logging host {ipv4-
address|ipv6-address|hostname}
Logs messages to a remote server
with this IP address.
Use the no form of this command
to delete the SYSLOG server with
the specified address from the list
of SYSLOGs.
show syslog-servers Displays list of SYSLOG servers.
console (configure) # logging host 1.1.1.1
console# show syslog-servers
Device Configuration
---------------------------------------------------------
IP Address Port Facility Severity Description
----------- ----- -------- ----------- -----------
1.1.1.1 514 local7 info
1.1.1.2 514 local7 info
1.1.1.3 514 local7 info
1.1.1.4 514 local7 infoDell PowerConnect 55xx Systems User Guide 209
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
IP Addressing
This section describes how to configure IP addresses on the switch, and
contains the following topics:
• IP Addressing Overview
• IPv4 Interface Parameters
• DHCP IPv4 Interface
• IPv4 Static Routing
• IPv6 Interfaces
• IPv6 Default Gateway
• ISATAP Tunnel
• IPv6 Neighbors
• IPv6 Routes Table
• Domain Name System
• Default Domain Names
• Host Name Mapping
• ARP
• UDP Relay
IP Addressing Overview
The device functions as an IPv6-compliant host, as well as an IPv4-host (also
known as dual stack). This enables device operation in a pure-IPv6 network,
as well as in a combined IPv4/IPv6 network.
Difference Between IPv4 and IPv6 Addressing
The primary difference between IPv4 to IPv6 is the length of network
addresses. IPv6 addresses are 128 bits, whereas IPv4 addresses are 32 bits.
Thus, IPv6 addresses enable the use of many more unique addresses.
The 128-bit IPv6 address format is divided into eight groups of four
hexadecimal digits. Abbreviation of this format by replacing a group of zeros
with double colons (::) is acceptable. IPv6 address representation can be
further simplified by suppressing the leading zeros.210 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
All IPv6 address formats are acceptable, yet for display purposes, the system
displays the most abbreviated form, which replaces groups of zeros with
double colons and removes the leading zeros.
IPv6 Prefixes
While Unicast IPv6 addresses written with their prefix lengths are permitted,
in practice their prefix lengths are always 64 bits, and therefore are not
required to be expressed. Any prefix that is less than 64 bits is a route or
address range that summarizes a portion of the IPv6 address space.
For every assignment of an IP address to an interface, the system runs the
Duplicate Address Detection (DAD) algorithm to ensure uniqueness.
An intermediary transition mechanism is required for IPv6-only nodes to
communicate with IPv6 nodes over an IPv4 infrastructure. The tunneling
mechanism implemented is the Intra-Site Automatic Tunnel Addressing
Protocol (ISATAP). This protocol treats the IPv4 network as a virtual IPv6
local-link, with each IPv4 address mapped to a Link Local IPv6 address.
IPv4 Interface Parameters
You can assign IP addresses to the interface in the following ways:
• Manual Assignment — Described below
• DHCP Server Assignment — Described in "DHCP IPv4 Interface" on
page 214
Multiple IP addresses can be configured in the IPv4 Interface Parameters
pages. These IP addresses can be assigned to a port, LAG, or VLAN interface.
When an IP address is assigned, it is checked for uniqueness in the following
way:
• A gratuitous ARP request is sent three times every three seconds.
• If after (3+1)*3 = 12 seconds the switch has not received the ARP
response, the IP address is considered to be unique.
• During the procedure the switch has to reply to gratuitous ARP and probe
ARP requests with the validated IP address.Dell PowerConnect 55xx Systems User Guide 211
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The IP address is assigned even if the above validation procedure concludes
that the IP address in question is not unique, but a SYSLOG message is
generated.
In addition to the above validation procedure every time a switch receives an
ARP request with a sender IP address that is equal to its IP address defined on
the input interface it sends a SYSLOG message informing of IP duplication,
containing the sender IP and MAC addresses, from the received ARP
message.
To assign an IP address to an interface, and to define subnets to which traffic
can be routed:
1 Click System > IP Addressing > IPv4 Interface Parameters in the tree
view to display the IP Interface Parameters: Summary page.
Figure 9-15. IPv4 Interface Parameters: Summary212 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The previously-assigned IP addresses are displayed.
2 To add an IP address to an interface, click Add, and enter the fields:
– IP Address — Enter the IP address assigned to the interface.
– Network Mask — Select the subnetwork mask to which traffic can be
routed.
– Prefix Length — Enter the number of bits that comprise the IP
address prefix of the subnetwork.
– Interface — Select the interface for which the IP address is defined.
Select an interface type Port, LAG, or VLAN and the specific
interface number.
Defining IPv4 Interfaces Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the IPv4 Interfaces Parameters page.
Table 9-18. IPv4 Interface Parameters CLI Commands
CLI Command Description
ip address ip-address
{mask|prefix-length}
no ip address [ip-address]
Sets an IP address.
Use the no form of the command to
remove an IP address.
show ip interface
[[gigabitethernet|tengigabitet
hernet]port-number|vlan vlanid|port-channel LAG-number]
Displays the usability status of
interfaces configured for IP.Dell PowerConnect 55xx Systems User Guide 213
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following are sample procedures to configure a static IPv4 address on an
interface using CLI and then to remove it:
Table 9-19. Sample CLI Script to Configure IPv4 Statically on a VLAN
CLI Command Description
console#config Enter Global Configuration
mode.
console(config)# interface vlan 1 Enter Interface mode for
VLAN 1.
console(config-if)# ip address
10.5.225.40 /27
Set the routing interface with
prefix length of 27.
console(config-if)# ip defaultgateway 10.5.225.33
Set the address of the default
gateway
console(config-if)# no ip address Remove the address (if
required).
Table 9-20. Sample CLI Script to Configure IPv4 Statically on a Port
CLI Command Description
console#config Enter Global Configuration
mode.
console(config)# interface gi1/0/1 Enter Interface mode for port
1 on unit 1.
console(config)# no switchport Enable the port to work as an
IP interface (Layer 3 mode).
console(config-if)# ip address
10.5.225.40 /27
Configure an IP address with
prefix length of 27.
console(config-if)# ip defaultgateway 10.5.225.33
Set the address of the default
gateway
console(config-if)# no ip address Remove the address (if
required).214 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
DHCP IPv4 Interface
The switch can operate in the following ways:
• It can function as a DHCP client that obtains its own IP from a DHCP
server, as described in this section
• It can function as a DHCP server that allocates IP addresses to other
devices, as described in "DHCP Server" on page 297
When the interface is configured as a DHCP client, it keeps requesting an IP
address from the DHCP server, until it receives one. It then sends Address
Resolution Protocol (ARP) packets to confirm the uniqueness of the IP
address. If the ARP response shows that the IP address is in use, the switch
sends a DHCPDECLINE message to the DHCP server, and sends another
DHCPDISCOVER packet that restarts the process.
IP address collisions occur when the same IP address is used in the same IP
subnet by more than one device. Address collisions require administrative
actions on the DHCP server and/or the devices that collide.
Up to 32 interfaces (ports, LAGs, and/or VLAN) on the switch can be
configured with a static or dynamic IP address. The IP subnets to which these
IP addresses belong are known as directly connected/attached IP subnets.
The IP address assignment rules for the switch are as follows:
• If the IP address on the switch is changed, the switch issues gratuitous
ARP packets to the corresponding VLAN, to check IP address collisions.
• When a client must renew its lease, prior to its expiration date, a
DHCPREQUEST message is sent.
• A specific interface can have either a static IP address or a dynamic IP
address, but not both.Dell PowerConnect 55xx Systems User Guide 215
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To define the switch as a DHCP client:
1 Click System > IP Addressing > DHCP IPv4 Interface in the tree view to
display the DHCP IPv4 Interface: Summary page.
Figure 9-16. DHCP IPv4 Interface: Summary216 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The previously-configured DHCP IPv4 interfaces are displayed.
2 To add an interface that can receive an IP address, click Add and select the
whether the interface is a port, LAG or VLAN in the Interface field.
Defining DHCP IPv4 Interfaces Using CLI Commands
The following table summarizes the CLI commands for setting fields in the
DHCP IPv4 Interface pages.
Table 9-21. DHCP IPv4 Interface CLI Commands
CLI Command Description
ip address dhcp
no ip address dhcp
Acquires an IP address on an Ethernet interface
from the Dynamic Host Configuration Protocol
(DHCP).
Use the no form of this command to release an
acquired IP address.Dell PowerConnect 55xx Systems User Guide 217
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring DHCP IPv4 Interfaces Using CLI
The following is a sample CLI script to configure a dynamic IPv4 address on
an interface and then to remove it:
IPv4 Static Routing
IPv4 static routes can be configured for IP addresses that are not on directly
connected networks. These are defined in the IPv4 Static Routing pages.
Table 9-22. Sample CLI Script to Configure IPv4 Dynamically on a VLAN
CLI Command Description
console#config Enter Global Configuration
mode.
console(config)# interface vlan 1 Enter VLAN mode for VLAN
1.
console(config)# no switchport Enable the port to work as an
IP interface (Layer 3 mode).
console(config-if)# ip address dhcp Use the DHCP protocol to
acquire the IP address.
console(config-if)# no ip address
dhcp
Remove the address (if
required).
Table 9-23. Sample CLI Script to Configure IPv4 Dynamically on a Port
CLI Command Description
console#config Enter Global Configuration
mode.
console(config)# interface vlan 1 Enter VLAN mode for VLAN
1.
console(config-if)# ip address dhcp Use the DHCP protocol to
acquire the IP address.
console(config-if)# no switchport Enable the port to work as an
IP interface (Layer 3 mode).
console(config-if)# no ip address
dhcp
Remove the address (if
required).218 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
When routing traffic, the next hop is determined according to the longest
prefix match (LPM algorithm). A destination IPv4 address may match
multiple routes in the IPv4 Static Route table. The switch uses the matched
route with the longest prefix match.
To add an IPv4 static route:
1 Click System > IP Addressing > IPv4 Static Routing in the tree view to
display the IPv4 Static Routing: Summary page.
Figure 9-17. IPv4 Static Routing: Summary
2 Click Add to add a destination, and enter the fields:
– Destination IP Prefix — Enter the destination IPv4 prefix. If all zeros
are entered, this represents a default route.
– Network Mask — Select the destination IPv4 mask.
– Prefix Length — Select the length of the destination IPv4 address
prefix. Dell PowerConnect 55xx Systems User Guide 219
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Next Hop — Enter the IP address to which the packet is forwarded on
the route to the destination address. This is typically the address of a
neighboring switch.
– Route Type — Select the route type. The possible options are:
• Reject — Rejects the route and stops routing to the destination
network via all gateways. This ensures that if a frame arrives with
the destination IP of this route, it is dropped.
• Remote — The route is a remote path.
– Metric (1-255) — Enter the administrative distance (cost) to the
destination.
Defining IPv4 Static Routing Using CLI Commands
The following table summarizes the CLI commands for configuring IPv4
static routing.
The following is an example of the CLI command:
Table 9-24. IPv4 Static Routing CLI Commands
CLI Command Description
ip routing
no ip routing
Enables IPv4 Routing.
Use the no format of the
command to disable IPv4
Routing.
ip route prefix {mask|prefixlength} ip-address-next-hop
[metric distance] [reject-route]
no ip route prefix {mask|prefixlength} [ip-address-next-hop]
Configures static routes.
Use the no form of this
command to remove static
routes.
show ip route Displays the current routing
table state.
console(config)# ip route prefix 192.168.1.1 /8
10.5.234.255 metric 3 reject-route220 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring Two IP Networks on Two Different VLANS Using CLI
The following shows how to configure two IP networks on two different
VLANS using CLI:
To test this setup described in Figure 9-18:
1 Connect a host whose address is 1.1.1.2 to interface 1/0/1 (default route
1.1.1.1)
2 Connect a host whose address 2.1.1.2 to port 1/0/2 (default route 2.1.1.1)
3 Ping from 1.1.1.2 to 2.1.1.2 to verify the configuration
Table 9-25. Sample CLI Script to Configure Two IP Networks on Two Different VLANSs
CLI Command Description
console#config Enter Global Configuration
mode.
console(config)# vlan database Enter VLAN mode.
console(config-vlan)# vlan 100-150 Create VLANs number 100 to
150.
console(config-vlan)# exit Exit VLAN mode.
console(config)#interface gi1/0/1 Enter Interface mode for port
1 on unit 1.
console(config-if)# switchport access
vlan 100
Make port a member of
VLAN 100.
console(config-if)# ip address
1.1.1.1 255.255.255.0
Set the IP address with mask.
console(config-vlan)# exit Exit Interface mode for port.
console(config)#interface gi1/0/2 Enter Interface mode for port
2 on unit 1.
console(config-if)# switchport access
vlan 150
Make port a member of
VLAN 150.
console(config-if)# ip address
2.1.1.1 255.255.255.0
Set the IP address with mask.
console(config-vlan)# exit Exit Interface mode for port.Dell PowerConnect 55xx Systems User Guide 221
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Figure 9-18. IP Routing Setup
IPv6 Interfaces
The system supports IPv6-addressable hosts.
To define IPv6 interfaces:
1 Click System > IP Addressing > IPv6 Interface in the tree view to open
the IPv6 Interface: Summary page.
Figure 9-19. IPv6 Interface: Summary
PC 1.1.1.1
Switch
PC 2.1.1.1
VLAN 100
VLAN 150222 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Select an interface. The IPv6 addresses defined on the interface are
displayed. In addition to the fields described in the Add pages, the
following fields are displayed:
– ICMP Error Rate Limit Interval (0-2147483647) — Enter the
rate-limit interval for ICMPv6 error messages in milliseconds. The
value of this parameter together with the Bucket Size parameter
(below) determines how many ICMP error messages may be sent per
time interval, for example, a rate-limit interval of 100 ms and a bucket
size of 10 messages translates to 100 ICMP error messages per second.
– ICMP Error Rate Limit Bucket Size (1-200) — Enter the bucket size
for ICMPv6 error messages. The value of this parameter together with
the ICMP Error Rate Limit Interval parameter determines how many
ICMP error messages may be sent per time interval, for example, a
rate-limit interval of 100 ms and a bucket size of 10 messages
translates to 100 ICMP error messages per second.
3 To add a new IPv6 interface, click Add IPv6 Interface, and enter the fields:
– Interface — Select an IPv6 interface to be configured.
– Number of DAD Attempts — Enter the number of consecutive
neighbor solicitation messages that are sent on an interface while
Duplicate Address Detection (DAD) is performed on Unicast IPv6
addresses on this interface. New addresses remain in a tentative state
while duplicate address detection is performed. A field value of 0,
disables duplicate address detection processing on the specified
interface. A field value of 1, indicates a single transmission without
follow up transmissions.
– Autoconfiguration — Enable/disable stateless auto configuration of
IPv6 address assignment. When enabled, the router solicitation ND
procedure is initiated. This discovers a router in order to assign an IP
address to the interface, based on prefixes received with RA messages.
When auto configuration is disabled, no automatic assignment of
IPv6 global Unicast addresses is performed, and existing,
automatically-assigned IPv6 global Unicast addresses are removed
from the interface. Dell PowerConnect 55xx Systems User Guide 223
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Send ICMP Unreachable — Enable/disable transmission of ICMPv6
address Unreachable messages. When enabled, unreachable messages
are generated for any packet arriving on the interface with unassigned
TCP/UDP port.
4 To add an address to an IPv6 interface, click Add IPv6 Address, and enter
the fields for the selected interface:
– IPv6 Address Type — Check the means by which the IP address was
added to the interface. The possible options are:
• Link Local — The IP address is link local; non-routable and can
be used for communication on the same network only. A Link
Local address has a prefix of 'FE80'.
• Global Unicast — The IP address is a globally unique IPv6
Unicast address; visible and reachable from different subnets.
• Global Anycast — The IP address is a globally unique IPv6
Anycast address; visible and reachable from different subnets.
– IPv6 Address — Enter the IPv6 address assigned to the interface. The
address must be a valid IPv6 address, specified in hexadecimal using
16-bit values between colons. An example of an IPv6 address is
2031:0:130F:0:0:9C0:876A:130D and the compressed version is
represented as 2031:0:130F::9C0:876A:130D. Up to five IPv6
addresses (not including Link Local addresses) can be set per
interface, with the limitation of up to128 addresses per system.
– Prefix Length — For global Unicast or Anycast, enter the length of the
IPv6 prefix. The length is a decimal value that indicates how many of
the high-order contiguous bits of the address comprise the prefix (the
network portion of the address). The Prefix field is applicable only on a
static IPv6 address defined as a Global IPv6 address.
– EUI-64 — For global Unicast or Anycast, check to use the EUI-64
option.224 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining IPv6 Interfaces Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the IPv6 Interface pages.
Table 9-26. IPv6 Interfaces CLI Commands
CLI Command Description
ipv6 enable [no-autoconfig]
no ipv6 enable
Enables the IPv6 addressing mode on an
interface.
Use the no form of this command to
disable the IPv6 addressing mode on an
interface
ipv6 address autoconfig
no ipv6 address autoconfig
Enables automatic configuration of IPv6
addresses, using stateless auto
configuration on an interface. Addresses
are configured depending on the prefixes
received in Router Advertisement
messages.
Use the no form of this command to
disable address auto configuration on the
interface.
ipv6 icmp error-interval
milliseconds [bucketsize]
no ipv6 icmp error-interval
Configures the rate limit interval and
bucket size parameters for IPv6 Internet
Control Message Protocol (ICMP) error
messages.
Use the no form of this command to
return the interval to its default setting.
ipv6 address ipv6-
address/prefix-length [eui-64]
[anycast]
no ipv6 address [ipv6-
address/prefix-length] [eui-
64]
Configures an IPv6 address for an
interface.
Use the no form of this command to
remove the address from the interface.Dell PowerConnect 55xx Systems User Guide 225
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
ipv6 address ipv6-
address/prefix-length linklocal
no ipv6 address link-local
Configures an IPv6 link-local address for
an interface.
Use the no form of this command to
return to the default link local address on
the interface.
ipv6 unreachables
no ipv6 unreachables
Enables the generation of ICMP for IPv6
(ICMPv6) unreachable messages for
packets arriving on a specified interface.
Use the no form of this command to
prevent the generation of unreachable
messages.
ipv6 nd dad attempts attempt Configures the number of consecutive
neighbor solicitation messages that are
sent on an interface while Duplicate
Address Detection (DAD) is performed
on the unicast IPv6 addresses of the
interface.
show ipv6 interface
[[gigabitethernet|tengigabite
thernet] port-number|vlan
vlan-id|port-channel LAGnumber]
Displays the usability status of interfaces
configured for IPv6.
show ipv6 icmp error-interval Displays the IPv6 ICMP error
interval.
Table 9-26. IPv6 Interfaces CLI Commands (Continued)
CLI Command Description226 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is a sample script to configure IPv6 using CLI:
IPv6 Default Gateway
Use the IPv6 Default Gateway pages to configure and view the default IPv6
router addresses. This list contains routers that are candidates to become the
switch default router for non-local traffic. The switch randomly selects a
router from the list. The switch supports one static IPv6 default router.
Dynamic default routers are routers that have sent router advertisements to
the switch IPv6 interface.
When adding or deleting IP addresses, the following events occur:
• When removing an IP interface, all of its default gateway IP addresses are
removed.
• Dynamic IP addresses cannot be removed.
• An alert message is displayed after a user attempts to insert more than one
IP address.
• An alert message is displayed when attempting to insert a non-Link Local
type address.
Table 9-27. Sample CLI Script to Configure IPv6 on a Port
CLI Command Description
console#config Enter Global Configuration
mode.
console(config)# interface vlan 1 Enter VLAN mode for VLAN
1.
console(config-if)# ipv6 enable Enable IPv6 (dynamic).
console(config-if)# ipv6 address
5::1/64
Set the IPv6 address (static)Dell PowerConnect 55xx Systems User Guide 227
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To configure a router:
1 Click System > IP Addressing > IPv6 Default Gateway in the tree view to
display the IPv6 Default Gateway: Summary page.
Figure 9-20. IPv6 Default Gateway: Summary
The previously-defined routers are displayed with the following fields:
– IPv6 Default IPv6 Address — The router’s address.
– Interface — The interface on which the router is accessed.
– Type — The means by which the default gateway was configured. The
possible options are:
• Static — The default gateway is user-defined.
• Dynamic — The default gateway is dynamically configured
through router advertisement.228 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– State — The router’s status. The possible options are:
• Incomplete — Address resolution is in progress and the link-layer
address of the default gateway has not yet been determined.
• Reachable — The default gateway is known to have been
reachable recently (within tens of seconds ago).
• Stale — The default gateway is no longer known to be reachable
but until traffic is sent to the default gateway, no attempt is made
to verify its reachability.
• Delay — The default gateway is no longer known to be reachable,
and traffic has recently been sent to the default gateway. Rather
than probe the default gateway immediately, however, there is a
delay sending probes for a short while in order to give upper-layer
protocols a chance to provide reachability confirmation.
• Probe — The default gateway is no longer known to be reachable,
and Unicast Neighbor Solicitation probes are being sent to verify
reachability.
• Unreachable — No reachability confirmation was received.
2 To add an IPv6 default gateway, click Add, and enter the fields:
– IPv6 Address Type — Displays that the IP address was added to the
interface through a link local address.
– Link Local Interface — Displays the outgoing interface through
which the default gateway can be reached.
– Default Gateway IPv6 Address — Enter the Link Local IPv6 address
of the default gateway.
Defining IPv6 Default Gateway Parameters Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the IPv6 Default Gateway pages
.
Table 9-28. IPv6 Default Gateway CLI Commands
CLI Command Description
ipv6 default-gateway ipv6-
address
Defines an IPv6 default gateway.Dell PowerConnect 55xx Systems User Guide 229
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following are examples of these CLI command:
ISATAP Tunnel
To deliver IPv6 addresses in an IPv4 network, a tunneling process must be
defined that encapsulates IPv6 packets in IPv4 packets.
The Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) is an IPv6
transition mechanism that is used to transmit IPv6 packets between
dual-stack nodes (nodes that can accept both IPv4 and IPv6 addresses) on top
of an IPv4 network.
When enabling ISATAP on a tunnel interface, an explicit IPv4 address is
configured as the tunnel source, or an automatic mode exists, where the
lowest IPv4 address is assigned to an IP interface. This source IPv4 address is
used for setting the tunnel interface identifier according to ISATAP
addressing conventions. When a tunnel interface is enabled for ISATAP, the
tunnel source must be set for the interface in order for the interface to
become active.
An ISATAP address is represented using the [64-bit prefix]:0:5EFE:w.x.y.z,
where 5EFE is the ISATAP identifier and w.x.y.z is a public or private IPv4
address. Thus, a Link Local address will be represented as FE80::5EFE:w.x.y.z
show ipv6 route Displays the current state of the IPv6 routing
table.
console(config)# ipv6 default-gateway fe80::abcd
console(config-if)# do show ipv6 route
Codes: L - Local, S - Static, I - ICMP, ND - Router
Advertisement
The number in the brackets is the metric.
L 3000::/64 is directly connected, VLAN 20 Lifetime Infinite
L 4003::/64 is directly connected, VLAN 20 Lifetime Infinite
L 5003::/64 is directly connected, VLAN 20 Lifetime Infinite
L 6003::/64 is directly connected, VLAN 20 Lifetime Infinite
Table 9-28. IPv6 Default Gateway CLI Commands (Continued)
CLI Command Description230 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
After the last IPv4 address is removed from the interface, the ISATAP IP
interface state becomes inactive and is represented as Down, however the
Admin state remains Enabled.
When defining tunneling, note the following:
• An IPv6 Link Local address is assigned to the ISATAP interface. The initial
IP address is assigned to the interface, and the interface state becomes
Active.
• If an ISATAP interface is active, the ISATAP router IPv4 address is resolved
via DNS by using ISATAP-to-IPv4 mapping. If the ISATAP DNS record is
not resolved, the ISATAP host name-to-address mapping is searched in the
host name cache.
• When an ISATAP router IPv4 address is not resolved via the DNS process,
the status of the ISATAP IP interface remains Active. The system does not
have a default gateway for ISATAP traffic until the DNS procedure is
resolved.
• In order for an ISATAP Tunnel to work properly over an IPv4 network, an
ISATAP router is must be set up.Dell PowerConnect 55xx Systems User Guide 231
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To define an IPv6 ISATAP tunnel:
1 Click System > IP Addressing > IPv6 ISATAP Tunnel in the tree view to
display the ISATAP Tunnel page.
Figure 9-21. IPv6 ISATAP Tunnel
2 Enter the fields:
– ISATAP Status —Enable/disable the status of ISATAP on the device.
– IPv4 Address Type — Enter the source of the IPv4 address used by the
tunnel. The options are:
• Auto —Use the dynamic address.
• None —Disable the ISATAP tunnel
• Manual —Use the manual address assigned.
– IPv4 Address — Enter the local (source) IPv4 address of a tunnel
interface. 232 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Tunnel Router's Domain Name — Enter a specific automatic tunnel
router domain name.
– Domain Name Query Interval(10 - 3600) — Enter the interval
between DNS queries (before the IP address of the ISATAP router is
known) for the automatic tunnel router domain name.
– ISATAP Router Solicitation Interval(10 - 3600) — Enter the interval
between router solicitations messages when there is no active router.
– ISATAP Robustness (1 - 20) — Enter the number of DNS
Query/Router Solicitation refresh messages that the device sends per
second.
Select the Use Default option to use the default setting of a field.
Defining ISATAP Tunnel Parameters Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the ISATAP Tunnel pages.
Table 9-29. ISATAP Tunnel CLI Commands
CLI Command Description
interface tunnel number Enters tunnel interface configuration
mode.
tunnel mode ipv6ip {isatap}
no tunnel mode ipv6ip
Configures an IPv6 transition
mechanism global support mode.
Use the no form of this command to
remove an IPv6 transition mechanism.
tunnel isatap router router_name
no tunnel isatap router
Configures a global string that
represents a specific automatic tunnel
router domain name.
Use the no form of this command to
remove the string associated with the
router domain name and restore the
default configuration.
tunnel source {auto|ip-address
ipv4-address}
no tunnel source
Sets the local (source) IPv4 address of
a tunnel interface.
Use the no form of the command to
delete the tunnel local address.Dell PowerConnect 55xx Systems User Guide 233
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of a CLI script to create a tunnel:
tunnel isatap query-interval
seconds
no tunnel isatap query-interval
Configures the interval between DNS
Queries (before the IP address of the
ISATAP router is known) for the
automatic tunnel router domain
name.
Use the no form of this command to
restore the default configuration.
tunnel isatap solicitationinterval seconds
no tunnel isatap solicitationinterval
Configures the interval between
ISATAP router solicitations messages
(when there is no active ISATAP
router).
Use the no form of this command to
restore the default configuration.
tunnel isatap robustness number
no tunnel isatap robustness
Configures the number of DNS
Query/Router Solicitation refresh
messages that the device sends.
Use the no form of this command to
restore the default configuration.
show ipv6 tunnel Displays information on the ISATAP
tunnel.
Table 9-30. ISATAP Tunnel CLI Script
CLI Command Description
console#config Enter Global Configuration
mode.
console(config)# interface vlan 1 Enter Interface mode for
VLAN 1.
console(config-if)# ip address
10.5.225.40 /27
Configure an IP address with
prefix length of 27.
console(config-if)# ip default-gateway
10.5.225.33
console(config-if)#exit
Set the address of the default
gateway and exit Interface
mode.
Table 9-29. ISATAP Tunnel CLI Commands (Continued)
CLI Command Description234 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
console (config)# ip domain lookup Enable DNS lookup
console(config)# ip name-server
176.16.1.18
Define DNS server
console(config)# interface tunnel 1 Enter tunnel mode
console(config-tunnel)#tunnel mode
ipv6ip isatap
Enable tunnel.
console(config-tunnel)#tunnel source
auto
The system minimum IPv4
address will be used as the
source address for packets
sent on the tunnel interface.
console(config-tunnel)# do show ipv6
tunnel
Display tunnel configuration
Table 9-30. ISATAP Tunnel CLI Script
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 235
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
IPv6 Neighbors
The Neighbors feature is similar in functionality to the IPv4 Address
Resolution Protocol (ARP) feature. It enables detecting Link Local addresses
within the same subnet, and includes a database for maintaining reachability
information about active neighbors.
The device supports a total of up to 64 neighbors, obtained statically or
dynamically.
When removing an IPv6 interface, all neighbors entered statically or learned
dynamically, are removed.
To add an IPv6 neighbor:
1 Click System > IP Addressing > IPv6 Neighbors in the tree view to
display the IPv6 Neighbors: Summary page.
Figure 9-22. IPv6 Neighbors: Summary236 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The previously-defined neighbors are displayed along with their states.
The possible states are:
– Incomplete — An address resolution is in progress, and the link-layer
address of the neighbor has not yet been determined.
– Reachable — The neighbor is known to have been reachable recently
(within tens of seconds).
– Stale — The neighbor is no longer known to be reachable, but until
traffic is sent to the neighbor, no attempt is made to verify its
reachability.
– Delay — The neighbor is no longer known to be reachable, and traffic
has recently been sent to the neighbor. Rather than probe the
neighbor immediately, however, there is a delay sending probes for a
short while, in order to give upper-layer protocols a chance to provide
reachability confirmation.
– Probe — The neighbor is no longer known to be reachable, and
Unicast Neighbor Solicitation probes are being sent to verify
reachability.
2 To clear the Neighbors table, select one of the following options:
– None — Does not clear any entries.
– Static Only — Clears the static entries.
– Dynamic Only — Clears the dynamic entries.
– All Dynamic and Static — Clears the static and dynamic address
entries.
3 To add a new IPv6 neighbor, click Add, and enter the fields:
– IPv6 Interface — Displays the interface on which IPv6 Interface is
defined.
– IPv6 Address — Enter the neighbor IPv6 address.
– MAC Address — Enter the MAC address assigned to the interface.Dell PowerConnect 55xx Systems User Guide 237
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
4 To modify or remove an IPv6 neighbor, click Edit, and enter the fields
described on the Add page.
5 If an entry for the specified IPv6 address already exists in the neighbor
discovery cache, as learned through the IPv6 neighbor discovery process,
you can convert the entry to a static entry. To do this, select Static in the
Type field.
Defining IPv6 Neighbors Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the IPv6 Neighbors pages.
Table 9-31. IPv6 Neighbors CLI Commands
CLI Command Description
ipv6 neighbor ipv6_addr
{[gigabitethernet|tengigabitethernet]
port-number|vlan vlan-id|port-channel
LAG-number]} mac_addr
no ipv6 neighbor ipv6_addr
{[gigabitethernet|tengigabitethernet]
port-number|vlan vlan-id|port-channel
LAG-number]}
Configures a static entry in
the IPv6 neighbor discovery
cache.
Use the no form of this
command to remove a static
IPv6 entry from the IPv6
neighbor discovery cache.
show ipv6 neighbors
{static|dynamic}[ipv6-address ipv6-
address] [mac-address mac-address]
[[gigabitethernet|tengigabitethernet]
port-number|vlan vlan-id|port-channel
LAG-number]]
Displays IPv6 neighbor
discovery cache information.
clear ipv6 neighbors Deletes all entries in the IPv6
neighbor discovery cache.238 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console# config
console(config)# ipv6 neighbor 3000::a31b vlan 1
001b.3f9c.84ea
console# show ipv6 neighbors dynamic
Interface IPv6 Address HW Address State Router
--------- ------------ ---------- ----- -----
VLAN 1 3000::a31b 0001b.3f9c.84ea Reachable YesDell PowerConnect 55xx Systems User Guide 239
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
IPv6 Routes Table
The IPv6 Routes Table describes how to reach IPv6 destinations. The routing
table is used to determine the next-hop address and the interface used for
forwarding.
Each dynamic entry also has an associated invalidation timer value (extracted
from Router Advertisements). This timer is used to delete entries that are no
longer advertised.
To view IPv6 destinations and how they are reached:
• Click System > IP Addressing > IPv6 Routes Table in the tree view to
display the IPv6 Routes Table page.
Figure 9-23. IPv6 Routes Table
The following is displayed for each IP address:
– IPv6 Address — The destination IPv6 address.240 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Prefix Length — The length of the IPv6 prefix. This field is applicable
only when the destination address is defined as a global IPv6 address.
– Interface — The interface that is used to forward the packet. Interface
refers to any Port, LAG or VLAN.
– Next Hop — The address to which the packet is forwarded on the
route to the Destination address (typically the address of a
neighboring router). This can be either a Link Local or Global IPv6
address.
– Metric — The value used for comparing this route to other routes
with the same destination in the IPv6 route table. This is an
administrative distance with the range of 0-255.
– Life-Time — The timeout interval of the route if no activity takes
place. Infinite means the address is never deleted.
– RouteType — Specifies whether the destination is directly-attached
and the means by which the entry was learned. The possible options
are:
• Local — A directly-connected route entry.
• Static — Manually configured route, supported only for default
gateway, learned through the Neighbor Discover (ND) process.
• ICMP — The route was learned through ICMP Redirect
messages, sent by the router.
• ND — Route was learned by the ND protocol from Router
Advertisement messages.
Viewing IPv6 Routes Table Parameters Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the IPv6 Routes Table page.
Table 9-32. IPv6 Routes Table CLI Commands
CLI Command Description
show ipv6 route Displays the current state of the ipv6
routing table.Dell PowerConnect 55xx Systems User Guide 241
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console> show ipv6 route
Codes: L - Local, S - Static, I - ICMP, ND - Router
Advertisement
The number in the brackets is the metric.
S::/0 via fe80::77 [0] VLAN 1 Lifetime Infinite
ND::/0 via fe80::200:cff:fe4a:dfa8 [0] VLAN 1 Lifetime
1784 sec
L 2001::/64 is directly connected, g2 Lifetime Infinite
L 2002:1:1:1::/64 is directly connected, VLAN 1 Lifetime
2147467 sec
L 3001::/64 is directly connected, VLAN 1 Lifetime
Infinite
L 4004::/64 is directly connected, VLAN 1 Lifetime
Infinite
L 6001::/64 is directly connected, g2 Lifetime Infinite242 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Domain Name System
The Domain Name System (DNS) converts user-defined domain names into
IP addresses. Each time a domain name is assigned, the DNS service
translates the name into a numeric IP address, for example,
www.ipexample.com is translated into 192.87.56.2. DNS servers maintain
domain name databases and their corresponding IP addresses.
To add a DNS server and specify the active DNS server:
1 Click System > IP Addressing > Domain Name System in the tree view
to display the Domain Name System: Summary page.
Figure 9-24. Domain Name System: Summary
The list of previously-defined DNS servers is displayed.
2 To enable mapping of host names into IP addresses through a DNS server,
select DNS Status.
3 To activate one of the currently-defined DNS servers, enable Active Server.Dell PowerConnect 55xx Systems User Guide 243
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
4 To add a DNS server, click Add, and enter the fields:
– Supported IP Format — Select whether the IPv4 or IPv6 format is
supported.
– IPv6 Address Type — When the server supports IPv6, this specifies
the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• VLAN — The VLAN on which the IPv6 interface is configured.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
– DNS Server — Enter the IP address of the DNS server being added.
– DNS Server Currently Active — Displays the DNS server that is
currently active.
– Set DNS Server Active — Check to activate the selected DNS server.
Configuring DNS Servers Using the CLI Commands
The following table summarizes the CLI commands for configuring the fields
in the Domain Name System pages.
Table 9-33. DNS CLI Commands
CLI Command Description
ip domain lookup Enables DNS system for translating host
names to IP addresses.
ip name-server {server1-
ipv4-address|server1-ipv6-
address} [server-address2
…server-address8]
no ip name-server [serveraddress … server-address8]
Sets the available name servers. Up to eight
name servers can be set.
The no form of the command removes a
name server.244 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
clear host Deletes entries from the host name-toaddress cache.
clear host dhcp {name|*} Deletes entries from the host name-toaddress mapping received from DHCP.
show hosts Displays the default domain name, the list
of name server hosts, the static and the
cached list of host names and addresses
console (config)# ip domain lookup
console(config)# ip name-server 176.16.1.18
Table 9-33. DNS CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 245
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Default Domain Names
A default domain name is used when an IP address cannot be mapped to a
known domain name. This domain name is applied to all unqualified host
names.
To define the default domain name:
1 Click System > IP Addressing > Default Domain Name to display the
Default Domain Name page.
Figure 9-25. Default Domain Name
If there is a currently-defined default domain name, it is displayed.
2 Enter the Default Domain Name (1 - 160 Characters).
Its Type is displayed, and has one of the following options:
– Dynamic — The IP address was created dynamically.
– Static — The IP address is a static IP address.246 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining Default Domain Names Using the CLI Commands
The following table summarizes the CLI commands for configuring the
default domain name:
The following is an example of the CLI commands:
Table 9-34. Default Domain Name CLI Commands
CLI Command Description
ip domain-name name
no ip domain-name
Defines a default domain name that the software uses
to complete unqualified host names.
The no form of the command disables the use of the
Domain Name System (DNS).
console(config)# ip domain-name dell.com Dell PowerConnect 55xx Systems User Guide 247
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Host Name Mapping
Host names can be dynamically mapped to IP addresses through the Domain
Name System pages, or statically through the Host Name Mapping page.
To assign IP addresses to static host names.
1 Click System > IP Addressing > Host Name Mapping in the tree view to
display the Host Name Mapping: Summary page.
Figure 9-26. Host Name Mapping: Summary
The currently-defined host names are displayed.
2 Click Add to add a new host name. Up to four IP addresses can be added.
3 For each IP address, enter the fields:
– Supported IP Format — Select whether the IPv4 or IPv6 format is
supported. 248 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– IPv6 Address Type — When the server supports IPv6, this specifies
the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• VLAN — The VLAN on which the IPv6 interface is configured.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
• Host Name (1-160 Characters) — Enter the host name to be
associated with the IP address entered below.
• IP Address — Enter the IP address of the domain. Four addresses can
be entered.
4 Click Remove to delete a host name. All addresses for this host name are
deleted at the same time.
Mapping IP Addresses to Domain Host Names Using the CLI Commands
The following table summarizes the CLI commands for mapping domain
host names to IP addresses.
Table 9-35. Domain Host Name CLI Commands
CLI Command Description
ip host name address
[address2 address3
address4]
Defines the static host name-to-address mapping in
the host cache
no ip host name Removes the name-to-address mapping.
clear host {name|*} Deletes entries from the host name-to-address cache.
show hosts [name] Displays the default domain name, list of name server
hosts, the static and the cached list of host names and
addresses.Dell PowerConnect 55xx Systems User Guide 249
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
ARP
The Address Resolution Protocol (ARP) converts IP addresses into physical
MAC addresses. ARP enables a host to communicate with other hosts when
their IP addresses are known.
To add an IP/MAC address mapping:
1 Click System > IP Addressing > ARP in the tree view to display the ARP:
Summary page.
Figure 9-27. ARP: Summary
console(config)# ip host accounting.abc.com 176.10.23.1250 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The entries in the table are displayed.
2 Enter the parameters:
• ARP Entry Age Out (1 - 40000000) — Enter the amount of time in
seconds that can pass between ARP requests for this address. After
this period, the entry is deleted from the table.
• Clear ARP Table Entries — Select the type of ARP entries that are
cleared on all devices. The possible options are:
• None — ARP entries are not cleared.
• All — All ARP entries are cleared.
• Dynamic — Only learned ARP entries are cleared.
• Static — Only static ARP entries are cleared.
3 To add a mapping, click Add, and enter the fields:
– Interface — Select an interface to be associated with the addresses.
– IP Address — Enter the station IP address, which is associated with
the MAC address filled in below.
– MAC Address — Enter the station MAC address, which is associated
in the ARP table with the IP address.
4 To change the status of a mapping from static to dynamic or vice versa,
click Edit and enter the field:
– Status — Select the entry’s status. The possible options are:
• Static — The entry was statically entered.
• Dynamic — The entry was dynamically learned. Dell PowerConnect 55xx Systems User Guide 251
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring ARP Using the CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the ARP pages.
The following is an example of the CLI commands:
Table 9-36. ARP CLI Commands
CLI Command Description
arp ip_addr mac_addr
{[gigabitethernet|tengigabit
ethernet] port-number|vlan
vlan-id|port-channel LAGnumber}
Adds a permanent entry in the ARP
cache.
no arp ip-address Removes an ARP entry from the ARP
Table.
arp timeout seconds Configures how long an entry remains in
the ARP cache. This command can be
used in Global Configuration mode for all
interfaces, or in Interface Configuration
mode for a specific interface.
clear arp-cache Deletes all dynamic entries from the ARP
cache
show arp Displays entries in the ARP Table.
show arp configuration Displays the global and interface
configuration of the ARP protocol
console(config)# arp 198.133.219.232 00-00-0c-40-0f-bc
console(config)# arp timeout 12000
console(config)# exit
console# show arp
ARP timeout: 12000 Seconds
Interface IP Address HW Address Status
--------- ---------- ---------- ------
gi1/0/11 10.7.1.102 00:10:B5:04:DB:4B dynamic
gi1/0/12 10.7.1.135 00:50:22:00:2A:A4 static252 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
UDP Relay
Switches do not typically route IP Broadcast packets between IP subnets.
However, if configured, the switch can relay specific UDP Broadcast packets
received from its IPv4 interfaces to specific destination IP addresses.
To configure the relaying of UDP packets received from a specific IPv4
interface with a destination UDP port:
1 Click System > IP Addressing > UDP Relay in the tree view to display
the UDP Relay: Summary page.
Figure 9-28. UDP Relay: SummaryDell PowerConnect 55xx Systems User Guide 253
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The UDP relays are displayed.
2 To add a UDP relay, click Add, and enter the fields:
– Source IP Address — Select the source IP address to where the switch
is to relay UDP Broadcast packets, based on a configured UDP
destination port. The interface must be one of the IPv4 interfaces
configured on the switch. Select All for all addresses.
– UDP Port (1 - 65535) — Check Default Services to select all of the
following default ports:
• IEN-116 Name Service (port 42)
• DNS (port 53)
• NetBIOS Name Server (port 137)
• NetBIOS Datagram Server (port 138)
• TACACS Server (port 49)
• Time Service (port 37)
If Default Services are not selected, check the text box and enter a
UDP port.
– Destination IP Address — Enter the IP address that receives the UDP
packet relays. If this field is 0.0.0.0, UDP packets are discarded. If this
field is 255.255.255.255, UDP packets are flooded to all IP interfaces.
Configuring UDP Relay Using the CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the UDP Relay pages.
Table 9-37. UDP Relay CLI Commands
CLI Command Description
ip helper-address {ipinterface|all} address [udpport-list]
no ip helper-address {ipinterface|all} address
Enables the forwarding of User
Datagram Protocol (UDP) broadcast
packets received on an interface to a
specific (helper) address.
Use the no form of this command to
disable the forwarding of broadcast
packets to a specific (helper) address.254 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console (config)# ip helper-address all 172.16.9.9 49 53
console (config)# do show ip helper-address
Interface Helper Address UDP Ports
----------- --------------- --------------------------
All 172.16.9.9 49,53Dell PowerConnect 55xx Systems User Guide 255
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Diagnostics
This section describes how to perform cable tests on copper and fiber optic
cables.
It contains the following sections:
• Integrated Cable Test
• Optical Transceiver Diagnostics256 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Integrated Cable Test
Time Domain Reflectometry (TDR) technology is used to test the quality
and characteristics of a copper cable attached to a port. Cables up to 120
meters long can be tested. Cables can only be tested when the ports are in the
down state, with the exception of Approximated Cable Length test.
This test can only be performed when the port is up and operating at 1 Gbps.
To perform a cable test and view the results:
1 Click System > Diagnostics > Integrated Cable Test: Summary in the
tree view to display the Integrated Cable Test: Summary page.
Figure 9-29. Integrated Cable Test: Summary
2 Select a unit in the stack in the Unit ID field. Results from previously-run
tests on that unit are displayed.
3 Ensure that both ends of the copper cable are connected to a device. Dell PowerConnect 55xx Systems User Guide 257
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
4 Ensure that the cable is connected to tested port. Go to the Test tab.
5 Click Test Now. The copper cable and Approximate Cable Length tests are
performed, and the following test results are displayed:
– Test Result — Displays the cable test results. The possible options are:
• No Cable — There is no cable connected to the port.
• Open Cable — The cable is connected on only one side.
• Short Cable — A short has occurred in the cable.
• OK — The cable passed the test.
– Cable Fault Distance — Displays the distance from the port where
the cable error occurred.
– Last Update — Displays the last time the port was tested.
– Approximate Cable Length — Displays the approximate cable length.
Performing Integrated Cable Tests Using CLI Commands
The following table contains the CLI commands for performing integrated
cable tests.
Table 9-38. Integrated Cable Test CLI Commands
CLI Command Description
test cable-diagnostics tdr
interface[gigabitethernet|tengigab
itethernet] port-number
Performs VCT tests.
show cable-diagnostics tdr
interface[gigabitethernet|tengigab
itethernet] port-number
Shows results of last VCT tests on
ports.
show cable-diagnostics cablelength interface
[gigabitethernet|tengigabitetherne
t] port-number
Displays the estimated copper
cable length attached to a port.258 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
Optical Transceiver Diagnostics
The Optical Transceiver Diagnostics page displays the operating conditions
reported by the SFP (Small Form-factor Pluggable) transceiver. Some
information might not be available for SFPs that do not support the digital
diagnostic monitoring standard SFF-8472.
The following is the list of the compatible SFPs:
• SFP:
– X3366 — 1000Base-SX, Finisar FTLF8519P2BNL
– U3650 — 1000Base-LX, Finisar FTRJ1319P1BTL
• SFP+:
– N743D — SR, Finisar FTLX8571D3BCL
– T307D — LR, Finisar FTLX1471D3BCL
– C043H — LRM, Avago AFBR-707SDZ-D1
– N198M — LRM, Finisar FTLX1371D3BCL
console> enable
console# test cable-diagnostics tdr gi1/0/3
Cable is open at 100 meters.
console# show cable-diagnostics cable-length interface
gi2/0/5
Port Length [meters]
------- ----------------
gi2/0/5 < 50Dell PowerConnect 55xx Systems User Guide 259
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To view the results of optical fiber tests:
• Click System > Diagnostics > Optical Transceiver Diagnostics in the
tree view to display the Optical Transceiver Diagnostics page.
Figure 9-30. Optical Transceiver Diagnostics
The following fields are displayed for the selected unit:
– Port — The port number on which the cable was tested.
– Temperature — The temperature (C) at which the cable is operating.
– Voltage — The voltage at which the cable is operating.
– Current — The current at which the cable is operating.
– Output Power — The rate at which output power is transmitted.
– Input Power — The rate at which input power is transmitted.
– Transmitter Fault — A fault occurred during transmission.
– Loss of Signal — A signal loss occurred in the cable.
– Data Ready — The transceiver has achieved power up, and data is
ready.260 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Performing Fiber Optic Cable Tests Using CLI Commands
The following table contains the CLI command for performing fiber optic
cable tests.
The following is an example of the CLI command:
Table 9-39. Fiber Optic Cable Test CLI Commands
CLI Command Description
show fiber-ports opticaltransceiver [interface
[gigabitethernet|tengigabitethe
rnet] port-number] [detailed]
Displays the optical transceiver
diagnostics.
console# show fiber-ports optical-transceiver detailed
Port Temp
[C]
Voltage Current
[aM]
Output
[mWat]
Input
[mWa]
POWER
[mWa]
LOS
------- ---- ------- ---- ---- ---- ---- ---
gi1/0/1 48 5.15 50 1.789 1.789 No No
gi1/0/2 43 5.15 10 1.789 1.789 No NoDell PowerConnect 55xx Systems User Guide 261
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Management Security
This section describes the pages used to manage device security.
It contains the following topics:
• Access Profiles
• Profile Rules
• Authentication Profiles
• Select Authentication
• Active Users
• Local User Database
• Line Passwords
• Enable Password
• TACACS+
• Password Management
• RADIUS
Access Profiles
Access to management functions may be limited to users identified by:
• Ingress interface (Port, LAG, or VLAN)
• Source IP address
• Source IP subnet
Management access may be separately defined for the following types of
management access methods:
• Telnet (CLI over Telnet sessions)
• Secure Telnet
• Web (HTTP)
• Secure Web (HTTPS, Using SSL)
• SNMP 262 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
This means, for example, that the set of managers allowed via Telnet may be
different than the set of Web-based managers which is, in turn, may be
different than the set of secure-web based managers, and so on.
A specific management access method may be completely disabled by
denying all user access to it (e.g. denying all users access to CLI/Telnet
management effectively disables CLI/Telnet as an available management
interface to the system).
By default, management access to the system, through all methods, is
enabled over all interfaces.
NOTE: If you enable management access through a physical port, all VLANs and
IP interfaces on that port will be acceptable management traffic sources. If you
enable management access through a VLAN, all ports and IP interfaces on that
VLAN will be acceptable. If specific IP address(es) are specified, only traffic from
the specified IP addresses on the appropriate ports will be accepted.
Access Profiles Rules
Each management access profile is composed of at least one rule, which acts
as a filter, and defines the device management method, interface type, source
IP address, network mask, and the device management access action.
Users can be blocked or permitted management access.
Rule priority sets the order in which the rules are implemented. Assigning an
access profile to an interface denies access via other interfaces. If an access
profile is not assigned to any interface, the device can be accessed by all
interfaces.
A total of 256 rules can be defined for all Management Access profiles.
To add rules to existing access profiles, see "Profile Rules" on page 266.Dell PowerConnect 55xx Systems User Guide 263
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Creating an Access Profile
To define an access profile with a single rule:
1 Click System > Management Security > Access Profiles in the tree view
to display the Access Profiles: Summary page.
Figure 9-31. Access Profiles: Summary
The currently-defined access profiles are displayed.
2 To activate an access profile, select it in the Active Access Profile field.
If you select Console Only, active management of the device can only be
performed using the console connection. This profile cannot be removed.
3 To add a new profile, click Add, and enter the fields:
– Access Profile Name (1-32 Characters) — Enter a name for the access
profile. 264 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Rule Priority (1-65535) — Enter the rule priority. Rules are applied to
packets according to their priority. These can be viewed in the Profile
Rules: Summary page.
– Management Method — Select the management method to which
the access profile is applied. Users using this management method are
authenticated using this access profile. The possible options are:
• All — The access profile is applied to all management methods.
• Telnet — The access profile is applied to Telnet users.
• Secure Telnet (SSH) — The access profile is applied to SSH
users.
• HTTP — The access profile is applied to HTTP users.
• Secure HTTP (HTTPS) — The access profile is applied to
HTTPS users.
• SNMP — The access profile is applied to SNMP users.
– Interface — Check the fields and select the interface type to which
the rule applies.
– Enable Source IP Address — Check this parameter to restrict access,
based on the source IP address. When this field is not selected, the
source IP address cannot be entered into a configured rule.
– Supported IP Format — Select whether the IPv4 or IPv6 format is
supported for the source IP addresses.
– Source IP Address — Enter the interface source IP address for which
the rule applies. This is an optional field and indicates that the rule is
valid for a subnetwork.
– Network Mask — Enter the IP subnetwork mask if Supported IP
Format is IPv4.
– Prefix Length — Enter the number of bits that comprise the source IP
address prefix, or the network mask of the source IP address.
– Action — Select whether to permit or deny management access to the
defined interface. The possible options are:
• Permit — Permits access to the device.
• Deny — Denies access to the device. Dell PowerConnect 55xx Systems User Guide 265
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining Access Profiles Using CLI Commands
The following table contains the CLI command for defining an access profile,
without its rules. The CLI commands for defining the rules are described in
"Defining Access Profile Rules Using CLI Commands" on page 267.
The following is an example of the CLI commands:
Table 9-40. Access Profile CLI Commands
CLI Command Description
management access-list
name
no management access-list
name
Defines an access-list for management.
Use the no form of this command to delete an
access list.
console(config)# management access-list mlist
console(config-macl)#266 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Profile Rules
If an access profile already exists, meaning that a single rule has been defined
on it, use the Profile Rules pages to add additional rules to it.
To add a rule to a management access profiles:
1 Click System > Management Security > Profile Rules in the tree view to
display the Profile Rules: Summary page.
Figure 9-32. Profile Rules: Summary
2 Select an access profile name. Its rules are displayed in the order that they
will be implemented.
3 To add a rule to the selected management access profile, click Add.
4 Select a management access profile.
5 Complete the fields that are defined in Access Profiles pages.Dell PowerConnect 55xx Systems User Guide 267
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining Access Profile Rules Using CLI Commands
The following table summarizes the CLI commands for adding rules to access
profiles.
Table 9-41. Access Profiles CLI Commands
CLI Command Description
permit[[gigabitethernet|tengigab
itethernet port-number]|vlan
vlan-id|port-channel LAG-number]
[service service]
Sets port permit conditions for the
management access list.
permit ip-source {ipv4-
address|ipv6-address|prefixlength} [mask mask|prefixlength]
[[gigabitethernet|tengigabitethe
rnet][port-number|vlan vlanid|port-channel LAG-number]
[service service]
Sets port permitting conditions for
the management access list, and the
selected management method.
deny
[[gigabitethernet|tengigabitethe
rnet] port-number|vlan vlanid|port-channel LAG-number]
[service service]
Sets port denying conditions for the
management access list, and the
selected management method.
deny ip-source {ipv4-
address|ipv6-address|prefixlength} [mask mask|prefixlength]
[[gigabitethernet|tengigabitethe
rnet] port-number|vlan vlanid|port-channel LAG-number]
[service service]
Sets port denying conditions for the
management access list, and the
selected management method.
management access-class
{console-only|name}
no management access-class
Defines which access-list is used as
the active management connections.
Use the no form of this command to
disable management connection
restrictions.268 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
show management access-list
[name]
Displays the active management
access-lists.
show management access-class Displays information about
management access-class.
console(config)# management access-list mlist
console(config-macl)# permit gi1/0/1
console(config-macl)# permit gi1/0/2
console(config-macl)# deny gi1/0/3
console(config-macl)# deny gi1/0/4
console(config-macl)# exit
console(config)# management access-class mlist
console(config)# exit
console# show management access-list
mlist
-----
permit gi1/0/1
permit gi1/0/2
deny gi1/0/3
deny gi1/0/4
! (Note: all other access implicitly denied)
console# show management access-class
Management access-class is enabled, using access list
mlist
Table 9-41. Access Profiles CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 269
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Authentication Profiles
In addition to access profiles, you can configure authentication for
management access methods, such as SSH, console, Telnet, HTTP, and
HTTPS.
User authentication can occur:
• Locally
• Via an external server, such as a TACACS+ or a RADIUS server
User authentication occurs in the order that the methods are selected, for
example, if both the Local and RADIUS options are selected, the user is
authenticated first locally. If the local user database is empty, the user is
authenticated via the RADIUS server.
If an error occurs during the authentication, the next selected method is
used.
If an authentication method fails, or the user has an insufficient privilege
level, the user is denied access to the switch. The switch then stops, does not
continue, and does not attempt to use the next authentication method.
If a privilege level is redefined, the user must also be re-defined.
User authentication can also be set to None, in which case no authentication
is performed.
The process of configuring authentication for management access methods is
divided into the following stages:
• Create an authentication profile, as described below
• Assign an authentication profile to a management method, as described in
"Select Authentication" on page 272270 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To create an authentication profile:
1 Click System > Management Security > Authentication Profiles in the
tree view to display the Authentication Profiles: Summary page.
Figure 9-33. Authentication Profiles: Summary
All currently-defined authentication profiles are displayed.
2 Click Add to add a new authentication profile, and enter the fields:
– Profile Name (1-12 Characters) — Enter the name of the new
authentication profile. Profile names cannot include blank spaces.
– Authentication Method: Optional Methods — Select a user
authentication methods that can be assigned to this authentication
profile. The possible options are:
• Line — The line password is used for user authentication
(defined in "Line Passwords" on page 279).Dell PowerConnect 55xx Systems User Guide 271
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Enable — The enable (encrypted) password is used for
authentication (defined in "Enable Password" on page 281).
• Local — The user authentication is performed by the device,
which checks the user name and password for authentication.
• RADIUS — The user authentication is performed by the
RADIUS server. For more information, see "RADIUS" on
page 291.
• TACACS+ — The user authentication is performed by the
TACACS+ server. For more information, see "TACACS+" on
page 282.
• None — No user authentication occurs.
Select a method by highlighting it in the Optional Methods list, and
clicking on the right arrow to move it to the Selected Methods list.
Configuring an Authentication Profile Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Authentication Profiles pages.
The following is an example of the CLI commands:
Table 9-42. Authentication Profile CLI Commands
CLI Command Description
aaa authentication login
{default|list-name} method1
[method2]
no aaa authentication login
{default|list-name}
Configures login authentication.
Use the no form of the command to
remove a login authentication profile.
console(config)# aaa authentication login default radius
local enable none272 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Select Authentication
After Authentication Profiles are defined, the Authentication Profiles can be
assigned to Management Access methods, for example, console users can be
authenticated by Authentication Profile 1, while Telnet users can be
authenticated by Authentication Profile 2.
To assign an authentication profile to a management access method:
1 Click System > Management Security > Select Authentication in the
tree view to display the Select Authentication page.
Figure 9-34. Select Authentication
2 For the Console, Telnet and Secure Telnet (SSH) types of users, select
either the default authentication profile or one of the previously-defined
authentication profiles.Dell PowerConnect 55xx Systems User Guide 273
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 For Secure HTTP and HTTP types of users, select one or all of the
Optional Methods and click the right-arrow to move them to the Selected
Methods. The options are:
– Local — Authentication occurs locally.
– None — No authentication method is used for access.
– RADIUS — Authentication occurs at the RADIUS server.
– TACACS+ — Authentication occurs at the TACACS+ server.
Assigning Access Authentication Profiles Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Select Authentication page.
Table 9-43. Select Authentication CLI Commands
CLI Command Description
aaa authentication enable {default|listname} method [method2 ...]
no aaa authentication enable {default|listname}
Indicates the authentication
method list when accessing a
higher privilege level from a
remote Telnet, Console or SSH.
enable authentication [default|list-name]
no enable authentication
Specifies the authentication
method for accessing a higher
privilege level from a remote
Telnet or console.
Use the no form of this
command to restore the default
authentication method
login authentication [default|list-name] Indicates the login
authentication method list for a
remote Telnet, Console or SSH.
ip http authentication aaa loginauthentication method1 [method2]
no ip http authentication aaa loginauthentication
Indicates authentication
methods for HTTP or HTTPS
servers.
show authentication methods Displays information about the
authentication methods.274 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands that sets authentication
for the console using the default method list that was previously-defined:
The following is an example of the CLI commands that creates an
authentication method list for http server access (RADIUS and local):
console(config)#line console
console(config-line)# enable authentication default
console(config-line)# login authentication default
console(config-line)# exit
console(config)# ip http authentication aaa loginauthentication radius local
console(config)# exitDell PowerConnect 55xx Systems User Guide 275
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Active Users
To view active users on the device:
• Click System > Management Security > Active Users in the tree view to
display the Active Users page.
Figure 9-35. Active Users
The following fields are displayed for all active users:
– Name — Active users logged into the device.
– Protocol — The management method by which the user is connected
to the device.
– Location — The user’s IP address.276 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Displaying Active Users Using CLI Commands
The following table summarizes the CLI commands for viewing active users
connected to the device.
The following example shows an example of the CLI command:
Table 9-44. Active Users CLI Commands
CLI Command Description
show users Displays information about active users.
console> show users
Username Protocol Location
-------- -------- ---------
Bob Serial
John SSH 172.16.0.1
Robert HTTP 172.16.0.8
Betty Telnet 172.16.1.7Dell PowerConnect 55xx Systems User Guide 277
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Local User Database
Use the Local User Database pages to define users, passwords and access
levels.
To add a new user:
1 Click System > Management Security > Local User Database in the tree
view to display the Local User Database: Summary page.
Figure 9-36. Local User Database: Summary
All users are displayed even if they have been suspended.
If a user has been suspended, it can be restored here by selecting the
Reactivate Suspended User field.
2 To add a user, click Add, and enter the fields:
– User Name (1-20 characters) — Enter the username of the user.278 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Access Level — Select a user access level. The lowest user access level
is 1 and 15 is the highest user access level. Users with access level 15
are Privileged Users, and only they can access and use the switch
administrator.
– Password (8-64 characters) — Enter the password of the user.
– Confirm Password — Confirm the password of the user.
The following fields are displayed:
• Expiry Date — The expiration date of the user-defined password.
• Lockout Status — Specifies whether the user currently has access
(status Usable), or whether the user is locked out due to too many
failed authentication attempts since the user last logged in
successfully (status Locked).
• Reactivate Suspended User — Check to reactivate the specified
user’s access rights. Access rights can be suspended after
unsuccessfully attempting to login.
Configuring Local Users Using CLI Commands
The following table summarizes the CLI commands for configuring local
users.
Table 9-45. Local User CLI Commands
CLI Command Description
username name {nopassword|password
password|password encrypted
encrypted-password}
username name [privilege-level]
no username name
Establishes a username-based
authentication system.
Use the no form to remove a user
name.
set username name active Reactivates a suspended user’s
access rights.
show user accounts Displays users information.Dell PowerConnect 55xx Systems User Guide 279
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
Line Passwords
To add a line password for Console, Telnet, and Secure-Telnet users:
1 Click System > Management Security > Line Passwords in the tree view
to display the Line Password page.
Figure 9-37. Line Password
2 Enter the fields for each type of user, separately:
– Password (0 - 159 Characters) — Enter the line password for accessing
the device.
– Confirm Password — Confirm the line password.
console(config)# username bob password lee privilege 15
console# set username bob active280 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Console/Telnet/Secure Telnet Line Aging (1-365) — Check to set the
amount of time in days that elapses before a line password is aged out.
Enter the number of days after which the password expires.
– Expiry Date — Displays the expiration date of the line password.
– Lockout Status — Displays whether the user currently has access
(status Usable), or whether the user is locked out due to too many
failed authentication attempts since the user last logged in
successfully (status Locked).
– Reactivate Locked Line — Check to reactivate the line password for a
Console/Telnet/Secure Telnet session. Access rights can be suspended
after a number of unsuccessful attempts to log in.
Assigning Line Passwords Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Line Password page
.
The following is an example of the CLI commands:
Table 9-46. Line Password CLI Commands
CLI Command Description
line {console|telnet|ssh} Identifies a specific line for configuration
and enters the Line Configuration
command mode.
password password
[encrypted]
no password
Sets a password on a line.
Use the no form of this command to
remove the password.
console(config)# line console
console(config-line)# password dellDell PowerConnect 55xx Systems User Guide 281
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Enable Password
To set a local password to control access to Normal and Privilege levels
activities.
1 Click System > Management Security > Enable Passwords in the tree
view to display the Enable Password page.
Figure 9-38. Enable Password
2 Enter the fields:
– Select Enable Access Level — Select the access level to associate with
the enable password. The lowest user access level is 1 and 15 is the
highest user access level. Users with access level 15 are Privileged
Users, and only they can access and use the OpenManage Switch
Administrator.
– Password (0-159 characters) — Enter the enable password.
– Confirm Password — Confirm the password.282 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Expiry Date — If Aging is selected, displays the expiration date of the
enable password.
– Lockout Status — Displays the number of failed authentication
attempts since the user last logged in successfully (if the Enable
Login Attempts checkbox is selected in the Password Management
page.) Specifies LOCKOUT, when the user account is locked.
– Reactivate Suspended User — Check to reactivate the specified user’s
access rights. Access rights can be suspended after unsuccessfully
attempting to login.
Assigning Enable Passwords Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Enable Password page.
The following is an example of the CLI commands:
TACACS+
The device can act as a Terminal Access Controller Access Control System
(TACACS+) client. TACACS+ provides centralized validation of users
accessing the device, while still retaining consistency with RADIUS and other
authentication processes.
TACACS+ provides the following services:
• Authentication — Provides authentication during login and via user
names and user-defined passwords.
• Authorization — Performed at login after authentication. The TACACS+
server checks the privileges of the authenticated user.
Table 9-47. Enable Password CLI Commands
CLI Command Description
enable password [level
level] d [encrypted]
no enable password [level
level]
Sets a local password to control access to
user and privilege levels.
Use the no form of this command to
remove the password requirement.
console(config)# enable password level 15 secretDell PowerConnect 55xx Systems User Guide 283
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The TACACS+ protocol ensures network integrity through encrypted
protocol exchanges between the device and TACACS+ server.
To configure TACACS+ servers:
1 Click System > Management Security > TACACS+ in the tree view to
display the TACACS+: Summary page.
Figure 9-39. TACACS+: Summary
The list of currently-defined TACACS+ servers is displayed. The
parameters for each server is displayed, along with its connection status.
2 Enter the default parameters for TACACS+ servers. These values are used
unless values are added in the TACACS+ Add or Edit pages.
– Source IP Address — The device IP address used for the TACACS+
session between the device and the TACACS+ server. The default is
0.0.0.0., which means that any IP address of the device can be used to
communicate with the TACACS+ server.284 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Key String (1-128 Characters) — The authentication and encryption
key for TACACS+ communications between the device and the
TACACS+ server. This key must match the encryption key sent by the
TACACS+ server. This key is encrypted.
– Timeout for Reply (1-30) — The amount of time that passes before
the connection between the device and the TACACS+ server times
out.
3 To add a TACACS+ server, click Add, and enter the fields on the page.
The fields below are those that were not described on the TACACS+:
Summary page.
– Host IP Address — Enter the TACACS+ server IP address.
– Priority (0-65535) — Enter the order in which the TACACS+ servers
are used if several are defined.
– Source IP Address — Enter either specific device IP address for the
TACACS+ server.
– Authentication Port (0-65535) — Enter the port number through
which the TACACS+ session occurs.
– Timeout for Reply (1-30) — Enter the amount of time that passes
before the connection between the device and the TACACS+ server
times out.
– Single Connection — Check to maintain a single open connection
between the device and the TACACS+ server.Dell PowerConnect 55xx Systems User Guide 285
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Wherever available, check Use Default to use a value that was entered in
the TACACS+: Summary page.
Defining TACACS+ Settings Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the TACACS+ Settings pages.
Table 9-48. TACACS+ CLI Commands
CLI Command Description
tacacs-server host {ip
address|hostname}[singleconnection] [port port-number]
[timeout timeout][key keystring][source source] [priority
priority]
no tacacs-server host {ipaddress|hostname}
Configures a TACACS+ host.
Use the no form of this command to
delete the specified TACACS+ host.
tacacs-server key key-string
no tacacs-server key
Specifies the authentication and
encryption key for all TACACS+
communications between the device
and the TACACS+ server.
Use the no form of this command to
disable the key.
tacacs-server timeout timeout
no tacacs-server timeout
Specifies the timeout value in
seconds.
tacacs-server source-ip source
no tacacs-server source-ip
source
Specifies the source IP address.
Use the no form of this command to
restore the default configuration.
show tacacs [ip-address] Displays configuration and statistics
for a TACACS+ server.286 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
Password Management
Password management provides increased network security and improved
password control. This feature is optional and must be enabled in the
Password Management page.
Passwords for SSH, Telnet, HTTP, HTTPS, and SNMP access can be assigned
security features that include:
• Minimum password lengths
• Password expiration dates (password aging)
• Prevention of frequent password reuse
• Lockout of users after failed login attempts
• Number of repeated characters allowed
• Number of different character classes required in the password. Numeric,
alphabetic, and special characters are all character classes.
console(config)# tacacs-server source-ip 172.16.8.1
console# show tacacs
Device Configuration
-----------------------------
IP Address Status Port Single TimeOut Source IP Priority
Connection
---------- ------ ------ ---------- -------- ---------- --------
1.1.1.11 Not 49 No Global Global 10
Connected
1.1.1.21 Not 49 No Global Global 19
Connected
1.1.1.31 Not 49 No Global Global 18
Connected
1.1.1.41 Not 49 No Global Global 17
Connected
Global values
--------------
TimeOut : 5
-----------------------------
Source IP : 0.0.0.0Dell PowerConnect 55xx Systems User Guide 287
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Password aging starts immediately after password management is enabled.
However it is only effective if system time on the device is taken from an
SNTP server. Passwords expire according to the user-defined expiration
date/time. Ten days prior to password expiration, the device displays a
password expiration warning message.
After the password has expired, users can log in a few additional times.
During the remaining logins, an additional warning message displays
informing the user that the password must be changed. If the password is not
changed, users are locked out of the system, and can only log in using the
console. Password warnings are logged in the SYSLOG file.
NOTE: Password aging is enabled only after setting the switch to use SNTP for
setting time.288 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To define password management parameters:
1 Click System > Management Security > Password Management in the
tree view to display the Password Management page.
Figure 9-40. Password Management
2 Check the required fields and enter their values:
– Enable Strong Passwords — Check to enable this feature.
– Number of Classes — Select a number of character classes. The
character classes are: upper case characters, lower case characters,
digits and punctuation. The number of character classes selected
indicates how many different types of characters must be in the
password.
– Repeated Characters — Select the number of permissible repeated
characters in the password.Dell PowerConnect 55xx Systems User Guide 289
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Password Minimum Length (8-64 characters) — When checked,
specifies the minimum password length. Enter the minimum
password length.
– Enable Login Attempts — When checked, enables locking a user out
of the device when a faulty password is used more than the number of
times entered. Select the maximum number of login attempts.
– Global Password Aging (1-365) — When checked, specifies that the
password will expire in the number of days entered. Enter the number
of days. This is only enabled after setting the switch to use SNTP for
setting time
– Consecutive Passwords Before Reuse (1-10) — When checked,
indicates the number of times a password must be changed, before the
password can be reused. Select the number of times.
– Password History Hold Time (1-365) — When checked, the password
history will be deleted after the number of days entered. Enter the
number of days.
Password Management Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Password Management page.
Table 9-49. Password Management CLI Commands
CLI Command Description
passwords strength-check enable
no passwords strength-check
Enforces password strength checks.
Use the no form of this command
to disable enforcing password
strength checks.
passwords strength [max-limit
repeated characters | minimum
character-classes]
no passwords strength
Enforces limits of repeated
characters and character classes.
Use the no form of this command
to disable enforcing limits of
repeated characters and character
classes.290 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is a sample script that sets password strength rules and creates a
user with a valid password.
password min-length length
no password min-length
Defines the minimum password
length.
Use the no form of this command
to remove the restriction.
passwords aging days
no passwords aging
Enforces password aging.
Use the no form of this command
to return to default.
password history number
no password history
Defines the amount of times a
password is changed, before the
password can be reused.
password history hold-time days
no password history hold-time
Configures the duration that a
password is relevant for tracking
passwords history.
Use the no form of this command
to return to the default
configuration.
password lockout number
no password lockout
Defines the number of times a
faulty password is entered before
the user is locked out of the device.
Use the no form of this command
to disable the lockout feature.
show password configuration Displays password management
information.
Table 9-50. CLI Script to Configure Strong Password
CLI Command Description
console#configure
console(conf)# passwords strengthcheck enable
Enable strong passwords.
Table 9-49. Password Management CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 291
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
RADIUS
Remote Authentication Dial-In User Service (RADIUS) servers provide
additional security for networks. Up to four RADIUS servers can be defined.
RADIUS servers provide a centralized authentication method for:
• Telnet Access
• Secure Shell Access
• Web Access
• Console Access
console(config)# passwords strength
minimum character-classes 3
Enable that passwords must
contain at least three
character classes.
password min-length 8 Enable that passwords must
contain at least eight
characters.
console(config)# username admin
privilege 15 password FGH123!@#
Create a user named
"admin" with privilege level
15 and password that fits
the strength rules.
Table 9-50. CLI Script to Configure Strong Password
CLI Command Description292 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To add a RADIUS server:
1 Click System > Management Security > RADIUS in the tree view to
display the RADIUS: Summary page.
Figure 9-41. RADIUS: Summary
The RADIUS default parameters and previously-defined RADIUS servers
are displayed.
2 Enter the default parameters to be used when these parameters are not
entered for a specific server.
– Default Retries (1-10) — The default number of transmitted requests
sent to RADIUS server before a failure occurs.
– Default Timeout for Reply (1-30) — The default amount of the time
(in seconds) that the device waits for an answer from the RADIUS
server before timing out.
– Default Dead time (0-2000) — The default amount of time (in
minutes) that a RADIUS server is bypassed for service requests.
– Default Key String (0-128 Characters) — The Default Key string
used for authenticating and encrypting all RADIUS communications
between the device and the RADIUS server. This key is used for
encryption.
– Source IPv4 Address — The source IP v4 address that is used for
communication with RADIUS servers.Dell PowerConnect 55xx Systems User Guide 293
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Source IPv6 Address — The source IP v6 address that is used for
communication with RADIUS servers.
3 To add a RADIUS server, click Add, and enter the fields:
– Supported IP Format — Select whether the IPv4 or IPv6 format is
supported.
– IP Address — Enter the RADIUS server IP address.
– Priority (0-65535) — Enter the priority of the authentication server
being added. 0 is the highest value. This is used to configure the order
in which servers are queried.
– Authentication Port (0-65535) — Enter the authentication port used
to verify the RADIUS server authentication. Enter 0 if you do not
want this server to be used for authentication purposes.
– Accounting Port (0-65535) — Enter the accounting port, which is the
UDP port number of the RADUS server used for accounting requests.
Enter 0 if you do not want this server to be used for accounting
purposes.
– Usage Type — Enter the RADIUS server usage. The possible options
are:
• Login — Used for login authentication and/or accounting.
• 802.1x — Used for 802.1x authentication and/or accounting.
• All — Used for all types of authentication and/or accounting.
4 Enter the following fields if you do not want to use the default values
entered in the RADIUS: Summary page. If you do want to use the default
values, check Use Default for these fields.
– Number of Retries (1-10) — Enter the number of requests sent to the
RADIUS server before a failure occurs.
– Timeout for Reply (1-30) — The amount of the time in seconds that
the device waits for an answer from the RADIUS server before retrying
the query, or switching to the next server.
– Dead Time (0-2000) — The amount of time (in minutes) that a
RADIUS server is bypassed for service requests.
– Key String (0-128 Characters) — The key string used for
authenticating and encrypting all RADIUS communications between
the device and the RADIUS server. 294 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Source IP Address — The device IP address that is used for
communication with RADIUS servers.
Defining RADIUS Servers Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed on the RADIUS pages.
Table 9-51. RADIUS Server CLI Commands
CLI Command Description
radius-server host {ipv4-
address|ipv6-address|ipv6zaddress|hostname} [auth-port
auth-port-number] [acct-port
acct-port-number][timeout
timeout] [retransmit retries]
[deadtime deadtime] [key keystring] [source {ipv4-
address|ipv6-address}] [priority
priority] [usage
{login|802.1x|all}]
no radius-server host {ipv4-
address|ipv6-address|hostname}
Specifies a RADIUS server host.
Use the no form of the command to
delete the specified RADIUS server
host.
radius-server timeout timeout
no radius-server timeout
Sets the interval for which a device
waits for a server host to reply.
Use the no form of this command to
restore the default configuration.
radius-server source-ip sourceip-address
no radius-server source-ip
source-ip-address
Specifies the source IPv4 address
that will be used for the IPv4
communication with RADIUS
servers.
Use the no form of this command to
restore the default configuration.Dell PowerConnect 55xx Systems User Guide 295
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
radius-server source-ipv6
source-ipv6-address
no radius-server source-ipv6
source-ipv6-address
Specifies the source IPv6 address
that will be used for the IPv6
communication with RADIUS
servers.
Use the no form of this command to
restore the default configuration.
radius-server retransmit retries
no radius-server retransmit
Specifies the number of times the
software searches the list of
RADIUS server hosts.
Use the no form of this command to
restore the default configuration.
radius-server deadtime deadtime
no radius-server deadtime
Configures unavailable servers to be
skipped.
Use the no form of this command to
restore the default configuration.
radius-server key key-string
no radius-server key
Sets the authentication and
encryption key for all RADIUS
communications between the router
and the RADIUS server.
Use the no form of this command to
restore the default configuration.
show radius-servers Displays the RADIUS server
settings.
Table 9-51. RADIUS Server CLI Commands (Continued)
CLI Command Description296 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of CLI commands:
console(config)# radius-server host 192.168.10.1 authport 20 timeout 20
console(config)# radius-server key enterprise-server
console# show radius-servers
IP address Port Port Time- Ret- Dead- Source IP Prio. Usage
Auth Acct Out rans Time
--------------- ----- ----- ------ ------ ------ --------------- ----- ---
1.1.1.11 1812 1813 Global Global Global Global 10 all
1.1.1.21 1812 1813 Global Global Global Global 19 all
1.1.1.31 1812 1813 Global Global Global Global 18 all
1.1.1.41 1812 1813 Global Global Global Global 17 all
1.1.1.51 1812 1813 Global Global Global Global 16 all
Global values
--------------
TimeOut : 3
Retransmit : 3
Deadtime : 0
Source IP : 0.0.0.0
Source IPv6 : ::Dell PowerConnect 55xx Systems User Guide 297
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
DHCP Server
The switch can operate as either:
• DHCP client that obtains its own IP from a DHCP server, as described in
"DHCP IPv4 Interface" on page 214
• DHCP server that allocates IP addresses to other devices, as described in
this section
This section contains the following topics:
• DHCP Server Overview
• DHCP Server Properties
• Network Pool
• Excluded Addresses
• Static Hosts
• Address Binding
DHCP Server Overview
A DHCP server uses a defined pool of IP addresses (user-defined) from which
it allocates IP addresses to DHCP clients.
The DHCP server can allocate IP addresses in the following modes:
• Static Allocation — The hardware address of a host is manually mapped
to an IP address.
• Permanent Allocation — An IP address sent to the client through a
standard request-reply mechanism, is owned by that client permanently
(unless changes in the network environment/connections take place, for
any reason).
• Dynamic Allocation — A client obtains a leased IP address for a specified
period of time. The IP address is revoked at the end of this period, and the
client must request another IP address. 298 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
DHCP Server Properties
If the device is configured to act as a DHCP server, pinging capability can be
enabled. The DHCP server pings an IP address in the address pool before
assigning that IP address to a requesting client. If the ping is unanswered, the
DHCP server assumes that the address is not in use and assigns the address to
the client.
To configure the device as a DHCP server:
1 Click System > DHCP Server > DHCP Server Properties in the tree view
to display the DHCP Server Properties page.
Figure 9-42. DHCP Server PropertiesDell PowerConnect 55xx Systems User Guide 299
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Enter the fields:
– DHCP Server Status — Enable/disable the ability of the device to
function as a DHCP server.
– DHCP Ping — Enable/disable the DHCP server to ping the offered
IP address before responding to a client request.
– DHCP Ping Retries — Enter the number of pings that are sent before
discarding an IP address. Use Default reverts to the default Ping
Retries setting.
– DHCP Ping Timeout — Enter the maximum time interval (in
milliseconds) that the DHCP server waits for a ping reply. Use Default
reverts to the default Ping Timeout.
Defining DHCP Server Using CLI Commands
The following table summarizes the CLI commands for defining the switch as
a DHCP server.
Table 9-52. DHCP Server CLI Commands
CLI Command Description
ip dhcp server
no ip dhcp server
Enables the DHCP server feature on
the device.
Use the no form of this command to
disable the DHCP server feature.
ip dhcp ping enable
no ip dhcp ping enable
Enables the DHCP server to send ping
packets before assigning the address to a
requesting client.
Use the no form of this command to
prevent the server from pinging pool
addresses.
ip dhcp ping count number
no ip dhcp ping count
Specifies the number of packets a
DHCP server sends to a pool address as
part of a ping operation.
Use the no form of this command to
restore the default configuration.300 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
ip dhcp ping timeout
milliseconds
no ip dhcp ping timeout
Specifies the time interval during which
a DHCP server waits for a ping reply
from an address pool.
Use the no form of this command to
restore default values.
console(config)# ip dhcp ping enable
console(config)# ip dhcp ping count 5
Table 9-52. DHCP Server CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 301
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Network Pool
When the device is serving as a DHCP server, a pool of IP addresses must be
defined, from which the switch will allocate IP addresses to clients.
Each IP pool has a lease duration.
To create a pool of IP addresses, and define their lease durations:
1 Click System > DHCP Server > Network Pool in the tree view to display
the Network Pool: Summary page.
Figure 9-43. Network Pool: Summary
The previously-defined network pools are displayed.
2 Click Add to define a new network pool, and enter the fields:
– Pool Name — Enter the pool name.
– Subnet IP Address — Enter the subnet in which the network pool
resides.302 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Network Mask — Check and enter the pool’s network mask.
• Prefix Length — Check and enter the number of bits that
comprise the address prefix.
– Address Pool Start — Enter the first IP address in the range of the
network pool.
– Address Pool End — Enter the last IP address in the range of the
network pool.
– Lease Duration — Enter the amount of time a DHCP client can use
an IP address from this pool. The total lease duration is 4294967295
seconds, i.e. 49710.2696 days. Thus a lease of 49710 days, 0 hours, 0
minutes and 0 seconds is a legal value, while a lease of 49710 days, 23
hours, 59 minutes and 59 seconds results in an Out of Range alert.
• Days — The duration of the lease in number of days. The range is
0 to 49710 days.
• Hours — The number of hours in the lease. A days value must be
supplied before an hours value can be added.
• Minutes — The number of minutes in the lease. A days value and
an hours value must be added before a minutes value can be
added.
• Infinite — The duration of the lease is unlimited.
– Default Router — Enter the default router for the DHCP client.
– Domain Name Server — Enter the DNS server available to the DHCP
client.
– Domain Name — Enter the domain name for a DHCP client. The
domain name may contain up to 32 characters.
– NetBIOS WINS Server — Enter the NetBIOS WINS name server
available to a DHCP client.
– NetBIOS Node Type — Select how to resolve the NetBIOS name.
Valid node types are:
• Empty— Default value.
• Broadcast — IP Broadcast messages are used to register and
resolve NetBIOS names to IP addresses.Dell PowerConnect 55xx Systems User Guide 303
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Peer-to-Peer — Point-to-point communications with a NetBIOS
name server are used to register and resolve computer names to IP
addresses.
• Mixed — A combination of b-node and p-node communications
is used to register and resolve NetBIOS names. M-node first uses
b-node; then, if necessary, p-node. M-node is typically not the best
choice for larger networks because its preference for b-node
Broadcasts increases network traffic.
• Hybrid — A hybrid combination of b-node and p-node is used.
When configured to use h-node, a computer always tries p-node
first and uses b-node only if p-node fails. This is the default.
– SNTP Server — Enter the IP address of the time server for the DHCP
client.
– Next Server — Enter the IP address of the next server in the boot
process of a DHCP client. If the next server in the boot process is not
configured, the DHCP server uses inbound interface helper addresses
as boot servers.
– Next Server Name — Enter the name of the next server in the boot
process.
– Image File Name — Enter the name of the file that is used as a boot
image.
Configuring Network Pool Using CLI Commands
The following table summarizes the CLI commands for defining a pool of
addresses on the DHCP server.
Table 9-53. Network Pool CLI Commands
CLI Command Description
ip dhcp pool network name
no ip dhcp pool network name
Configures a DHCP address pool on a
DHCP Server and enters DHCP Pool
Configuration mode.
Use the no form of this command to remove
the address pool.304 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
address {network-number|low
low-address high highaddress} {mask|prefixlength}
no address
Configures the subnet number, mask and
start and end addresses for a DHCP address
pool on a DHCP Server.
Use the no form of this command to remove
the subnet number and mask.
lease {days [{hours}
[minutes]]|infinite}
no lease
Configures the time duration of the lease for
an IP address that is assigned from a DHCP
server to a DHCP client.
Use the no form of this command to restore
the default value
default-router ip-address
[ip-address2 ... ipaddress8]
no default-router
Configures the default router list for a
DHCP client.
Use the no form of this command to remove
the default router list.
dns-server ip-address [ipaddress2 ... ip-address8]
no dns-server
Configures the DNS IP servers available to a
DHCP client.
Use the no form of this command to remove
the DNS server list.
domain-name domain
no domain-name
Specifies the domain name for a DHCP
client.
Use the no form of this command to remove
the domain name.
netbios-name-server ipaddress [ip-address2 ... ipaddress8]
no netbios-name-server
Configures the NetBIOS Windows Internet
Naming Service (WINS) servers that are
available to Microsoft DHCP clients.
Use the no form of this command to remove
the NetBIOS name server list.
netbios-node-type {b-node|pnode|m-node|h-node}
no netbios-node-type
Configures the NetBIOS node type for
Microsoft Dynamic Host Configuration
Protocol (DHCP) clients.
Use the no form of this command to remove
the NetBIOS node type.
Table 9-53. Network Pool CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 305
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
time-server ip-address [ipaddress2 ... ip-address8]
no time-server
Specifies the time servers list for a DHCP
client.
Use the no form of this command to remove
the time servers list.
next-server ip-address
no next-server
Configures the next server in the boot
process of a DHCP client.
Use the no form of this command to remove
the boot server.
next-server-name name
no next-server-name
Configures the next server name in the boot
process of a DHCP client.
Use the no form of this command to remove
the boot server name.
bootfile filename
no bootfile
Specifies the default boot image file name
for a DHCP client.
Use the no form of this command to delete
the boot image file name.
show ip dhcp pool network
[name]
Displays the DHCP network pool
configuration.
console(config)# ip dhcp pool network pool1
console(config-dhcp)# address 10.12.1.99 255.255.255.0
01b7.0813.8811.66
console(config-dhcp)# lease 1
Table 9-53. Network Pool CLI Commands (Continued)
CLI Command Description306 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Excluded Addresses
By default, the DHCP server assumes that all pool addresses in a pool may be
assigned to clients. A single IP address or a range of IP addresses can be
excluded.
To define an excluded address range:
1 Click System > DHCP Server > Excluded Addresses in the tree view to
display the Excluded Addresses: Summary page.
Figure 9-44. Excluded Addresses: Summary
The previously-defined excluded IP addresses are displayed.
2 To add a range of IP addresses to be excluded, click Add, and enter the
fields:
– Start IP Address — First IP address in the range of excluded IP
addresses.Dell PowerConnect 55xx Systems User Guide 307
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– End IP Address — Last IP address in the range of excluded IP
addresses.
Excluding Addresses Using CLI Commands
The following table summarizes the CLI commands for excluding addresses.
The following is an example of the CLI commands:
Table 9-54. Excluding Addresses Using CLI Commands
CLI Command Description
ip dhcp excluded-address lowaddress [high-address]
no ip dhcp excluded-address
low-address [high-address]
Configures a DHCP address pool on a
DHCP Server and enter DHCP Pool
Configuration mode.
Use the no form of this command to
remove the address pool.
show ip dhcp excluded-addresses Displays the excluded addresses.
console(config)# ip dhcp excluded-address 172.16.1.100
172.16.1.199
console> show ip dhcp excluded-addresses
The number of excluded addresses ranges is 2
Excluded addresses:
10.1.1.212- 10.1.1.219, 10.1.2.212- 10.1.2.219308 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Static Hosts
To manually allocate permanent IP addresses to clients (known as static
hosts):
1 Click System > DHCP Server > Static Hosts in the tree view to display
the Static Hosts: Summary page.
Figure 9-45. Static Hosts: Summary
The static hosts are displayed.
2 To add a static host, click Add, and enter the fields:
– Host Name — Enter the host pool name, which can be a string of
symbols and an integer.
– IP Address — Enter the IP address that was statically assigned to the
host.
• Network Mask — Enter the pool’s network mask.
• Prefix Length — Enter the number of bits that comprise the address
prefix.Dell PowerConnect 55xx Systems User Guide 309
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Client Identifier — Enter a unique identification of the client
specified in dotted hexadecimal notation, such as: 01b6.0819.6811.72.
or:
– MAC Address — Enter the MAC address of DHCP static host.
– Client Name — The name of the client, using a standard set of ASCII
characters. The client name must not include the domain name.
– Default Router — Enter the default router for the DHCP client.
– Domain Name Server — Enter the DNS server available to the DHCP
client.
– Domain Name — Enter the domain name for a DHCP client. The
domain name may contain up to 32 characters.
– NetBIOS WINS Server — Enter the NetBIOS WINS name server
available to a DHCP client.
– NetBIOS Node Type — Select how to resolve the NetBIOS name.
Valid node types are:
• Empty — Default value.
• Broadcast — IP Broadcast messages are used to register and
resolve NetBIOS names to IP addresses.
• Peer-to-Peer — Point-to-point communications with a NetBIOS
name server are used to register and resolve computer names to IP
addresses.
• Mixed — A combination of b-node and p-node communications
is used to register and resolve NetBIOS names. M-node first uses
b-node; then, if necessary, p-node. M-node is typically not the best
choice for larger networks because its preference for b-node
Broadcasts increases network traffic.
• Hybrid — A hybrid combination of b-node and p-node is used.
When configured to use h-node, a computer always tries p-node
first and uses b-node only if p-node fails. This is the default.
– SNTP Server — Enter the IP address of the time server for the DHCP
client.310 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Next Server — Enter the IP address of the next server in the boot
process of a DHCP client. If the next server in the boot process is not
configured, the DHCP server uses inbound interface helper addresses
as boot servers.
– Next Server Name — Enter the name of the next server in the boot
process.
– Image File Name — Enter the name of the file that is used as a boot
image.
Defining Static Hosts Using CLI Commands
The following table summarizes the CLI commands for defining static hosts.
See Table 9-53 for the remaining CLI commands that are common to the
Network Pool pages, but are used in the context DHCP Pool Host context.
Table 9-55. Defining Static Hosts Using CLI Commands
CLI Command Description
ip dhcp pool host
no ip dhcp pool host
Configures a DHCP static address
on a DHCP Server and enters the
DHCP Pool Host Configuration
mode.
Use the no form of this command to
remove the address pool.
ip host name address [address2
address3 address4]
no ip host name
Defines the static host name-toaddress mapping in the host cache.
Use the no form of this command to
remove the static hostname-toaddress mapping.
show hosts Displays the default domain name,
the list of name server hosts, the
static and the cached list of host
names and addresses.
clear host Deletes entries from the host nameto-address cache.Dell PowerConnect 55xx Systems User Guide 311
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# ip dhcp pool host station
console(config-dhcp)#ip host accounting.website.com
176.10.23.1
console# show hosts
System Name:
Default domain: Domain name is not configured
Name/address lookup is enable
Name servers (Preference order): 1.1.1.1 1.1.1.2 1.1.1.3
1.1.1.4 1.1.1.5
Configured host name-to-address mapping:
Host IP Address
--------------------------------- -----------------------
accounting.website.com 176.10.23.1312 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Address Binding
Use the Address Binding page to view and remove the IP addresses allocated
by the switch and their corresponding MAC addresses.
To view and/or remove address bindings:
• Click System > DHCP Server > Address Binding in the tree view to
display the Address Binding page.
Figure 9-46. Address Binding
The following fields for the address bindings are displayed:
– IP Address — The IP addresses of the client.
– Client Identifier/MAC Address — A unique identification of the
client specified as a MAC Address or in dotted hexadecimal notation,
e.g., 01b6.0819.6811.72.
– Lease Expiration — The lease expiration date and time of the host’s
IP address.
– Type — The manner in which the IP address was assigned to the
client. The possible options are:
• Static — The hardware address of the host was mapped to an IP
address.Dell PowerConnect 55xx Systems User Guide 313
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Permanent — The IP address, obtained dynamically from the
switch, is owned by the client permanently (unless changes in the
network environment/connections take place, for any reason).
• Dynamic — The IP address, obtained dynamically from the
switch, is owned by the client for a specified period of time. The
IP address is revoked at the end of this period, at which time the
client must request another IP address. 314 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
SNMP
This section describes the Simple Network Management Protocol (SNMP)
for managing network devices.
It contains the following topics:
• SNMP Overview
• SNMP Global Settings
• SNMP Views
• SNMP Access Control (Groups)
• SNMP User Security Model (Users)
• SNMP Communities
• SNMP Notification Filters
• SNMP Notification Recipients
SNMP Overview
The switch supports the SNMPv1, SNMPv2 and SNMPv3.
SNMP v1 and v2
The SNMP agent maintains a list of variables that are used to manage the
switch. These variables are stored in the Management Information Base
(MIB) from which they may be presented. The SNMP agent defines the MIB
specification format, as well as the format used to access the information over
the network. Access rights to the SNMP agents are controlled by access
strings.
SNMPv1 and v2 are enabled by default.
SNMP v3
In addition to the features provided by SNMPv1 and SNMPv2, SNMPv3
applies access control and a new trap mechanism to SNMPv1 and SNMPv2
PDUs. In addition, a User Security Model (USM) can be defined, which
includes:
• Authentication — Provides data integrity and data origin authentication. Dell PowerConnect 55xx Systems User Guide 315
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Privacy — Protects against disclosure of message content. Cipher BlockChaining (CBC) is used for encryption. Either authentication alone can
be enabled on an SNMP message, or both authentication and privacy can
be enabled on an SNMP message. However privacy cannot be enabled
without authentication.
• Timeliness — Protects against message delay or message redundancy. The
SNMP agent compares incoming message to the message time
information.
• Key Management — Defines key generation, updates, and use.
The switch supports SNMP notification filters, based on Object IDs (OIDs),
which are used by the system to manage switch features.
Authentication or Privacy Keys are modified in the User Security Model
(USM).
SNMPv3 can only be enabled if the Local Engine ID is enabled.
SNMP Access Rights
Access rights in SNMP are managed in the following ways:
• SNMPv1 and SNMPv2 — Communities
The community name is a password sent by the SNMP management
station to the device for authentication purposes.
A community string is transmitted along with the SNMPv1,v2 frames, but
neither the frames nor the community string are encrypted. Since
SNMPv1 and SNMPv2 are not encrypted, they are not secure.
Communities can be associated with views or groups, and they are defined
in the Community pages.
• SNMPv3 — Users and Groups
SNMP v3 works with users instead of communities. The users belong to
groups that have access rights assigned to them. Users are defined in the
User Security Model pages
SNMPv3 provides two security mechanisms:
– Authentication — The switch checks that the SNMP user is an
authorized system administrator. This is done for each and every
frame. 316 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Privacy — SNMP frames can carry encrypted data.
These mechanisms can be combined to provide three levels of security:
– No security
– Authentication
– Authentication and Privacy. Note that for both authentication and
privacy to be enabled, two groups with the same name, one with
authentication and one with privacy, must be created.
A group is a label for a combination of attributes that determines whether
members have read, write, and/or notify privileges. Users can be associated
with a group. A group is operational only when it is associated with an
SNMP user.
Model OIDs
The following are the switch model Object IDs (OIDs):
SNMP Global Settings
The Engine ID is used by SNMPv3 entities to uniquely identify themselves.
An SNMP agent is considered an authoritative SNMP engine. This means
that the agent responds to incoming messages (Get, GetNext, GetBulk, Set),
and sends Trap messages to a manager. The agent's local information is
encapsulated in fields in the message.
Each SNMP agent maintains local information that is used in SNMPv3
message exchanges (not relevant for SNMPv1 or SNMPv2). The default
SNMP Engine ID is comprised of the enterprise number and the default
MAC address. The SNMP engine ID must be unique for the administrative
domain, so that no two devices in a network have the same engine ID.
Model Name Object ID
PC5524 10895.3030
PC5524P 10895.3032
PC5548 10895.3031
PC5548P 10895.3033Dell PowerConnect 55xx Systems User Guide 317
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The local information is stored in four read-only MIB variables:
snmpEngineId, snmpEngineBoots, snmpEngineTime, and
snmpEngineMaxMessageSize.
To configure SNMP:
1 Click System > SNMP > Global Parameters in the tree view to display
the Global Parameters page.
Figure 9-47. Global Parameters
The global parameters are displayed.
2 Enter the fields:
– Local Engine ID (10-64 Hex Characters) — Check and enter the
local device engine ID. The field value is a hexadecimal string. Each
byte in hexadecimal character strings is two hexadecimal digits. Each
byte can be separated by a period or a colon. The Engine ID must be
defined before SNMPv3 is enabled.
For stacked devices, verify that the Engine ID is unique for the
administrative domain. This prevents two devices in a network from
having the same Engine ID. 318 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Use Default — Check to use the device-generated Engine ID. The
default Engine ID is based on the device MAC address, and is defined
per standard as:
• First 4 octets — First bit = 1, the rest is IANA Enterprise number
= 674.
• Fifth octet — Set to 3 to indicate the MAC address that follows.
• Last 6 octets — MAC address of the device.
– SNMP Notifications — Enable/disable the switch sending SNMP
notifications.
– Authentication Notifications — Enable/disable the switch sending
SNMP traps when authentication fails.
Setting SNMP Global Parameters Using CLI Commands
The following table summarizes the CLI commands for setting fields in the
Global Parameters page.
Table 9-56. SNMP Global Parameters Commands
CLI Command Description
snmp-server engine ID local
{engine-id-string|default}
no snmp-server engine ID
local
Specifies the local device engine ID. The
field values is a hexadecimal string. Each
byte in hexadecimal character strings is two
hexadecimal digits. Each byte can be
separated by a period or colon. The Engine
ID must be defined before SNMPv3 is
enabled.
Use the no form of this command to
remove the configured engine ID.
snmp-server enable traps
no snmp-server enable traps
Enables the router to send Simple Network
Management Protocol traps.
Use the no form of the command to disable
SNMP traps.Dell PowerConnect 55xx Systems User Guide 319
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
SNMP Views
An SNMP view, which is a collection of MIB subtrees, provides or blocks
access to device features.
Each subtree is defined by the Object ID (OID) of the root of its subtrees. In
extreme cases this subtree can be a leaf. Well-known names can be used to
specify the root of the desired subtree, or an OID can be entered (see "Model
OIDs" on page 316).
Each subtree is either included in or excluded from the view being defined.
snmp-server trap
authentication
no snmp-server trap
authentication
Enables the router to send Simple Network
Management Protocol traps when
authentication fails.
Use the no form of this command to
disable SNMP failed authentication traps.
show snmp Checks the status of SNMP
communications.
console(config)# snmp-server enable traps
console(config)# snmp-server trap authentication
console(config)# snmp-server engineid local default
The engine-id must be unique within your administrative
domain.
Do you wish to continue? [Y/N]y
The SNMPv3 database will be erased. Do you wish to
continue? [Y/N]y
Table 9-56. SNMP Global Parameters Commands (Continued)
CLI Command Description320 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Views can be attached to groups in the Access Control pages.
To create an SNMP view:
1 Click System > SNMP > View Settings in the tree view to display the
View Settings: Summary page.
Figure 9-48. View Setting: Summary
2 Select a view name. Its subtrees are displayed.
3 To remove a subtree from an SNMP view, click Remove. The subtrees of
the default views (Default, DefaultSuper) cannot be changed.
4 To add a new view, click Add, and enter a new View Name (1-30
Characters).
5 To complete the definition of the view, click Edit, and select a View Name
to modify. Enter the fields:
– New Object ID Subtree — Check to specify the device feature OID
included or excluded in the selected SNMP view.Dell PowerConnect 55xx Systems User Guide 321
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Selected from List — Select the device feature OID by using the
Up and Down buttons to scroll through a list of all device OIDs.
Or:
• Insert — Specify the device feature OID.
– View Type — Specify if the defined OID branch will be included or
excluded in the selected SNMP view.
Defining SNMP Views Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed in the View Settings pages.
The following is an example of CLI commands:
Table 9-57. SNMP View CLI Commands
CLI Command Description
snmp-server view view-name
oid-tree {included|excluded}
no snmp-server view view-name
[oid-tree]
Creates or updates a SNMP server view
entry.
Use the no form of this command to
remove an SNMP server view entry.
show snmp views [viewname] Displays the configuration of a view or all
views.
console(config)# snmp-server view user1 1 included
console(config)# end
console# show snmp views
Name OID Tree Type
------------ --------------- --------
user1 system included
Default iso included
Default snmpVacmMIB excluded
Default usmUser excluded
Default rndCommunityTable excluded
DefaultSuper iso included322 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
SNMP Access Control (Groups)
For ease of use, users may be assigned to groups. In this way, it is possible to
assign feature access rights to an entire group, instead of assigning them
individually to users. Users are created in the User Security Model pages.
Groups can be defined in any version of SNMP, but only SNMPv3 groups can
be assigned authentication methods.
To add an SNMP group, and assign it access control privileges:
1 Click System > SNMP > Access Control in the tree view to display the
Access Control: Summary page.
Figure 9-49. Access Control: Summary
Previously-defined groups are displayed.
2 To add a new group, click Add, and enter the fields:
– Group Name (1-30 Characters) — Enter a group name. Dell PowerConnect 55xx Systems User Guide 323
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Security Model — Select the SNMP version of the group.
– Security Level — Select the security level attached to the group.
Security levels apply to SNMPv3 only. The possible options are:
• No Authentication — Neither authentication nor the privacy
security levels are assigned to the group.
• Authentication — Authenticates SNMP messages, and ensures
that the origin of the SNMP message is authenticated.
• Privacy — Encrypts SNMP message.
– Operation — Select the group access rights. The possible options are:
• Read — The management access is restricted to read-only, and
changes cannot be made to the assigned SNMP view. If desired,
select a view from the drop-down list.
• Write — The management access is read-write and changes can
be made to the assigned SNMP view. If desired, select a view from
the drop-down list.
• Notify — Sends traps for the assigned SNMP view. If desired,
select a view from the drop-down list.
Defining SNMP Access Control Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed in the Access Control pages.
Table 9-58. SNMP Access Control CLI Commands
CLI Command Description
snmp-server group groupname
{v1|v2|v3 {noauth|auth|priv}}
[read readview] [write
writeview] [notify notifyview]
no snmp-server group groupname
{v1|v2|v3 [noauth|auth|priv]}
[context-name]
Configure a new Simple Network
Management Protocol (SNMP)
group, or a table that maps SNMP
users to SNMP views.
Use the no form of this command to
remove a specified SNMP group.
show snmp groups [groupname] Displays the configuration of groups 324 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
SNMP User Security Model (Users)
An SNMP user is defined by the following:
• Login credentials (username, password, and authentication method)
• Context and scope in which the user operates
• Association with a group
• Engine ID
SNMP user login credentials are verified using a local database.
After a user is authenticated, it takes on the attributes of its group, and can
then access the views permitted to this group. A user can only be a member of
a single group.
Before you create an SNMPv3 user, create an SNMPv3 group in the Access
Control pages.
When the configuration file is saved, SNMP communities/users are not
saved. This means that if you configure another device with this
configuration file, you must define the SNMP communities/users on that
device.
console (config)# snmp-server group user-group v3 priv
read user-view
console# show snmp groups
Name Security Views
Model Level Read Write Notify
----- ----- ------- ------- ------- ----------
1 V1 noauth - - -
2 V1 noauth - - -
3 V1 noauth - - -
4 V1 noauth - - -
5 V1 noauth - - -Dell PowerConnect 55xx Systems User Guide 325
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To create an SNMP V3 user, and assign it to a group and view:
1 Click System > SNMP > User Security Model in the tree view to display
the User Security Model: Summary page.
Figure 9-50. User Security Model: Summary
The currently-defined users and their groups are displayed.
2 To add a user, click Add, and enter the fields:
– User Name (1-30 Characters) — Enter a new user name.
– Engine ID — Specifies the local or remote SNMP entity, to which the
user is connected. Changing or removing the local SNMP Engine ID
deletes the SNMPv3 User Database. Select either Local or Remote. If
Remote is selected, enter the remote engine ID.
– Group Name — Select from a list of user-defined SNMP groups.
SNMP groups are defined in the Access Control Group pages.326 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Authentication Method — Select an authentication method used to
authenticate users. The possible options are:
• None — No user authentication is used.
• MD5 Password — HMAC-MD5-96 password is used for
authentication.
• SHA Password — Users are authenticated using the HMAC-SHA-
96 authentication level.
• MD5 Key — Users are authenticated using the HMAC-MD5
algorithm.
• SHA Key — Users are authenticated using the HMAC-SHA-96
authentication level.
– Password (0-32 Characters) — If the MD5 Password or SHA Password
authentication method was selected, enter the user-defined password
for a group.
– Authentication Key (MD5-16; SHA-20 Hex Characters) — If the
MD5 Key or SHA Key authentication method was selected, enter the
HMAC-MD5-96 or HMAC-SHA-96 keys. The authentication and
privacy keys are entered to define the authentication key. If only
authentication is required, 16 bytes are defined for MD5. If both
privacy and authentication are required, 32 bytes are defined for MD5.
Each byte in hexadecimal character strings is two hexadecimal digits.
Each byte can be separated by a period or a colon.
– Privacy Key (16 Hex Characters) — If the MD5 Key or SHA Key
authentication method was selected, enter the privacy key. If only
authentication is required, 20 bytes are defined. If both privacy and
authentication are required, 16 bytes are defined. Each byte in
hexadecimal character strings is two hexadecimal digits. Each byte can
be separated by a period or colon. Dell PowerConnect 55xx Systems User Guide 327
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining SNMPv3 Users Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed in the User Security Model pages.
The following is an example of the CLI commands:
SNMP Communities
When using SNMP v1,2, communities strings (passwords) are used to provide
access rights in the following ways:
• Basic Table — The access rights of a community can be read-only, readwrite, or SNMP Admin. In addition, you can restrict access to the
community to only certain MIB objects using a view. Views are defined in
the Views Setting pages.
• Advanced Table — Access rights to a community are assigned to a group
that consists of users. A group can have Read, Write, and Notify access to
views. Groups are defined in the Access Control pages.
Table 9-59. SNMP Users CLI Commands
CLI Command Description
snmp-server user username groupname
{v1|v2c|[remote-host] v3 [encrypted]
[auth {md5|sha} auth-password]}
no snmp-server user username [remotehost]
Configures a new SNMP V3
user.
Use the no form of the
command to remove a user.
show snmp users [username] Displays the configuration of
users.
console(config)# snmp-server user tom acbd v1
console(config)# snmp-server user tom acbd v2c
console(config)# snmp-server user tom acbd v3328 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To define an SNMP community:
1 Click System > SNMP > Communities in the tree view to display the
Communities: Summary page.
Figure 9-51. SNMP Community
The Basic and Advanced tables are displayed.
2 To add a new community, click Add.
3 Define the SNMP management station by entering its IP address
information:
– Supported IP Format — Select whether the IPv4 or IPv6 format is
being used.
– IPv6 Address Type — When the community supports IPv6, this
specifies the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.Dell PowerConnect 55xx Systems User Guide 329
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• VLAN — The VLAN on which the IPv6 interface is configured.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
– SNMP Management Station — Enter the management station IP
address for which the SNMP community is defined, or choose All to
be able to receive SNMP messages from anywhere.
– Community String (1-20 Characters) — Enter the community string,
which functions as a password, and is used to authenticate the
management station to the device.
4 To associate access mode and views directly with the community, enter the
fields:
– Basic — Check to enable SNMP Basic mode for a selected
community.
– Access Mode — If Basic is selected, specify the access rights of the
community. The possible options are:
• Read-Only — Management access is restricted to read-only, and
changes cannot be made to the community.
• Read-Write — Management access is read-write and changes can
be made to the device configuration, but not to the community.
• SNMP Admin — User has access to all device configuration
options, as well as permissions to modify the community.
– View Name — Select a view from a list of user-defined SNMP views.
The view determines other characteristics associated with the
community.
5 To use Advanced mode, enter the fields:
– Advanced — When SNMP Advanced mode is selected, you can select
an SNMP group to specify the SNMP access control rules for the
selected community. The SNMP Advanced mode is defined only with
SNMPv3. 330 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Group Name — Select the group to be associated with the
community.
Configuring Communities Using CLI Commands
The following table summarizes the CLI commands for setting fields in the
Community pages.
The following is an example of the CLI commands:
SNMP Notification Filters
Notification filters determine the type of SNMP notifications that are sent to
the management station, based on the OID of the notification to be sent.
Each OID is linked to a device feature or a feature aspect.
SNMP notification filters provide the following services:
• Identification of management trap targets
• Trap filtering
Table 9-60. SNMP Community CLI Commands
CLI Command Description
snmp-server community community
[view view-name] [ro|rw|su]
{ipv4-address|ipv6-address}
[mask mask-value|prefix-length
prefix-value] [type router|oob]
Sets up the community access string
to permit access to the SNMP
protocol.
Use the no form of this command to
remove the specified community
string
snmp-server community-group
community group-name [ipv4-
address|ipv6-
address][mask|prefix-length]
[type router|oob]
no snmp-server community string
[ipv4-address|ipv6-address]
Sets up community access string to
permit limited access to the SNMP
protocol, based on group access
rights.
show snmp Displays the current SNMP device
configuration.
console (config)# snmp-server community dell ro 10.1.1.1Dell PowerConnect 55xx Systems User Guide 331
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Selection of trap generation parameters
• Access control checks
After creating a notification filter, attach it to a notification recipient in the
SNMPv1,2 Notification Recipients pages.
To add a notification filter:
1 Click System > SNMP > Notification Filters in the tree view to display
the Notification Filter: Summary page.
Figure 9-52. Notification Filter: Summary
2 The OIDs of the selected filter are displayed.
3 If required, the notification filter type can be changed by selecting one of
the following options:
– Excluded — OID traps or informs will not be sent.
– Included — OID traps or informs will be sent.332 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
4 To add a new notification filter, click Add.
5 In addition to the fields described in the Summary page, enter the fields:
– Filter Name (1-30 Characters) — Enter the notification filter name.
– New Object Identifier Tree — Check to specify the device feature
OID included or excluded in the selected SNMP view.
• Selected from List — Select the device feature OID by using the
Up and Down buttons to scroll through a list of all device OIDs.
or:
• Object ID — Specify the device feature OID.
– Filter Type — Select whether the defined OID branch will be
Included or Excluded in the selected SNMP view.
Configuring Notification Filters Using CLI Commands
The following table summarizes CLI commands for defining fields displayed
in the Notification Filter pages.
Table 9-61. SNMP Notification Filter CLI Commands
CLI Command Description
snmp-server filter filter-name oidtree {included|excluded}
no snmp-server filter filter-name
[oid-tree]
Creates or updates an SNMP
notification filter.
Use the no form of this
command to remove the
specified SNMP server filter
entry.
show snmp filters [filter-name] Displays the configuration of
SNMP notification filtersDell PowerConnect 55xx Systems User Guide 333
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of CLI commands:
SNMP Notification Recipients
An SNMP notification is a trap message, sent from the switch to the SNMP
management station, indicating that a certain event has occurred, such as a
link up or down.
Trap receivers, also known as notification recipients, are network nodes to
which trap messages are sent by the switch.
A trap receiver entry contains the IP address of the node and the SNMP
credentials corresponding to the version that will be included in the trap
message. When an event arises that requires a trap message to be sent, it is
sent to every node listed in the trap receiver list.
Some messages are of an informational nature and are called "informs"
instead of traps.
console (config)# snmp-server filter user1 iso included
console(config)# end
console # show snmp filters
Name OID Tree Type
----------- ------------- --------
user1 iso Included334 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To add notification recipients, and attach them to notification filters:
1 Click System > SNMP > Notification Recipient in the tree view to
display the Notification Recipients: Summary page.
Figure 9-53. Notification Recipients: Summary
The previously-defined notification recipients are displayed.
2 To add a new notification recipient, click Add, and enter the fields:
– Supported IP Format — Select whether the IPv4 or IPv6 format is
supported.
– IPv6 Address Type — When the recipient supports IPv6, this specifies
the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.Dell PowerConnect 55xx Systems User Guide 335
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• VLAN — The IPv6 interface is configured on this VLAN.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
– Recipient IP — The IP address to whom the traps are sent.
– Notification Type — The notification sent. The possible options are:
• Trap — Traps are sent.
• Inform — Informs are sent.
If SNMP versions 1 and 2 are enabled for the selected recipient, enter the
fields:
– Community String — The community string of the trap manager.
– Notification Version — The message trap SNMP version (v1 or v2).
If SNMPv3 is used to send and receive traps, enter the fields:
– User Name — The user to whom SNMP notifications are sent.
– Security Level — The means by which the packet is authenticated.
The possible options are:
• No Authentication — The packet is neither authenticated nor
encrypted.
• Authentication — The packet is authenticated.
• Privacy — The packet is both authenticated and encrypted.
3 Enter the fields for all versions of SNMP:
– UDP Port (1-65535) — The UDP port used to send notifications. The
default is 162.
– Filter Name — Select an SNMP filter from a list of previously-defined
SNMP filters.
– Timeout (1-300) — The amount of time (seconds) the device waits
before resending informs.
– Retries (1-255) — The amount of times the device resends an inform
request. 336 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring SNMP Notification Recipients Using CLI Commands
The following table summarizes the CLI commands for setting fields in the
Notification Recipients pages.
The following is an example of the CLI commands:
Table 9-62. SNMP Notification CLI Commands
CLI Command Description
snmp-server host {ipv4-
address|ipv6-address|hostname}
[traps|informs] [version {1|2c|3
[auth|noauth|priv]}] communitystring [udp-port port] [filter
filtername] [timeout seconds]
[retries retries]
no snmp-server host {ipv4-
address|ipv6-address|hostname}
[traps|informs] [version {1|2c|3}]
Creates or updates a notification
recipient receiving notifications in
SNMP version 1, 2 or 3.
Use the no form of this command to
remove the specified host.
show snmp Shows the current SNMP
configuration.
console(config)# snmp-server host 172.16.1.1 private
console(config)# end
console# show snmp
CommunityString
CommunityAccess
View Name IP Address
------------- ------------ --------- ----------
public read only user-view All
private read write default 172.16.1.1
private su DefaultSup
er
172.17.1.1 Dell PowerConnect 55xx Systems User Guide 337
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
File Management
This section describes how to manage device firmware (image files) and
configuration files.
It contains the following topics:
• File Management Overview
• Auto-Update/Configuration Feature
• File Download
• File Upload
• Active Images
• Copy Files
• File System
File Management Overview
This section describes the system files found in the system and how they can
be updated (downloaded) and backed up (uploaded).
System Files
The following system files are maintained on the system:
• Startup Configuration File — Files with extension .text. These files
contain the commands required to configure the device at startup or after
reboot. The Startup Configuration file is created from the Running
Configuration file, or can be created from another file.
• Running Configuration File — Files with extension .text. These files
contain all Startup Configuration file commands, as well as all commands
entered during the current session. After the device is powered down or
rebooted, all commands stored in the Running Configuration file are lost.
During the startup process, all commands in the Startup Configuration
file are copied to the Running Configuration file, and applied to the
device.
During the session, new configuration commands are added to the
Running Configuration file. To update the Startup Configuration file with
these configuration commands, the Running Configuration file must first
be copied to the Startup Configuration file before powering down the 338 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
device. This can be done manually in the Copy Files page or see "AutoUpdate/Configuration Feature" on page 338 for more information about
how to perform this automatically.
• Image Files—Files with extension .ros. System file images are saved in two
flash files called Image 1 and Image 2. The active image contains the
active copy, while the other image contains a backup copy. The device
boots and runs from the active image. If the active image is corrupted, the
system automatically boots from the non-active image. This is a safety
feature for faults occurring during the software upgrade process.
Downloading/Uploading System Files
System files can be manually loaded from (downloaded) or copied to
(uploaded) a TFTP server or a USB drive. This can be done in one of the
following ways:
• Manually—System files can be downloaded using the File Download page
and uploaded using the File Upload page.
• Automatically (Auto Update/Configuration)—System files can be
downloaded automatically, as follows:
– Auto-Configuration—If the Auto-Configure feature is enabled (in the
Auto Update of Configuration/Image File page), the Startup
Configuration file (in various conditions described below) might be
automatically updated after reboot.
– Auto-Update—If the Firmware Auto-Update feature is enabled in the
Auto Update of Configuration/Image File page, the image file is might
be automatically updated (in various conditions described below).
Auto-Update/Configuration Feature
The Auto-Update/Configuration feature enables initial configuration of the
device and upgrading of the firmware through an automatic process, which
enables the administrator to ensure that the configuration/firmware of all the
devices in the network is up-to-date. Dell PowerConnect 55xx Systems User Guide 339
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The required configuration files/images are stored on a USB key or TFTP
server, and these are downloaded to all the devices in the network when the
device boots up instead of booting from a local startup configuration file.
Auto-Update/Configuration also enables quick installation of new devices on
the network, since an out-of-box device can be configured to retrieve its
configuration file from the network/USB, allowing instant access to it from
the administrator's management station and up-to-date configuration on the
device.
NOTE: If Auto-Update is performed through the USB port, in addition to upgrading
the Startup Configuration and image file, a new IP address can also be assigned
to the device. See "Setup Files" on page 339 below.
Setup Files
In addition to placing configuration and image files on the USB key, the USB
key might also contain a setup file, which is a file with a .setup extension.
Setup File Contents
A setup file contains one or more lines. Each line contains some or all of the
following fields:
• MAC Address—This indicates to which device the line applies. In this
way, a single setup file can be used for multiple devices.
• New IP Address—The new IP address to be assigned to the device.
• New IP Address Mask—The IP address mask to be applied to the new IP
address assigned to the device.
• Configuration File Name—Name of the configuration file to be used as
the Startup Configuration.
• Image File Name—Name of the image file to be loaded on device.
• Flag—Indicates the status of the line. The following values can be used in
this field:
– In-Use—This line has already been applied. It is no longer a candidate
for future use.
– Invalid—The line is invalid, do not use.
– Blank—There is no value for the flag field. This line is a candidate to
be applied to the device.340 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Setup File Format
A line in a setup file contains all or some of the above fields separated by
spaces (in the following order):
If the field is omitted, it is considered to be blank.
A line can be in one of the following formats:
• Format A—Contains all possible fields:
Examples:
– 0080.c200.0010 192.168.0.10 255.255.255.0 switch-X.text pc5500-
4018.ros
This means that the line applies to the device with MAC address:
0080.c200.0010; a new IP address of 192.168.0.10 is to be assigned to
the device, with mask: 255.255.255.0. The switch-x.text is the Startup
Configuration file and pc5500-4018.ros is the new image file.
– 0080.c200.0010 192.168.0.10 255.255.255.0 switch-X.text pc5500-
4018.ros in-use
This line will not be used because the flag is in-use indicating that it
has already been used for some device, and it would be incorrect to use
if for another device.
– 0080.c200.0010 192.168.0.10 255.255.255.0 switch-X.text pc5500-
4018.ros invalid
This line will not be used because the flag is invalid indicating that it
is failed in the past.Dell PowerConnect 55xx Systems User Guide 341
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Format B—Contains the following 4 fields:
Example:
0080.c200.0010 switch-X.text pc5500-4018.ros
This means that the line applies to the device with MAC address:
0080.c200.0010. The switch-x.text is the Startup Configuration file and
pc5500-4018.ros is the new image file.
• Format C—Contains the following 5 fields:
Example:
192.168.0.10 255.255.255.0 switch.text pc5500-4018.ros
This means that the line applies to any device (no MAC address is
supplied); a new IP address of 192.168.0.10 is to be assigned to the device,
with mask: 255.255.255.0. The switch-x.text is the Startup Configuration
file and pc5500-4018.ros is the new image file.
• Format D—Contains the following 3 fields:
Example:
192.168.0.10 255.255.255.0
This means that the line applies to any device (no MAC address is
supplied); a new IP address of 192.168.0.10 is to be assigned to the device,
with mask: 255.255.255.0.342 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Triggering the Auto-Update/Configuration Process
When the Auto-Update/Configuration feature is enabled (in the Auto
Update of Configuration/Image File page), the device automatically attempts
to download a new image or configuration file (under certain circumstances)
using one of the following processes:
• The Auto-Update process is triggered from the USB drive if a USB key in
the USB drive is found.
• The Auto-Configuration process is triggered from the USB drive after the
Auto-Update process completed and the device was rebooted (if a new
image file was loaded), and if the following conditions are fulfilled:
– There is a USB key in the USB drive.
– Force Configuration Download at Next Startup has been enabled by
the boot host dhcp command, or the Startup Configuration file is
empty.
See "Performing Auto-Update from a USB Drive" on page 343.
• The Auto-Update from a TFTP server is triggered if the following
conditions are fulfilled:
– The conditions for a USB Auto-Update are not fulfilled.
– An IP address of a TFTP server is received from a DHCP server.
– A file name is received from DHCP server.
• The Auto-Configuration from a TFTP server is triggered if the following
conditions are fulfilled:
– The conditions for USB Auto-Configuration are not fulfilled.
– The switch as DHCP client received a configuration file name or a
TFTP URL.
– Force Configuration Download at Next Startup enabled by the boot
host dhcp command, or, the Startup Configuration file is empty.
See "Preparations for Using Auto Configuration from a TFTP Server" on
page 345.
NOTES:
• DHCP client never triggers the Auto-Update process from a TFTP server
after attempting (whether successfully or not) to auto-update/configure
configuration/image file from the USB drive. Dell PowerConnect 55xx Systems User Guide 343
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• If the auto process involved setting the IP address of the device from the
setup file, the auto process from the TFTP server can be triggered.
• If the USB drive contains a setup file, but that setup file does not include a
line that can be used for the current device, the DHCP client is able to
trigger the Auto-Update process from TFTP (because the USB process
never started at all).
Automatic DHCP IP Interface Assignment
The user can manually define a DHCP interface in the DHCP IPv4 page.
If the user does not do this, the switch automatically creates a DHCP
interface on the VLAN with the lowest VLAN ID that does not have an IP
address defined on it after boot if both of the following conditions are
fulfilled:
• There is no DHCP IP interface.
• There is a VLAN without an IP address.
Preparations for Using Auto Update/Configuration from a USB Drive
Before Auto-Update/Configuration from a USB drive can be performed, the
following steps must be performed:
1. Enable Auto-Update/Configuration in the Auto Update of
Configuration/Image File page.
2. (Optional) Create a line in the setup file for this device containing the
required options and load it on the USB key.
3. Load configuration/image files on the USB key as required.
4. Insert the USB key in the USB drive and reboot the device.
Performing Auto-Update from a USB Drive
When Auto-Update is initiated from a USB drive, the following steps are
performed:
1. Locate the correct setup file—The USB drive is searched for a setup file.
One of the following can occur:
– Setup file is not found—The root folder of the USB is searched for an
image files (with .ros extension).
• The image file with the most recent version is loaded into the
image file if the versions are different.344 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• If a new image file was loaded, the device is rebooted.
• The USB drive is searched for a configuration file (.text
extension). If there is more than one configuration file, the file
named powerconnect.text is loaded (if it is not found the process
is stopped).
– One or more setup files are found—If a single setup file is found, it is
used; if several files are found, the file powerconnect.setup is used. If
no setup file with this name is found, the process is stopped.
2. Find the line in the setup file relevant to the device—When the correct
setup file is found, it is searched for a line relevant to the device, as
follows:
– The setup file is searched for a line with format A or B in which there
is a match to the device's MAC address. If such line is found, and its
format is valid (the field is empty), the line is applied.
– If no line for the specific device was found, the setup file is searched
for valid lines with formats C or D. The first line found is applied.
3. Apply the correct line—When the correct line in the setup file is found,
it is applied, as follows:
– If the line contains an IP address and IP mask, the IP address is
configured on the default VLAN.
– If the line contains an image file and its version differs from the
current image file version, the USB image file is loaded and the switch
is rebooted.
– If a new image file was loaded, it is loaded onto all units in the stack.
– If the line contains a configuration file, the configuration file is
appended to running configuration file.
4. Mark the flag in the applied line—When the line is applied (successfully
or not), its flag is set, as follows:
– If the line contains an IP address and IP mask (format C or D), the IP
address is configured on the default VLAN and the line is marked as
"in-use". This ensures that the line is not used for another device.
– If the line was not applied successfully, for one of the following
reasons, the line is marked as "invalid" and a SYSLOG message is sent.Dell PowerConnect 55xx Systems User Guide 345
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• The configuration file specified by the line does not exist on the
USB key or is corrupted.
• The image file specified by the line does not exist on the USB key
or is corrupted.
– If parsing of the line failed for some other reason, the line is ignored
and a SYSLOG message is sent.
NOTE: When both Auto-Update and Auto-Configuration are performed, the image
file is loaded first, the device is booted and then the configuration file is loaded.
Preparations for Using Auto Configuration from a TFTP Server
The Auto-Update/Configuration feature enables configuring the device from
a configuration file found on the TFTP server.
Two methods may be used:
• One-file Read, described in "Auto Configuration (One File Read Method)"
on page 345. This method is used if a configuration file is found on the
TFTP server.
• Multi-file Read, described in "Auto Configuration (Multi File Read
Method)" on page 346. This method is used if a configuration file name is
not found on the DHCP server, or the configuration file is not found on
the TFTP server.
Auto Configuration (One File Read Method)
This method requires the following preparations on the DHCP and TFTP
servers:
• TFTP Server
Place a configuration file, for example config.txt in the main directory.
This file can be created by copying a configuration file from a device.
When the device is booted this becomes the Running configuration file.
• DHCP Server
– Configure the DHCP server with option 67 and the name of the
configuration file on the TFTP server (for example, config.txt).
– Configure the DHCP server with option -20 or 66. This is the IP
address of the TFTP server.346 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Device - On the device, one of the following cases may exist:
– If Configuration Auto-Config is selected, the device is configured
with the configuration file on the TFTP server only if the Startup
configuration file is empty.
– If Force Configuration Download at Next Startup is selected, the
device is configured with the configuration file on the TFTP server
whether the Startup configuration file is not empty or not.
Auto Configuration (Multi File Read Method)
If the one-file method has failed and the TFTP Server IP address has been
provided by the DHCP Server, the switch applies the multi-file method to
download the configuration file. The following steps are performed by the
switch:
• The switch gets the hostname, as described below.
– If the hostname was provided by the DHCP server, this hostname is
used.
– If the hostname has not been provided by a DHCP server, and if the
user has configured the sysName variable, its value is used as a
hostname.
– If neither of the above occurred, the switch uses the fp-net.cfg
Filename List on the TFTP server. Each file in this list is a text file
containing commands, each of which:
• Occupies one line.
• Has the following format: ip host hostname ip-addr. Each line
maps an IP address to a hostname. When the switch identifies its
own IP address in this list, the hostname associated with it is used.
• The switch tries to download a configuration file with the following names:
– hostname-config
– hostname.cfg if the previous file does not exist
– host.cfg if the previous files do not existDell PowerConnect 55xx Systems User Guide 347
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Preparations for Firmware Image Download from TFTP
The image file download consists of the following steps:
• The switch downloads the Indirect Image File and extracts from it the
name of the image file.
Note: If the size of the image name bigger than 160 octets only the first
160 octets will be used
• If the image file version differs from the current image file version, then
the image file is loaded and the switch is rebooted.
The preparations on the DHCP and TFTP servers require the following:
• TFTP Server
– Create a sub directory in the main directory. Place a software image
file in it.
– Create an indirect file that contains a path and the name of the
software version (for example indirect-contax.txt that contains
contax\contax-version.ros).
– Copy this file to the TFTP server’s main directory
• DHCP Server
– Configure the DHCP server with option -20 or 66. This is the IP
address of the TFTP server.
– Configure the DHCP server with option 125. Enter the following
information:
• A2-02-00-00 — Enterprise Number 674 (Dell PowerConnet 55xx
value). It should be written from right to left. 674=02 a2
• 15 — Data Length
• 01 — Sub option code 1 (Dell PowerConnet 55xx value)
• 13 — Sub option length
• Conversion of the file name (in the above example: conversion of
indirect-contax.txt from ASCII to HEX - 69-6E-64-69-72-65-63-
74-2D-63-6F-6E-74-61-78-2E-74-78-74348 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Auto Update Configuration through the GUI
To set the auto update and configuration parameters:
. NOTE: For the automatic options in this page to work the following must be
implemented:
• Since Auto-Config depends on retrieving information from a DHCP server, the
startup configuration needs to include a DHCP IP interface. The device is
defined as a DHCP client, as described in "DHCP IPv4 Interface" on page 214.
After reboot, this command is not saved in the Startup configuration.
• Preparations described above must be completed on the DHCP server and
TFTP servers.
1 Click System > File Management > Auto Update of
Configuration/Image File in the tree view to display the Auto Update of
Configuration/Image File page.
Figure 9-54. Auto Update of Configuration/Image File
The auto-update-configuration options are displayed.
2 Modify the auto-update configuration parameters as required:
– Configuration Auto-Config (boot host auto-config)— Enable/disable
automatic download of the configuration parameters to the Running
Configuration file. By default, this occurs only if the Startup
Configuration file is empty.
– Firmware Auto-Update (boot host auto-update)— Enable/disable
automatic download of the image file. Dell PowerConnect 55xx Systems User Guide 349
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Force Configuration Download at Next Startup (boot host dhcp) —
Enable/disable the Configuration Auto Update option to work even if
the Startup Configuration file is not empty.
– Auto-Copy Running Configuration to Startup Configuration After
Download (boot host auto-save)— Enable/disable the Running
Configuration file to be automatically copied to the Startup
Configuration file after downloading the Running Configuration file.
Auto Update Configuration Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Auto Update of Configuration/Image File page.
Table 9-63. Auto Update of Configuration/Image File CLI Commands
CLI Command Description
boot host auto-config
no boot host auto-config
Enables the support of autoconfiguration via DHCP.
Use the no form of this command to
disable DHCP auto configuration.
boot host auto-update
no boot host auto-update
Enables the support of auto-update via
DHCP.
Use the no form of this command to
disable DHCP auto configuration
boot host dhcp
no boot host dhcp
Forces the mechanism used to
download a configuration file at the
next system startup.
Use the no form of this command to
restore the host configuration file to the
default.
boot host auto-save
no boot host auto-save
Enables automatic saving of Running
configuration in Startup configuration
after download.
Use the no form of this command
restore default behavior
show boot Shows the status of the IP DHCP Auto
Config process.350 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI command to view the Auto-Update
status:
The following is an example of the CLI command to configure auto-update
on the switch:
console# show boot
Auto Config
-----------
Config Download via DHCP: enabled
Next Boot Config Download via DHCP: force
Auto Update
-----------
Image Download via DHCP: enabled
console# configure
console(config)# boot host auto-save
console(config)# interface vlan 1
console(config-if)# ip address dhcp
console(config-if)# 01-Oct-2006 15:19:51 %BOOTP_DHCP_CL-WDHCPIPCANDIDATE: The device is waiting for IP address
verification on interface Vlan 1 , IP 10.5.225.47, mask
255.255.255.224, DHCP server 10.5.224.25
01-Oct-2006 15:20:03 %BOOTP_DHCP_CL-I-DHCPCONFIGURED: The
device has been configured on interface Vlan 1 , IP
10.5.225.47, mask 255.255.255.224, DHCP server 10.5.224.25
01-Oct-2006 15:20:03 %COPY-I-FILECPY: Files Copy - source
URL tftp://10.5.224.4/33.txt destination URL runningconfig
01-Oct-2006 15:20:03 %COPY-N-TRAP: The copy operation was
completed successfully
01-Oct-2006 15:20:03 %COPY-I-FILECPY: Files Copy - source
URL running-config destination URL flash://startup-config
01-Oct-2006 15:20:10 %COPY-N-TRAP: The copy operation was
completed successfullyDell PowerConnect 55xx Systems User Guide 351
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
File Download
Software and configuration files can be downloaded from an external device
to the switch:
• To download from a USB port or when management computer uses HTTP
• To download files using TFTP
To download from a USB port or when management computer uses HTTP
1 Click System > File Management > File Download in the tree view to
display the File Download page.
Figure 9-55. File Download
2 For HTTP, enter the IP Format fields for the HTTP server IP address.
– Supported IP Format — Select whether IPv4 or IPv6 format is
supported.
– IPv6 Address Type — When the server supports IPv6, this specifies
the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.352 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• VLAN — The VLAN on which the IPv6 interface is configured.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
3 Select a Firmware/Configuration option. The possible options are:
– Firmware Download — A firmware file is downloaded.
– Configuration Download — A configuration file is downloaded.
4 Select to download firmware or a configuration file via a USB port or
HTTP in Download Protocol.
5 If the Firmware Download option was selected, enter the following:
– Source File Name (1-64 characters) — The file to be downloaded.
– Destination File Type — The destination file type to which the file is
downloaded. The possible options are:
• Software Image — Downloads the Image file. The image file
overwrites the non-active image. It is recommended to designate
that the non-active image becomes the active image after reset,
and then to reset the device following the download. During the
Image file download a dialog box opens that displays the
download progress, and browsing is disabled.
• Boot Code — Downloads the Boot file.
6 If the Configuration Download option was selected, enter the following:
– Server IP Address — Enter the IP address of the server.
– Source File Name (1-64 Characters) — Enter the source file name.
– Destination File Name — Select the destination file to which the
configuration file is downloaded. The possible options are:
• Running Configuration — Check to download commands into
the Running Configuration file. The current file is overwritten.
• Startup Configuration — Check to download commands into the
Startup Configuration file. The current file is overwritten.
• New File Name (1-64 Characters) — Check to copy commands
into a file in flash memory. Enter the filename.Dell PowerConnect 55xx Systems User Guide 353
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
7 Click Activate to start the download process.
To download files using TFTP
1 Click System > File Management > File Download in the tree view to
display the File Download page.
Figure 9-56. File Download
2 Enter the IP Format fields for the TFTP server IP address.
– Supported IP Format — Select whether IPv4 or IPv6 format is
supported.
– IPv6 Address Type — When the server supports IPv6, this specifies
the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.354 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• VLAN — The VLAN on which the IPv6 interface is configured.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
3 Select a Firmware/Configuration option. The possible options are:
– Firmware Download — A firmware file is downloaded.
– Configuration Download — A configuration file is downloaded.
4 Select to download firmware or a configuration file via a TFTP server in
Download Protocol.
5 If the Firmware Download option was selected, enter the following:
– Server IP Address — The IP address of the server from which the
firmware file is downloaded.
– Source File Name (1-64 characters) — The file to be downloaded.
– Destination File Type — The destination file type to which the file is
downloaded. The possible options are:
• Software Image — Downloads the Image file. The image file
overwrites the non-active image. It is recommended to designate
that the non-active image becomes the active image after reset,
and then to reset the device following the download. During the
Image file download a dialog box opens that displays the
download progress. The window closes automatically when the
download is complete.
• Boot Code — Downloads the Boot file.
6 If the Configuration Download option was selected, enter the following:
– Server IP Address — The TFTP server IP address from which the
configuration files are downloaded.
– Source File Name (1-64 characters) — The configuration file to be
downloaded. Dell PowerConnect 55xx Systems User Guide 355
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Destination File Name — The destination file to which the
configuration file is downloaded. The possible options are:
• Running Configuration — Check to download commands into
the Running Configuration file. The current file is overwritten.
• Startup Configuration — Check to download commands into the
Startup Configuration file. The current file is overwritten.
• New File Name (1-64 characters) — Check to download
commands into a configuration backup file. Enter the filename.
7 Click Activate to start the download process.
Downloading Files Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the File Download page.
The following is an example of the CLI command:
NOTE: Each exclamation mark (!) indicates that ten packets were successfully
transferred.
File Upload
Software and configuration files can be uploaded to an external device.
• To upload from a USB port or when management computer uses HTTP
• To upload a file or image using TFTP
Table 9-64. File Download CLI Commands
CLI Command Description
copy source-url destinationurl
Copies files from a source to a
destination.
console# copy tftp://10.6.6.64/pp.txt startup-config
....!
Copy: 575 bytes copied in 00:00:06 [hh:mm:ss]
01-Jan-2000 06:41:55 %COPY-W-TRAP:
The copy operation was completed successfully 356 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following methods can be used:
• To upload from a USB port or when management computer uses HTTP
• To upload a file or image using TFTP
To upload from a USB port or when management computer uses HTTP
1 Click System > File Management > File Upload in the tree view to
display the File Upload page.
Figure 9-57. File Upload
2 Configuration Upload is selected automatically.
3 Select to upload a configuration file when the management computer is
using HTTP or from a USB port in Download Protocol.
4 Enter the fields:
– Transfer File Name — The configuration file to which the
configuration is uploaded. The possible options are:
• Running Configuration — Uploads the Running Configuration
file.
• Startup Configuration — Uploads the Startup Configuration file.
5 Click Activate to start the upload process. A message will be displayed
asking where for the path of the destination file.Dell PowerConnect 55xx Systems User Guide 357
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To upload a file or image using TFTP
1 Click System > File Management > File Upload in the tree view to
display the File Upload page.
Figure 9-58. File Upload
2 Enter the IP Format fields for the TFTP server IP address.
– Supported IP Format — Select whether IPv4 or IPv6 format is
supported.
– IPv6 Address Type — When the server supports IPv6, this specifies
the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.358 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• VLAN — The VLAN on which the IPv6 interface is configured.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
3 Select one of the options:
– Firmware Upload — A firmware file is uploaded.
– Configuration Upload — A configuration file is uploaded.
4 Select to upload firmware or a configuration file via a TFTP server in
Download Protocol.
5 If Firmware Upload was selected, enter:
– TFTP Server IP Address — The TFTP server IP address to which the
software image is uploaded.
– Destination File Name (1-64 Characters) — The file name to which
the file is uploaded.
6 If Configuration Upload was selected, enter:
– TFTP Server IP Address — The TFTP server IP address to which the
configuration file is uploaded.
– Destination File Name (1-64 Characters) — The configuration file
name/path to which the file is uploaded.
– Transfer File Name — The configuration file that is uploaded. The
possible options are:
• Running Configuration — Uploads the Running Configuration
file.
• Startup Configuration — Uploads the Startup Configuration file.
• User-defined Files —Uploads the selected file. A user-defined
file is only displayed in this list if one was previously created by a
user, for example, if the user copied the running configuration file
to a user-defined configuration file called BACKUP-SITE-1, the
BACKUP-SITE-1 configuration file is displayed in the list and can
be selected.
7 Click Activate to start the upload process.Dell PowerConnect 55xx Systems User Guide 359
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Uploading Files Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the File Upload page.
The following is an example of the CLI commands:
Table 9-65. File Upload CLI Commands
CLI Command Description
copy source-url destination-url Copies any file from a source to a
destination.
console# copy image tftp://10.6.6.64/uploaded.ros
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Copy: 4234656 bytes copied in 00:00:33 [hh:mm:ss]
01-Jan-2000 07:30:42 %COPY-W-TRAP:
The copy operation was completed successfully360 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Active Images
There are two firmware images, Image1 and Image2, stored on the switch.
One of these images is identified as the active image, and the other is
identified as the inactive image. The switch boots from the active image.
You can switch the inactive image to the active image, and then reboot the
switch.
The active image file for each unit in the stack can be individually selected.
To select the image file to be used after reset:
1 Click System > File Management > Active Images in the tree view to
display the Active Images page.
Figure 9-59. Active Images
The following fields are displayed:
– Unit ID — ID of the unit.Dell PowerConnect 55xx Systems User Guide 361
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Active Image — The name of the image file that is currently active on
the unit in the stack.
– After Reset — The image file that will be active on the unit in the
stack after the device is reset. The possible options are:
• Image 1 — Activates Image file 1 after the device is reset.
• Image 2 — Activates Image file 2 after the device is reset.
2 Click Apply to select the image file to be used after reset in After Reset.
Working with the Active Image File Using CLI Commands
The following table summarizes the CLI commands for viewing fields
displayed in the Active Images.
The following is an example of the CLI commands:
Copy Files
Firmware and configuration files can be copied between units in the stack.
Use the Copy Files page to perform the following:
• Copy the firmware on the Master unit to another unit in the stack.
• Copy the master Running Configuration file to the master sTartup
Configuration file, or copy the configuration to a user-defined
configuration file.
• Copy the master Startup Configuration file to a backup file on the Flash
file system or to a USB if available.
Table 9-66. Active Image CLI Commands
CLI Command Description
boot system {image-
1|image-2} [switch
number|all]
Sets the system image that the device loads at
startup.
show version [unit
unit]
Displays version information for the system
console# boot system image-1 all362 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Copy a configuration file to the Running Configuration file. It is
important to be aware that copying a file to the Running Configuration
file actually executes these commands, so some of the configuration
commands might fail (for example when trying to create a VLAN that is
already defined on the system).
• Restore configuration factory defaults.
To copy files:
1 Click System > File Management > Copy Files in the tree view to display
the Copy Files page.
Figure 9-60. Copy Files
2 To copy the firmware from the Master unit to the Backup Master unit or to
all other units, select Copy Master Firmware and select the options:
– Source— Select either the current Master unit’s software image file or
boot code file.Dell PowerConnect 55xx Systems User Guide 363
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Destination Unit — Check to copy the firmware to either the Backup
Master unit or all units in the stack.
3 To copy the Running Configuration file of the Master unit to the Startup
Configuration file of the Master unit or vice versa, select Copy
Configuration Firmware and enter the options:
– Source — Select either the Running Configuration or the Startup
Configuration file.
– Destination — Select either the Running Configuration, Startup
Configuration file or user-created flash files, depending on the source
configuration file.
or
– New File Name (1-64 characters) — To copy the source file to a
user-named file, enter the name of a file. If this option is selected,
check where the file is stored: Flash or USB.
4 Select Restore Configuration Factory Defaults to replace the current
configuration settings by the factory configuration default settings.
5 Click Activate to initiate the selected process.
Copying Files Using CLI Commands
The following table summarizes the CLI commands for performing actions
provided by the Copy Files page.
Table 9-67. Copy Files CLI Commands
CLI Command Description
copy source-url destination-url Copies any file from a source to a
destination.
delete startup-config Deletes the startup-config file.
delete url Deletes a file from the FLASH
memory device.364 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console# delete startup-config
Delete startup-config [y/n]? y
console# 01-Oct-2006 16:10:51 %FILE-I-DELETE: File Delete -
file URL flash://startup-config
console# copy running-config startup-config
Overwrite file [startup-config] ?[Yes/press any key for
no]....01-Oct-2006 16:11
:47 %COPY-I-FILECPY: Files Copy - source URL running-config
destination URL flash://startup-config
01-Oct-2006 16:12:01 %COPY-N-TRAP:
The copy operation was completed successfully
Copy succeededDell PowerConnect 55xx Systems User Guide 365
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
File System
Use the File System page to view information about files currently stored on
the system, including file names, file sizes, files modifications, and file
permissions. The files system permits managing up to two user-defined
backup configuration files.
To view information about files:
1 Click System > File Management > File System in the tree view to
display the File System page.
Figure 9-61. File System
2 Select the File Location. The possible options are:
– Flash — Files in flash memory are displayed.
– USB — Files on the USB device are displayed. 366 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following information is displayed for all files in the system:
– File Name — The name of the file currently stored in the file
management system.
– Size — The file size.
– Modified — The date the file was last modified.
– Permission — The permission type assigned to the file.
3 The following system-wide information is displayed if Flash was selected:
– Total Bytes — The total amount of the space currently being used.
– Free Bytes — The remaining amount of space currently free. Total
bytes and free bytes are not available when selecting USB.
4 To rename a file, click its Rename button. Change the File Name.
Managing Files Using CLI Commands
The following table summarizes the CLI command for viewing system files.
The following is an example of the CLI commands:
Table 9-68. File Management CLI Command
CLI Command Description
dir [flash://|usb://] Display list of files on a flash file system
rename url new-url Renames a file
delete url Deletes a file
console# dir flash://
Directory of flash:
File Name Permission Flash Size Data Size Modified
-------------- ---------- ---------- --------- -----------------------
1.cfg rw 524160 14065 05-Oct-2006 21:20:36
2.cfg rw 524160 14065 7-Oct-2006 09:11:07
aaafile.prv -- 65520 -- 03-Oct-2006 15:45:41
dhcpdb.sys r- 65520 -- 01-Oct-2006 19:22:49
Total size of flash: 16121856 bytes
Free size of flash: 524768 bytesDell PowerConnect 55xx Systems User Guide 367
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Stack Management
This section describes how to manage the stack.
It consists of the following topics:
• Stack Management Overview
• Stack Unit ID
• Versions
• Reset
• Unit Identification (Location)
Stack Management Overview
A stack consists of up to eight units, with support for up to 400 network ports.
Unit 1 usually acts as the stack master and Unit 2 is the backup master. All
other units act as slaves.
The entire stack, without regard to the stack topology or the number of units
in the stack, can be managed as a single switch.
For more information about stacking, see "Stacking Overview" on page 45.
The stacking pages described in this section enable the following actions:
• Switching from the Master unit to the Backup Master unit
• Changing unit IDs
• Viewing hardware and software versions on each unit
• Resetting either a unit or all the units in the stack
• Setting the Location LED on a unit(s)
Stack Unit ID
Use the Stack Unit ID pages to:
• Switch stack control from the Master unit to the Backup Master unit
• Change unit IDs, or enable them to be automatically numbered by the
system368 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To switch from the Backup Master unit to the Master Unit or set unit IDs:
1 Click System > Stack Management > Stack Unit ID in the tree view to
display the Stack Unit ID page.
Figure 9-62. Stack Unit ID
2 Enter the fields:
– Switch Stack Control from Unit 1 to Unit 2 — Check this field to
make unit 2 the Master unit.
– Unit ID After Reset — Select Auto if you want the system to assign
the unit ID after reset. Select a number to assign the unit an ID
manually.Dell PowerConnect 55xx Systems User Guide 369
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Managing Stacks Using the CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the Stack Unit ID page.
The following is an example of the CLI commands:
Table 9-69. Stack Unit ID CLI Commands
CLI Command Description
stack master unit
no stack master
Makes the unit specified be the Master unit.
Use the no version to restore the default
Master unit.
switch current-unit-number
renumber new-unit-number
Changes the unit ID of a specific unit.
console(config)# stack master unit 2
console(config)# switch 3 renumber 6370 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Versions
To view the hardware and software versions currently running on the switch:
• Click System > Stack Management > Versions in the tree view to display
the Versions page.
Figure 9-63. Versions
The following fields are displayed:
– Unit ID — The unit number for which the device versions are
displayed.
– Software Version — The current software version running on the
device.
– Boot Version — The current Boot version running on the device.
– Hardware Version — The current device hardware version.Dell PowerConnect 55xx Systems User Guide 371
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Displaying Device Versions Using the CLI
The following table summarizes the CLI commands for viewing fields
displayed in the Versions page.
The following is an example of the CLI commands:
Reset
Use the Reset page to reset the device from a remote location.
To reset a unit in the stack:
1 If changes were made to the Running Configuration file, save them to the
Startup Configuration file before resetting the device. This prevents the
current device configuration from being lost. For more information about
saving Configuration files, see "Copy Files" on page 361.
Table 9-70. Versions CLI Commands
CLI Command Description
show version [unit-id] Displays system version information for a
unit or for the whole stack.
console> show version 2
Unit SW Version Boot Version HW Version
---- ------------- ------------- ------------
2 1.0.0.8 1.0.0.02 00.00.01372 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Click System > Stack Management > Reset in the tree view to display the
Reset page.
Figure 9-64. Reset
3 In the Reset Unit ID field, select either the unit ID to be reset or Stack to
reset all the units in the stack.
Resetting the Device Using the CLI
The following table summarizes the CLI commands for performing a reset of
the device via the CLI:
Table 9-71. Reset CLI Command
CLI Command Description
reload [slot unit]
Reloads the operating system of a single unit or of
all the units.Dell PowerConnect 55xx Systems User Guide 373
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI command:
Unit Identification (Location)
The Location LED on a unit helps you to discover a specific unit, or indeed,
all the units in a stack.
To light up the Location LED:
1 Click System > Stack Management > Unit Identification in the tree
view to display the Unit Identification page.
Figure 9-65. Unit Identification
console# reload
You haven't saved your changes. Are you sure you want to
continue? (Y/N)[N] Y
This command will reset the whole system and disconnect
your current session. Do you want to continue? (Y/N)[N]374 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Enter the fields:
– Identify Unit ID —Select a unit. This unit’s Location and Power LED
start blinking. Select All to cause the Location LEDs in all the units in
the stack to light up.
– Identification Duration (2-60) —Enter a time interval. The Location
and Power LED light up for this period of time.
Setting the Location LED Using the CLI
The following table summarizes the CLI commands for setting the Location
LED:
The following is an example of the CLI command:
Table 9-72. Location LED CLI Commands
CLI Command Description
system light [unit unitnumber] [duration seconds]
system light stop
Lights the location LED on a specific unit.
Use the no form of this command to
turn off the light.
console# system light unit 1Dell PowerConnect 55xx Systems User Guide 375
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
sFlow
This section describes sFlow monitoring of traffic.
It contains the following sections:
• sFlow Overview
• Workflow
• sFlow Receiver Settings
• sFlow Interface Settings
• sFlow Statistics
sFlow Overview
The sFlow feature enables collecting statistics using the sFlow sampling
technology, based on sFlow V5.
This sampling technology is embedded within switches and routers. It
provides the ability to continuously monitor traffic flows on some or all the
interfaces, simultaneously.
The sFlow monitoring system consists of an sFlow agent (embedded in a
switch or router or in a stand alone probe) and a central data collector, known
as the sFlow receiver.
The sFlow agent uses sampling technology to capture traffic and statistics
from the device it is monitoring. sFlow datagrams are used to forward the
sampled traffic and statistics to an sFlow receiver for analysis.
sFlow V5 defines:
• How traffic is monitored.
• The sFlow MIB that controls the sFlow agent.
• The format of the sample data used by the sFlow agent when forwarding
data to a central data collector. The device provides support for two types
of sFlow sampling: flow sampling and counters sampling. The following
counters sampling is performed according to sFlow V5 (if supported by
the interface):
– Generic interface counters (RFC 2233)
– Ethernet interface counters (RFC 2358)376 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Workflow
By default, flow and counter sampling are disabled.
To enable sFlow sampling:
1 Set the IP address of a receiver (also known as a collector) for sFlow
statistics. Use the sFlow Receivers Settings page for this.
2 Enable flow and/or counter sampling, direct the samples to a receiving
interface, and configure the average sampling rate. Use the sFlow
Interface Settings pages for this.
3 View and clear the sFlow statistics counters. Use the sFlow Statistics page
for this.Dell PowerConnect 55xx Systems User Guide 377
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
sFlow Receiver Settings
To set the sFlow receiver parameters:
1 Click System > sFlow > sFlow Receivers Settings in the tree view to
display the sFlow Receivers Settings: Summary page.
Figure 9-66. sFlow Receivers Settings: Summary
The sflow parameters are displayed.
2 To add a receiver (sflow analyzer), click Add and select one of the
pre-defined sampling definition indices in Index.
3 Enter the receiver’s address fields:
– Supported IP Format — Select whether IPv4 or IPv6 format is
supported. 378 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– IPv6 Address Type — When the server supports IPv6, this specifies
the type of static address supported. The possible options are:
• Link Local — A Link Local address that is non-routable and used
for communication on the same network only.
• Global — A globally unique IPv6 address; visible and reachable
from different subnets.
– Link Local Interface — When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
• None — Disable the ISATAP tunnel.
• ISATAP — The IPv6 interface is configured on an ISATAP
tunnel.
– IP Address — Enter the receiver’s IP address.
4 Enter the fields:
– Syslog Port Number — Port to which SYSLOG message are sent.
– Maximum Header Size (Bytes) — Maximum number of bytes that
can be sent to the receiver in a single sample datagram (frame).
Adding an sFlow Receiver Using the CLI Commands
The following table summarizes the CLI commands for adding an sFlow
receiver.
Table 9-73. sflow Receiver CLI Commands
CLI Command Description
sflow receiver index {ipv4-
address|ipv6-address|hostname}
[port port] [max-datagram-size
bytes]
no sflow receiver index
Defines an sFlow receiver.
Use the no form of this command to
remove the definition of the receiver.
show sflow configuration
[port_id]
Displays the sFlow configuration for
ports that are enabled for Flow
sampling or Counters sampling.Dell PowerConnect 55xx Systems User Guide 379
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# sflow receiver 2 1.1.1.1 port 6343
console# show sflow configuration
Receivers
Index IP Address Port Max Datagram Size
----- -------------------- -------- ----------------
1 0.0.0.0 6343 1400
2 172.16.1.2 6343 1400
3 0.0.0.0 6343 1400
4 0.0.0.0 6343 1400
5 0.0.0.0 6343 1400
6 0.0.0.0 6343 1400
7 0.0.0.0 6343 1400
8 0.0.0.0 6343 1400
Interfaces
Interface Flow Counters Max Header Collector Index
Sampling Sampling Interval Size Sampling Counters
--------- --------- ----------------- ------------ ----------- ---------
gi1/0/1 1/2048 60 sec 128 1 1
gi1/0/2 1/4096 Disabled 128 0 2380 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
sFlow Interface Settings
To sample datagrams or counters from a port, the port must be associated
with a receiver. sFlow port settings can be configured only after a receiver has
been defined in the sFlow Receiver Settings pages.
To enable sampling and configure the port from which to collect the sFlow
information:
1 Click System > sFlow > sFlow Interface Settings in the tree view to
display the sFlow Interface Settings: Summary page.
Figure 9-67. sFlow Interface Settings: Summary
The sflow interface settings are displayed.
2 To associate an sFlow receiver with a port, click Add, and enter the fields:
– Interface — Select the unit/port from which information is collected.
– Flow Sampling — Enable/disable flow sampling. Flow sampling
cannot be disabled if Counters Sampling is disabled.Dell PowerConnect 55xx Systems User Guide 381
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Flow Sampling Average Sampling Rate(1024–1073741823) — If x is
entered, a flow sample will be taken for each x frames.
– Flow Sampling Receiver Index — Select one of the indices that was
defined in the sFlow Receivers Settings pages.
– Flow Sampling Maximum Header Size (20–256) — Maximum
number of bytes that should be copied from a sampled packet.
– Counters Sampling — Enable/disable counters sampling. Flow
sampling cannot be disabled if Flow Sampling is disabled
– Counters Sampling Interval (15–86400) — If x is entered, this
specifies that a counter sample will be taken for each x seconds.
– Counters Sampling Receiver Index — Select one of the indices that
was defined in the sFlow Receivers Settings pages.
Configuring sFlow Interfaces Using the CLI Commands
The following table summarizes the CLI commands for configuring sFlow
interfaces.
The following is an example of the CLI commands:
Table 9-74. sflow Interface CLI Commands
CLI Command Description
sflow flow-sampling rate
receiver-index [max-header-size
bytes]
no sflow flow-sampling
Enables sFlow Flow sampling and
configure the average sampling rate
of a specific port.
Use the no form of this command to
disable Flow sampling.
sflow counters-sampling interval
receiver-index
no sflow counters-sampling
Enable sFlow counters sampling and
to configure the maximum interval of
a specific port.
Use the no form of this command to
disable sFlow Counters sampling.
console(config)# interface gi2/0/3
console(config-if)#sflow flow-sampling 1024 1 382 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
sFlow Statistics
To view sFlow statistics:
1 Click System > sFlow > sFlow Statistics in the tree view to display the
sFlow Statistics page.
Figure 9-68. sFlow Statistics
The following sflow statistics per interface are displayed:
– Interface — Port for which sample was collected.
– Packets Sampled — Number of packets sampled.
– Datagrams Sent to Receiver — Number of sFlow sampling packets
sent.
2 Click Clear Statistics to clear the counters.Dell PowerConnect 55xx Systems User Guide 383
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSystemConfig.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Viewing sFlow Statistics Using the CLI
The following table summarizes the CLI commands for viewing sFlow
statistics:
The following is an example of the CLI commands:
Table 9-75. sFlow Statistics CLI Command
CLI Command Description
show sflow statistics
[port-id]
Displays sFlow statistics for ports that are
enabled for Flow sampling or Counters
sampling.
clear sflow statistics
[port-id]
Clears sFlow statistics for ports that are
enabled for Flow sampling or Counters
sampling.
console # show sflow statistics
Total sFlow datagrams sent to collectors: 100
Interface Packets Sampled Datagrams Sent to Collector
--------- ------- ------------------------------------
gi1/0/1 30 50
gi1/0/2 10 10
gi2/0/1 0 10
gi2/0/2 0 0384 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
10
Ports
This section describes how to configure port functionality.
It contains the following topics:
• Overview
• Jumbo Frames
• Green Ethernet Configuration
• Protected Ports
• Port Profile
• Port Configuration
• LAG Configuration
• Storm Control
• Port MirroringDell PowerConnect 55xx Systems User Guide 385
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Overview
This section includes a description of port features and describes the
following:
• Auto-Negotiation
• MDI/MDIX
• Flow Control
• Back Pressure
• Port Default Settings
Auto-Negotiation
Auto-negotiation enables automatic detection of speed, duplex mode and
flow control on all switching 10/100/1000BaseT ports. Auto-negotiation is
enabled on all ports by default.
Auto-negotiation is a mechanism established between two link partners to
enable a port to advertise its transmission rate, duplex mode and flow control
abilities to its partner. Both ports then operate at the highest common
denominator.
If connecting a Network Interface Card (NIC) that does not support autonegotiation or is not set to auto-negotiation, both the device switching port
and the NIC must be manually set to the same speed and duplex mode.
If the station, on the other side of the link, attempts to auto-negotiate with a
device 100BaseT port that is configured to full duplex, the auto-negotiation
results in the station attempting to operate in half duplex.
MDI/MDIX
The device supports auto-detection of straight-through and crossed cables on
all 10/100/1000BaseT ports. This feature is part of auto-negotiation and is
enabled when Auto-negotiation is enabled.
When the MDI/MDIX (Media Dependent Interface with Crossover) is
enabled, the automatic correction of errors in cable selection is possible, thus
making the distinction between a straight-through cable and a crossover cable 386 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
irrelevant. The standard wiring for end stations is known as MDI (Media
Dependent Interface), and the standard wiring for hubs and switches is known
as MDIX.
Flow Control
The device supports 802.3x flow control for ports configured to Full Duplex
mode. By default, this feature is enabled on all ports, and it can be disabled
per port.
Flow control creates a lossless link with no packet loss. The flow control
mechanism enables the receiving side to signal to the transmitting side that
transmission must temporarily be halted to prevent buffer overflow. This
signaling is done by sending PAUSE frames. The ports that receives pause
frames stops transmitting traffic.
Flow control on the device works in Receive-Only mode, meaning that the
interfaces with enabled flow control receive PAUSE frames, but do not send
them.
When flow control is enabled, the system buffers are allocated per port so
that if the buffers of one port are consumed, other ports will still have their
free buffers.
Back Pressure
The device supports back pressure for ports configured to Half Duplex mode.
By default, this feature is disabled, and it can be enabled per port. The
back-pressure mechanism prevents the sender from transmitting additional
traffic temporarily. The receiver may occupy a link so it becomes unavailable
for additional traffic.
Port Default Settings
Table 10-1 describes the port default settings.
Table 10-1. Port Default Settings
Function Default Setting
Port speed and mode 10/100/1000 BaseT copper: auto-negotiation
SFP+1000/10G Mbps full duplex, auto discovery
Port forwarding state EnabledDell PowerConnect 55xx Systems User Guide 387
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port tagging No tagging
Flow Control On
Back Pressure Off
Table 10-1. Port Default Settings (Continued)
Function Default Setting388 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Jumbo Frames
Jumbo frames are frames of up to 10 Kb in size. If Jumbo frames are not
enabled, the system supports a packet size of up to 1,632 bytes.
To enable jumbo frames:
1 Click Switching > Ports > Jumbo Frames in the tree view to display the
Jumbo Frames page.
Figure 10-1. Jumbo Frames
The current jumbo frames setting is displayed
2 Enable/disable jumbo frames in the New Setting (after reset) field.
NOTE: You must save the configuration and reboot the device in order to make jumbo
frames operational.Dell PowerConnect 55xx Systems User Guide 389
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring Jumbo Frames Using CLI Commands
The following table summarizes the CLI commands for configuring Jumbo
frames.
The following is an example of the CLI commands:
Table 10-2. Jumbo Frames CLI Commands
CLI Command Description
port jumbo-frame
no port jumbo-frame
Enables jumbo frames on the device.
Use the no form of this command to disable
jumbo frames.
console(config)# port jumbo-frame390 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Green Ethernet Configuration
Green Ethernet is a name of a set of features that are designed to reduce the
power consumption of a device, and so make it environmentally friendly.
The Green Ethernet feature reduces overall power usage in the following
ways:
• Energy Efficient Ethernet — When using EEE, systems on both sides of
the link can disable portions of their functionality and save power during
periods of low link utilization. EEE is a hardware feature that is enabled by
default, and is transparent to users. This feature is defined per port,
regardless of their LAG membership.
• Short-Reach Mode — Power usage is adjusted to the actual cable length.
In this mode, the VCT (Virtual Cable Tester) length test is performed to
measure cable length. If the cable is shorter than a predetermined length,
the switch reduces the power used to send frames over the cable, thus
saving energy. This mode is only supported on RJ45 ports.
Power savings and current power consumption in Short Reach mode can
be monitored. The total amount of saved energy can be viewed as a
percentage of the power that would have been consumed by the physical
interfaces had they not been running in Green Ethernet mode.Dell PowerConnect 55xx Systems User Guide 391
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The above two energy saving modes must be enabled globally and then
configured per port.
Green Ethernet Configuration
To configure Green Ethernet settings:
1 Click Switching > Ports > Green Ethernet Configuration in the tree view
to display the Green Ethernet Configuration: Summary page.
Figure 10-2. Green Ethernet Configuration: Summary
2 The amount of energy saved from the last switch reboot is displayed in the
Cumulative Energy Saved field. This value is updated each time there is
an event that affects power saving. Click Reset to reset its value.
3 Enter the fields:
• Energy Efficient Ethernet — Globally enable/disable the Energy
Efficient Ethernet feature.
• Link Short-Reach Energy Saving Mode — Globally enable/disable
Short Reach mode.392 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Current Power Consumption — Displays the current power
consumption.
• Power Savings — Displays the percentage of power saved by running
in Green Ethernet mode.
4 Select a unit in the stack to display its power consumption parameters. Its
ports are displayed along with the following settings.
– Energy Efficient Ethernet
• Oper — Enabled or not on the port
• Remote Peer —Enabled or not on the remote peer
– Short-Reach
• Oper — Enabled or not on the port
• Fault Reason —Reason that short reach is not enabled
– Cable Length (Meter) — Length of cable.
5 Click LLDP Interface Details.
6 Select a unit in the stack. The following is displayed for each port on the
unit:
– Port — Port number.
– Oper — Displays the operational status of Green Ethernet.
– Resolved Tx Timer(μsec) — Integer that indicates the current
Tw_sys_tx is supported by the local system.
– Local Tx Timer(μsec) — Indicates the time (in micro seconds) that
the transmitting link partner waits before it starts transmitting data
after leaving Low Power Idle (LPI mode).
– Resolved Rx Timer(μsec) — Integer that indicates the current
Tw_sys_tx supported by the remote system.
– Local Rx Timer(μsec) — Indicates the time (in micro seconds) that
the receiving link partner requests that the transmitting link partner
waits before transmission of data following Low Power Idle (LPI
mode).
– Remote Tx Timer(μsec) — Indicates the local link partner’s
reflection of the remote link partner’s Tx value.Dell PowerConnect 55xx Systems User Guide 393
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Remote Rx Timer(μsec) — Indicates the local link partner’s
reflection of the remote link partner’s Rx value.
Configuring Green Ethernet Using CLI Commands
The following table summarizes the CLI commands for configuring Green
Ethernet.
Table 10-3. Green Ethernet CLI Commands
CLI Command Description
green-ethernet short-reach
no green-ethernet short-reach
Enables/disables Green Ethernet short
reach mode.
green-ethernet short-reach
force
no green-ethernet short-reach
force
Forces short-reach mode on an
interface.
Use the no form of this command to
return to the default.
green-ethernet short-reach
threshold cable-length
no green-ethernet short-reach
threshold
Set the maximum cable length for
applying short-reach mode.
Use the no form of this command to
return to the default.
green-ethernet power-meter
reset
Resets the power save meter.
eee enable
no eee enable
Enables the EEE mode globally. Can
be used globally or per interface.
Use the no format of the command to
disable the mode.
eee lldp enable
no eee lldp enable
Enables EEE support by LLDP on an
Ethernet port.
Use the no format of the command to
disable the support.
show eee Displays EEE information.394 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Protected Ports
Protected Port Overview
Protected ports provide Layer 2 isolation between interfaces (Ethernet ports
and LAGs) that share the same Broadcast domain (VLAN) with other
interfaces. This can be used to set up a group of ports that receive similar
services.
A protected port does not forward traffic (Unicast, Multicast, or Broadcast) to
any other protected port on the same switch.
A community is a group of protected ports. Protected ports within the same
community can forward traffic to each other.
The following types of ports can be defined:
• Protected Port — Can send traffic only to uplink ports.
• Community Port — A protected port that is associated with a community.
It can send traffic to other protected ports in the same community and to
uplink ports.
• Uplink Port — An uplink port is an unprotected port that can send traffic
to any port.
• Isolated Port — A protected port that does not belong to a community.
Port Protection is independent of all other features and configuration
settings. Two protected ports in a common VLAN cannot communicate with
each other.
Protected Port Restrictions
The following restrictions apply to protected ports:
• When a protected port is placed in a LAG, it loses its protected port
attribute and takes upon itself the LAG's protection attributes. When the
port is removed from the LAG, its attributes are re-applied.
• Mirrored traffic is not subject to protected ports rules.
• Routing is not affected by the protected port forwarding rule, so that if a
packet enters a protected port, it can be routed by the device to another
protected port.Dell PowerConnect 55xx Systems User Guide 395
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Protected Port Configuration
To configure protected ports and establish their communities:
1 Click Switching > Ports > Protected Ports in the tree view to display the
Protected Ports: Summary page.
Figure 10-3. Protected Ports: Summary
A summary of all the ports and their statuses is displayed.
2 Click Edit.
3 Select the unit and interface.
4 Enter values for the following fields:
• State — Select Protected/Unprotected to enable/disable port
protection.
• Community — Select the community to which to add the port, or
define the port as Isolated.396 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring Protected Ports Using CLI Commands
The following table summarizes the CLI commands for configuring
protected ports.
The following is an example of the CLI commands:
Table 10-4. Protected Ports CLI Commands
CLI Command Description
switchport protected-port
no switchport protected-port
Isolates Unicast, Multicast, and Broadcast
traffic on a port at Layer 2 from other
protected ports on the same switch.
Use the no form of this command to
disable protection on the port.
switchport community
community
no switchport community
Associates a protected port with a
community
Use the no form of this command to
return to default.
show interfaces protectedports[gigabitethernet|tengiga
bitethernet] port-number
Displays protected ports configuration.
console(config)# interface gi1/0/3
console(config-if)# switchport protected-port
console(config-if)# switchport community 1Dell PowerConnect 55xx Systems User Guide 397
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port Profile
Port profiles provide a convenient way to save and share a port configuration.
When a port profile, which is a set of CLI commands having a unique name,
is applied to a port, the CLI commands contained within the profile (macro)
are executed and added to the Running Configuration file.
Port profiles can be applied to a specific interface, a range of interfaces, or
globally.
There are two types of port profiles:
• User Defined — Enables the user to bundle configurations, as a port
profile, and then apply it to one or more interfaces at a time. Up to 20
user-defined macros can be supported. These can only be defined through
CLI commands.
• Built-In — Pre-defined macros that cannot be changed or deleted. The
device includes the following built-in macros:
– Global
– Desktop
– Phone
– Switch
– Router
– Wireless Configuration
Before a built-in profile can be applied to an interface, the global profile must
be applied. The global profile enables QoS Advanced mode, sets Advanced
mode parameters, CoS to queue mapping, and DSCP to queue mapping and
defines certain standard ACLs. Use the CLI command show parser macro
name profile-global to display the Global profile contents.398 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To assign a profile to a port:
1 Click Switching > Ports > Port Profile in the tree view to display the Port
Profiles: Summary page.
Figure 10-4. Port Profile: Summary
A summary of all the interfaces and their profiles is displayed.
2 To assign the Global profile to the system, check Run Global Profile.
Apply the global profile before applying a built-in interface profile.
3 To assign a profile to an interface, click Edit.
4 Select a unit/interface and a Assigned Profile. The Profile Description is
displayed.
5 Each profile requires entering various elements of VLAN information.
Enter the fields according to the profile:
– VLAN Port Mode — Displays the port mode applied to ports in the
profile.
– VLAN ID-Untagged (1-4094) — Enter the VLAN for untagged
traffic.
– VLAN ID-Tagged (1-4095) — Enter the VLAN for tagged traffic.Dell PowerConnect 55xx Systems User Guide 399
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Native VLAN ID(1-4094) — Enter the VLAN ID used for untagged
traffic to trunk ports, or check None.
The remaining fields on this page are display-only, and describe the port
configuration of the profile. The following fields are described:
Port Security fields:
– Mode — Learning mode. The possible options are:
• Classic Lock — Locks the port using the classic lock mechanism.
The port is immediately locked, regardless of the number of
addresses that have already been learned.
• Limited Dynamic Lock — Locks the port by deleting the
dynamic MAC addresses associated with the port. The port learns
up to the maximum addresses allowed on the port. Both
relearning and aging MAC addresses are enabled.
– Max Entries — Displays the maximum number of MAC addresses
that can be learned on the port.
– Action on Violation — Action to be applied to packets arriving on a
locked port. The possible options are:
• Discard — Discard the packets from any unlearned source.
• Forward — Forward the packets from an unknown source,
without learning the MAC address.
• Shutdown — Discard the packet from any unlearned source, and
shut down the port. Ports remain shutdown until they are
reactivated, or the device is reset.
Spanning Tree fields:
– Point-to-Point Admin Status — Displays whether a point-to-point
links is established. The possible options are:
• Enable — Enables the device to establish a point-to-point link, or
specifies for the device to automatically establish a point-to-point
link. To establish communications over a point-to-point link, the
originating PPP first sends Link Control Protocol (LCP) packets
to configure and test the data link. After a link is established and
optional facilities are negotiated as needed by the LCP, the
originating PPP sends Network Control Protocols (NCP) packets
to select and configure one or more network layer protocols. 400 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
When each of the chosen network layer protocols has been
configured, packets from each network layer protocol can be sent
over the link. The link remains configured for communications
until explicit LCP or NCP packets close the link, or until some
external event occurs. This is the actual switch port link type. It
may differ from the administrative state.
• Disable — Disables point-to-point link.
• Auto — The device automatically establishes a point-to-point
link.
– Fast Link — Displays whether Fast Link mode is enabled for the port.
If this is enabled, the Port State is automatically placed in the
Forwarding statewhen the port is up.
– BPDU Guard — Displays whether BPDU Guard is enabled on the
port.
Miscellaneous fields:
– Policy Name — Displays the name of a policy if one is defined on the
port.
– Auto Negotiation — Displays whether auto-negotiation is enabled on
the port. Auto-Negotiation enables a port to advertise its transmission
rate, duplex mode, and Flow Control abilities to other devices.
6 Click Apply Profile to apply the profile to the specified interface.
Configuring Port Profile Using CLI Commands
The following table summarizes the CLI commands for configuring port
profiles.
Table 10-5. Port Profiles CLI Commands
CLI Command Description
macro {apply|trace} macro-name
[parameter {value}] [parameter
{value}] [parameter {value}]
Applies a macro to an interface or
traces a macro configuration on an
interface.Dell PowerConnect 55xx Systems User Guide 401
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
Sample CLI Scripts
This section provides sample scripts of CLI commands. These particular
actions cannot be performed through the GUI, which only allows applying
built-in macros. These scripts describe how to create macros, display them
and apply them.
The following is a script that creates a global macro.
show parser macro
[{brief|description [interface
[gigabitethernet|tengigabitetherne
t] port-number|name macro-name}]
Displays the parameters for all
configured macros or for one
macro on the switch.
Switch(config) # interface gi1/0/2
Switch(config-if) # macro trace dup
Applying command… ‘duplex full’
Applying command… ‘speed auto’
Switch(config) # interface gi1/0/2
Switch(config-if) # macro apply duplex $DUPLEX full
$SPEED auto
Switch(config-if) # exit
Switch(config) # interface gi1/0/3
Switch(config-if) # macro apply dup
Switch(config-if) # exit
Table 10-6. Create a Global Macro Script
CLI Command Description
console#config
console(config)# macro name interswitch
Enter macro commands one per line. End
with the character '@'.
Create a macro called
interswitch.
Table 10-5. Port Profiles CLI Commands (Continued)
CLI Command Description402 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is a script that creates an interface macro.
vlan database
vlan 40-50
@
Enter the commands in
the macro, which create
VLANs 40 through 50.
console(config)# do show parser macro
name interswitch
Display the macro.
console(config)# macro global apply
interswitch
Apply the macro.
Table 10-7. Create an Interface Macro Script
CLI Command Description
console#config
console(config)# interface range gi1/0/1-
24
Enter Interface mode
for ports 1-24 on unit 1.
console(config-if-range)# macro name
access_port
Enter macro commands one per line. End
with the character '@'.
Create a macro called
access_port.
disable spanning-tree
@
Enter the commands in
the macro, disables
spanning tree on the
interfaces.
console(config)# do show parser macro
name access_port
Display the macro.
console(config)# macro global apply
access_port
Apply the macro to
ports 1-24 on unit 1.
Table 10-6. Create a Global Macro Script (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 403
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port Configuration
If port configuration is modified while the port is a LAG member, the
configuration change is only effective after the port is removed from the
LAG.
To configure a port:
1 Click Switching > Ports > Port Configuration in the tree view to display
the Port Configuration: Summary page.
Figure 10-5. Port Configuration: Summary
All ports on the selected unit and their configuration settings are
displayed.
2 To modify the port settings, click Edit and select a port.
3 Enter the following fields:
– Description (1 - 64 Characters) — Enter a user identification
attached to the port.
– Port Type — Displays the type of port.
– Admin Status — Enable/disable traffic forwarding through the port.
• Up— Traffic is enabled through the port.404 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Down— Traffic is disabled through the port.
– Current Port Status — Displays whether the port is currently
operational or non-operational.
– Re-Activate Suspended Port — Check to reactivate a port if the port
has been disabled through the locked port security option.
– Operational Status — Displays the port operational status. The
possible options are:
• Suspended — Port is currently active, and is not receiving or
transmitting traffic.
• Active — Port is currently active, and is receiving and
transmitting traffic.
• Disable — Port is currently disabled, and is not receiving or
transmitting traffic.
– Admin Speed — Select the configured rate for the port. The port type
determines the available speed setting options. You can designate
Administrative Speed only when port auto-negotiation is disabled.
– Current Port Speed — Displays the actual synchronized port speed
(bps).
– Admin Duplex — Select the port duplex mode (this is only possible if
Auto Negotiation is not enabled). The options are:
• Full — The interface supports transmission between the device
and the client in both directions simultaneously.
• Half — The interface supports transmission between the device
and the client in only one direction at a time.
– Current Duplex Mode — Displays the synchronized port duplex
mode.
– Auto Negotiation — Select to enable auto-negotiation on the port.
Auto-Negotiation enables a port to advertise its transmission rate,
duplex mode, and Flow Control abilities to other devices.
• Energy Efficient Ethernet — Globally enable/disable Energy Efficient
Ethernet and the EEE LLDP advertisement feature.
– Current Auto Negotiation — Displays the current auto-negotiation
setting. Dell PowerConnect 55xx Systems User Guide 405
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Admin Advertisement — Check the auto-negotiation setting the port
advertises. The possible options are:
• Max Capability — The port advertises all the options that it can
support.
• 10 Half — The port advertises for a 10 mbps speed port and half
duplex mode setting.
• 10 Full — The port advertises for a 10 mbps speed port and full
duplex mode setting.
• 100 Half — The port advertises for a 100 mbps speed port and
half duplex mode setting.
• 100 Full — The port advertises for a 100 mbps speed port and full
duplex mode setting.
• 1000 Full — The port advertises for a 1000 mbps speed port and
full duplex mode setting.
• 10000 Full — The port advertises for a 10000 mbps speed port
and full duplex mode setting.
– Current Advertisement — Displays the port advertises its speed to its
neighbor port to start the negotiation process. The possible field
values are those specified in the Admin Advertisement field.
– Neighbor Advertisement — Displays the neighboring port’s
advertisement settings. The field values are identical to the Admin
Advertisement field values.
– Back Pressure — Enable/disable Back Pressure mode that is used with
Half Duplex mode to disable ports from receiving messages.
– Current Back Pressure — Displays the current Back Pressure setting.
– Flow Control — Set flow control on the port. The following options
are available:
• Enable/Disable — Enable/disable flow control on the port
(Enabled is the default).
• Auto Negotiation — Enables auto-negotiation of flow control on
the port.
– Current Flow Control — Displays the current Flow Control setting.406 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– MDI/MDIX — Select one of the options that enables the device to
decipher between crossed and uncrossed cables. Hubs and switches
are deliberately wired opposite to the way end stations are wired, so
that when a hub or switch is connected to an end station, a straight
through Ethernet cable can be used, and the pairs are match up
properly. When two hubs/switches are connected to each other, or two
end stations are connected to each other, a crossover cable is used
ensure that the correct pairs are connected. The possible options are:
• Auto — Use to automatically detect the cable type.
• MDIX — Use for hubs and switches.
• MDI — Use for end stations.
– Current MDI/MDIX — Displays the current device MDIX settings.
– LAG — Displays whether the port is part of a LAG.
Configuring Ports Using CLI Commands
The following table summarizes the CLI commands for configuring ports as
displayed in the Port Configuration pages.
Table 10-8. Port Configuration CLI Commands
CLI Command Description
eee enable
no eee enable
Enables the EEE mode globally.
Use the no format of the command
to disable the mode.
eee lldp enable
no eee lldp enable
Enables EEE support by LLDP on
an Ethernet port.
Use the no format of the command
to disable the support.
description string
no description
Adds a description to an interface
configuration.
Use the no form of this command to
remove the description.
shutdown
no shutdown
Disables an interfaces.
Use the no form of this command to
restart a disabled interface.Dell PowerConnect 55xx Systems User Guide 407
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
set interface active
{[gigabitethernet|tengigabitethe
rnet] interface|port-channel LAGnumber}
Reactivates an interface that is
shutdown.
speed {10|100|1000|10000}
no speed
Configures the speed of a given
Ethernet interface when not using
auto negotiation.
Use the no form of this command to
restore the default configuration.
duplex {half|full}
no duplex
Configures the full/half duplex
operation of a given Ethernet
interface when not using auto
negotiation.
negotiation [capability1
[capability2…capability5]
no negotiation
Enables auto negotiation operation
for the speed and duplex parameters
of a given interface.
Use the no form of this command to
disable auto-negotiation.
back-pressure
no back-pressure
Enables Back Pressure on a given
interface.
Use the no form of this command to
disable back pressure.
flowcontrol {auto|on|off}
no flowcontrol
Configures the flow control on a
given interface.
Use the no form of this command to
disable flow control.
mdix {on|auto}
no mdix
Enables automatic crossover on a
given interface or Port-channel.
Use the no form of this command to
disable cable crossover.
show interfaces configuration
[[gigabitethernet|tengigabitethe
rnet] port-number|port-channel
LAG-number]
Displays the configuration for all
configured interfaces.
Table 10-8. Port Configuration CLI Commands (Continued)
CLI Command Description408 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
show interfaces advertise Displays the interface’s negotiation
advertisement settings.
show interfaces status
[[gigabitethernet|tengigabitethe
rnet] port-number|port-channel
LAG-number]
Displays the status for all configured
interfaces.
show interfaces description
[[gigabitethernet|tengigabitethe
rnet] port-number|port-channel
LAG-number]
Displays the description for all
configured interfaces.
console(config)# interface gi2/0/1
console(config-if)# description "RD SW#3"
console(config-if)# shutdown
console(config-if)# no shutdown
console(config-if)# speed 100
console(config-if)# duplex full
console(config-if)# negotiation
console(config-if)# back-pressure
console(config-if)# flowcontrol on
console(config-if)# mdix auto
console(config-if)# end
console# show interfaces configuration gi2/0/1
Flow Admin Back Mdix
Port Type Duplex Speed Neg control State Pressure Mode
-------- ------------ ------ ----- -------- ------- ----- -------- ----
gi2/0/1 1G-Copper Full 1000 Enabled Off Up Disabled Auto
console# show interfaces status gi2/0/1
Flow Link Back Mdix
Port Type Duplex Speed Neg ctrl State Pressure Mode
-------- ------------ ------ ----- -------- ---- ----------- -------- ----
gi2/0/1 1G-Copper -- -- -- -- Down -- --
Table 10-8. Port Configuration CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 409
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
LAG Configuration
Use the LAG Configuration pages to configure LAGs. The device supports
up to 32 LAGs per system, meaning for all units in the stack. For information
about Link Aggregated Groups (LAGs) and assigning ports to LAGs, see
"Link Aggregation" on page 508.
To configure LAGs:
1 Click Switching > Ports > LAG Configuration in the tree view to display
the LAG Configuration: Summary page.
Figure 10-6. LAG Configuration: Summary
The LAG parameters are displayed.
2 To configure a LAG, click Edit.
3 Select the LAG and enter the fields:
– LAG Mode — Select the LAG mode. The possible options are:410 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Static — The ports comprise a single logical port for high-speed
connections between networking devices.
• LACP — Link Aggregate Control Protocol. LACP-enabled LAGs
can exchange information with other links in order to update and
maintain LAG configurations automatically.
– Description (0 - 64 Characters) — Enter a user-defined description of
the configured LAG.
– LAG Type — Displays the port types that comprise the LAG.
– Admin Status — Enable/disable the selected LAG.
– Current Status — Displays the LAG is currently operating.
– Admin Speed — Select the configured speed at which the LAG is
operating. The possible options are:
• 10M— The LAG is currently operating at 10 Mbps.
• 100M — The LAG is currently operating at 100 Mbps.
• 1000M — The LAG is currently operating at 1000 Mbps.
• 10000 Full— The LAG is currently operating at 1000 Mbps.
– Current Speed — Displays the speed at which the LAG is currently
operating.
– Admin Auto Negotiation — Enable/disable auto-negotiation, which is
a protocol between two link partners that enables a LAG to advertise
its transmission rate, duplex mode and flow control abilities to its
partner.
– Current Auto Negotiation — Displays the current auto-negotiation
setting.
– Admin Advertisement — If auto-negotiation is enabled, select the
auto-negotiation setting the LAG advertises. The possible options are:
• Max Capability — All LAG speeds and Duplex mode settings are
accepted.
• 10 Full — The LAG advertises for a 10 mbps speed LAG and full
duplex mode setting.
• 100 Full — The LAG advertises for a 100 mbps speed LAG and
full duplex mode setting.Dell PowerConnect 55xx Systems User Guide 411
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• 1000 Full — The LAG advertises for a 1000 mbps speed LAG and
full duplex mode setting.
– Current Advertisement — Displays the speed that the LAG advertises
to its neighbor LAG to start the negotiation process. The possible field
values are those specified in the Admin Advertisement field.
– Neighbor Advertisement — Displays the neighboring LAG
advertisement settings. The field values are identical to the Admin
Advertisement field values.
– Admin Flow Control — Enable/disable flow control on the LAG.
Flow Control mode is effective on the ports operating in Full Duplex
in the LAG. The possible options are:
• Enable — Enables flow control on the LAG (default).
• Disable — Disables flow control on the LAG.
• Auto Negotiation — Enables the auto-negotiation of flow control
on the LAG.
– Current Flow Control — Displays the current Flow Control setting.
Configuring LAGs Using CLI Commands
The following table summarizes the CLI commands for configuring LAGs as
displayed in the LAG Configuration pages.
Table 10-9. LAG Configuration CLI Commands
CLI Command Description
interface port-channel LAGnumber
Enters the interface configuration
mode of a specific LAG.
channel-group port-channel mode
{on|auto}
no channel-group
Sets a mode for a LAG.
Use the no form of this command
restore the default configuration.
description string
no description
Adds a description to a LAG.
Use the no form of this command to
remove the description.412 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
shutdown
no shutdown
Disables the LAG.
Use the no form of this command to
restart the LAG.
speed {10|100|1000|10000}
no speed
Configures the speed of the LAG
when not using auto negotiation.
Use the no form of this command to
restore the default configuration.
negotiation [capability1
[capability2…capability5]
no negotiation
Enables auto negotiation operation for
the speed and duplex parameters of a
LAG.
Use the no form of this command to
disable auto-negotiation.
flowcontrol {auto|on|off}
no flowcontrol
Configures the flow control on a given
LAG.
Use the no form of this command to
disable flow control.
show interfaces configuration
[port-channel LAG-number]
Displays the configuration for the
LAGs.
show interface advertise Displays the LAG’s negotiation
advertisement settings.
show interfaces status [portchannel LAG-number]
Displays the status for all configured
LAGs.
show interfaces description
[port-channel LAG-number]
Displays the description for all
configured LAGs.
show interfaces port-channel
[LAG-number]
Displays LAG information.
Table 10-9. LAG Configuration CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 413
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# interface port-channel 1
console(config-if)# no negotiation
console(config-if)# speed 100
console(config-if)# flowcontrol on
console(config-if)# exit
console(config)# interface port-channel 2
console(config-if)# shutdown
console(config-if)# exit
console(config-if)# end
console# show interfaces port-channel
Channel Ports
--------- ---------
ch1 Inactive: gi/1/0/(11-13)
ch2 Active: gi/1/0/14414 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Storm Control
When Broadcast, Multicast, or Unknown Unicast frames are received, they
are duplicated, and a copy is sent to all possible egress ports. This means that
in practice, they are sent to all ports belonging to the relevant VLAN. In this
way, one ingress frame is turned into many, creating the potential for a storm.
Storm protection provides the ability to limit the number of frames entering
the switch, and to define the types of frames that are counted towards this
limit.
When a threshold (limit) is configured on the device, the port discards traffic
when that threshold is reached. The port remains blocked until the traffic rate
drops below this threshold. It then resumes normal forwarding.
To configure Storm Control:
1 Click Switching > Ports > Storm Control in the tree view to display the
Storm Control: Summary page.
Figure 10-7. Storm ControlDell PowerConnect 55xx Systems User Guide 415
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Storm control parameters are displayed for all ports on the selected unit.
2 To configure Storm Control on a port, click Edit.
3 Select a port from the Port drop-down list and enter the following fields:
– Broadcast Control — Enable/disable forwarding Broadcast packets on
the specific interface.
– Broadcast Mode — Select the counting mode. The possible options
are:
• Multicast & Broadcast — Counts Broadcast and Multicast traffic
together towards the bandwidth threshold.
• Broadcast Only — Counts only Broadcast traffic towards the
bandwidth threshold.
– Broadcast Rate Threshold (3500-1000000) — Enter the maximum
rate (Kbits/sec) at which unknown packets are forwarded.
Configuring Storm Control Using CLI Commands
The following table summarizes the CLI commands for configuring Storm
Control as displayed on the Storm Control pages.
Table 10-10. Storm Control CLI Commands
CLI Command Description
storm-control includemulticast [unknown-unicast]
no storm-control includemulticast
Counts Multicast packets in the
Broadcast storm control.
Use the no form of this command to
disable counting of multicast packets in
the Broadcast storm control.
storm-control broadcast enable
no storm-control broadcast
enable
Enables Broadcast storm control.
Use the no form of this command to
disable Broadcast storm control.
storm-control broadcast level
kbps
no storm-control broadcast
level
Configures the maximum Broadcast
rate.
Use the no form of this command to
return the Broadcast level to the default
value.416 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
show ports storm-control port Displays the storm control
configuration.
console(config)# interface gi1/0/1
console(config-if)# storm-control broadcast enable
console(config-if)# storm-control include-multicast
unknown-unicast
console# show ports storm-control gi1/0/1
Port State Rate [Kbits/Sec] Included
-------- -------- ---------------- ---------------------
gi1/0/1 Disabled 8500 Broadcast
Table 10-10. Storm Control CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 417
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port Mirroring
Switches usually only forward frames to relevant ports. To monitor traffic,
either for information gathering, such as statistical analysis, or for
troubleshooting higher-layer protocol operation, the Mirroring feature
forwards frames to a monitoring port.
Mirroring provides the ability to specify that a desired destination (target)
port will receive a copy of all traffic passing through designated source ports.
The frames arriving at the destination port are copies of the frames passing
through the source port at ingress, prior to any switch action.
It is possible to specify several source ports to be monitored by a single target
port. However, in this case, the traffic sent to the target port is placed in the
target port's queues on a first come, first served basis, and any excess traffic is
silently discarded. This may mean that the traffic actually seen by any device
attached to the target port is an arbitrarily selected subset of the actual traffic
going through the source ports.
Port mirroring is only relevant to physical ports. Therefore, if you want a LAG
to function as the source of a port mirroring session, the member ports must
be individually specified as sources.
Up to four sources can be mirrored. This can be any combination of four
individual ports.
Before configuring Port Mirroring, note the following:
• Monitored ports cannot operate faster than the monitoring port.
• All Rx/Tx packets should be monitored to the same port.
Destination Port Restrictions
The following restrictions apply to destination ports:
• Destination ports cannot be configured as source ports.
• Destination ports cannot be a member of a LAG.
• IP interfaces cannot be configured on the destination port.
• GVRP cannot be enabled on the destination port.
• The destination port cannot be a member of a VLAN.
• Only one destination port can be defined.418 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• All QoS/CoS rules that apply to the destination port, as an egress, such as
traffic shaping, are suspended for the duration of the mirroring session.
Any such settings, configured on the port during the mirroring session,
take effect only after the port is no longer a destination port for a
mirroring session.
• Ingress mirrored packets may arrive at the ingress port either with an
802.1q tag or without. When the packets are mirrored to a port analyzer,
they should be transmitted as they are received on the ingress port.
However, in the device, the packet is transmitted out of the port analyzer
as always tagged or always untagged (user configurable), regardless of the
input encapsulation.
Source Port Restrictions
The following restrictions apply to ports specified as source ports:
• Source ports cannot be a member of a LAG.
• Source ports cannot be configured as a destination port.
• Up to four source ports can be mirrored.
NOTE: When a port is set to be a target port for a port-mirroring session, all normal
operations on it are suspended. This includes Spanning Tree and LACP. All currently
active protocols and services on that port are suspended.Dell PowerConnect 55xx Systems User Guide 419
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port Mirroring
To specify source and destination ports for port mirroring:
1 Click Switching > Ports > Port Mirroring in the tree view to display the
Port Mirroring: Summary page.
Figure 10-8. Port Mirroring: Summary
The previously-defined source ports for the selected Destination Port are
displayed, along with the fields defined in the Add page and their status.
– Status — Indicates if the port is currently being monitored (Active) or
not being monitored (notReady), because of some problem.
2 To add a port to be mirrored, click Add, and enter the fields:
– Source Port — The port number from which port traffic is copied.
– Type — Type of traffic (Tx or Rx or both) to be copied.420 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring Port Mirroring Using CLI Commands
The following table summarizes the CLI commands for configuring Port
Mirroring.
The following is an example of the CLI commands:
Table 10-11. Port Mirroring CLI Commands
CLI Command Description
port monitor srcinterface-id [rx|tx]
no port monitor srcinterface-id
Starts a port monitoring session. This must
be performed in Interface Configuration
mode, which is the destination interface.
Use the no form of this command to stop a
port monitoring session.
show ports monitor Displays the port monitoring status.
console(config)# interface gi1/0/1
console(config-if)# port monitor gi1/0/8
console# show ports monitor
Source port Destination Port Type Status
----------- ---------------- ---- -----------
gi1/0/1 gi1/0/8 RX,TX ActiveDell PowerConnect 55xx Systems User Guide 421
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Ports.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY422 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_AddressTables.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
11
Address Tables
This section describes how MAC addresses are handled on the device.
It contains the following topics:
• Overview
• Static Addresses
• Dynamic AddressesDell PowerConnect 55xx Systems User Guide 423
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_AddressTables.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Overview
MAC addresses, associated with ports, are stored in the Static Address or the
Dynamic Address tables. Packets, addressed to a destination stored in one of
these tables, are forwarded to the associated port.
MAC addresses are dynamically learned when packets arrive at the device.
Addresses are associated with ports by learning the source address of the
frame. Frames, addressed to a destination MAC address that is not associated
with any port, are flooded to all ports of the relevant VLAN. In order to
prevent the bridging table from overflowing, dynamic MAC addresses, from
which no traffic is seen for a certain period, are erased.
Static addresses are manually entered into the table.424 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_AddressTables.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Static Addresses
Static addresses are manually assigned to a specific interface and VLAN on
the switch. If a static address is seen on another interface, the address is
ignored and it is not written to the address table.
To define a static address:
1 Click Switch > Address Tables > Static Address Table in the tree view to
display the Static Address Table: Summary page.
Figure 11-1. Static Address Table
A list of the currently-defined static addresses is displayed.
2 To add a static address, click Add.
3 Enter the following fields:
• Interface — Select a port or LAG for the entry.
• MAC Address — Enter the interface MAC address.
• VLAN ID — Check and select the VLAN ID for the port.
or
• VLAN Name — Check and enter the VLAN name.
• Status — Select how the entry in the table will be treated. The
possible options are:Dell PowerConnect 55xx Systems User Guide 425
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_AddressTables.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Permanent — The MAC address is never aged out of the table
and, if it is saved to the Startup Configuration, it is retained after
rebooting.
• Delete on Reset — The MAC address is deleted when the device
is reset.
• Delete on Timeout — The MAC address is deleted when a
timeout occurs.
• Secure — The MAC address is secure when the interface is in
classic locked mode.
To prevent Static MAC addresses from being deleted when the Ethernet
device is reset, ensure that the port attached to the MAC address is locked.
Configuring Static Addresses Using CLI Commands
The following table summarizes the CLI commands for configuring static
address parameters as displayed in the Static Address Table pages.
Table 11-1. Static Address CLI Commands
CLI Command Description
mac address-table static macaddress vlan vlan-id interface
{[gigabitethernet|tengigabitethern
et] port-number|port-channel LAGnumber} [permanent|delete-onreset|delete-on-timeout|secure]
no mac address-table static [macaddress] vlan vlan-id
Adds a MAC-layer station source
address to the MAC address
table.
Use the no form of this
command to delete the MAC
address.
show mac address-table
[dynamic|static|secure] [vlan
vlan]
[[[gigabitethernet|tengigabitether
net] port-number|port-channel LAGnumber]] [address mac-address]
Displays entries in the MAC
address table.426 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_AddressTables.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config-if)#bridge address 00:60:70:4C:73:FF
permanent gi1/0/8
console# show mac address-table static
Aging time is 300 sec
VLAN MAC Address Port Type
---- ------------------ -------- --------
1 00:60:70:4C:73:FF gi1/0/8 static
1 00:60:70:8C:73:FF gi1/0/8 static
200 00:10:0D:48:37:FF gi1/0/9 staticDell PowerConnect 55xx Systems User Guide 427
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_AddressTables.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Dynamic Addresses
The Dynamic Address Table contains the MAC addresses acquired by
monitoring the source addresses of traffic entering the switch. When the
destination address for inbound traffic is found in the database, the packets
intended for that address are forwarded directly to the associated port.
Otherwise, the traffic is flooded to all ports in the VLAN of the frame.
To prevent the table from overflowing and to make room for new addresses,
an address is deleted from the table if no traffic is received from a dynamic
MAC address for a certain period. This period of time is called the aging
interval.
To configure dynamic addresses:
1 Click Switch > Address Tables > Dynamic MAC Address in the tree view
to display the Dynamic Address page.
Figure 11-2. Dynamic Address Table
The current address table is displayed along with other parameters.
2 Enter Address Aging (10-630). The aging time is a value between the userconfigured value and twice that value minus 1. For example, if you entered
300 seconds, the aging time is between 300 and 599 seconds.428 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_AddressTables.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 To clear the table, check Clear Table.
4 To display a subset of the addresses in a particular order, enter the query
criteria and sort key under Query By, and click Query. The following fields
are displayed for entries matching the query criteria:
– VLAN ID — VLAN ID in the entry.
– MAC Address — Interface MAC address.
– Interface — Port or LAG associated with the MAC address.
Configuring Dynamic Addresses Using CLI Commands
The following table summarizes the CLI commands for configuring static
address parameters as displayed in the Dynamic Address Table pages.
Table 11-2. Dynamic Address CLI Commands
CLI Command Description
mac address-table aging-time
seconds
no mac address-table aging-time
Sets the aging time of the
address table.
Use the no form of this
command to restore the default.
clear mac address-table dynamic
[interface
[{[gigabitethernet|tengigabitether
net] port-number|port-channel LAGnumber}} [permanent|delete-onreset|delete-on-timeout|secure]]
clear mac address-table secure
interface
[gigabitethernet|tengigabitetherne
t] port-number|port-channel LAGnumber
Removes learned or secure
entries from the forwarding
database.
show mac address-table
[dynamic|static|secure] [vlan
vlan] [interface
[gigabitethernet|tengigabitetherne
t] port-number|port-channel LAGnumber] [address mac-address]
Displays entries in the MAC
address table.Dell PowerConnect 55xx Systems User Guide 429
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_AddressTables.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# mac address-table aging-time 600
console# show mac address-table dynamic
Aging time is 300 sec
VLAN MAC Address Port Type
---- ------------------ -------- --------
1 00:60:70:4C:73:FF gi1/0/8 dynamic
1 00:60:70:8C:73:FF gi1/0/8 dynamic430 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_GARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
12
GARP
This section describes how to configure Generic Attribute Registration
Protocol (GARP) on the device.
It contains the following topics:
• GARP Overview
• GARP TimersDell PowerConnect 55xx Systems User Guide 431
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_GARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
GARP Overview
Generic Attribute Registration Protocol (GARP) is a general-purpose protocol
that registers network connectivity or membership-style information. GARP
defines a set of devices interested in a given network attribute, such as VLAN
or Multicast address.
The Generic Attribute Registration Protocol (GARP) provides a generic
framework whereby devices in a bridged LAN, such as end stations and
switches, can register and de-register attribute values, such as VLAN
Identifiers, with each other. In doing so, these attributes are propagated to
devices in the bridged LAN, and these devices form a reachability tree that is
a subset of an active topology. GARP defines the architecture, rules of
operation, state machines and variables for the registration and deregistration
of attribute values.
When configuring GARP, ensure the following:
• The leave time must be greater than or equal to three times the join time.
• The leave-all time must be greater than the leave time.
• Set the same GARP timer values on all Layer 2-connected devices. If the
GARP timers are set differently on the Layer 2-connected devices, GARP
application does not operate successfully.432 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_GARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
GARP Timers
To enable a GARP timer on an interface:
1 Click Switching > GARP > GARP Timers in the tree view to open the
GARP Timers: Summary page.
Figure 12-1. GARP Timers: Summary
The GARP timers are displayed.
2 Click Edit.
3 Select an interface, and enter the fields:
– GARP Join Timer (10 - 2147483640) — Enter the time, in
milliseconds, during which Protocol Data Units (PDU) are
transmitted.
– GARP Leave Timer (10 - 2147483640) — Enter the time interval, in
milliseconds, which the device waits before leaving its GARP state.
Leave time is activated by a Leave All Time message sent/received,
and cancelled by the Join message received. Leave time must be
greater than or equal to three times the join time.
– GARP Leave All Timer (10 - 2147483640) — Enter time interval, in
milliseconds, which all devices wait before leaving the GARP state.
The leave all time must be greater than the leave time. Dell PowerConnect 55xx Systems User Guide 433
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_GARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining GARP Timers Using CLI Commands
This table summarizes the CLI commands for defining GARP timers as
displayed in the GARP Timers pages.
The following is an example of the CLI commands:
Table 12-1. GARP Timer CLI Commands
CLI Command Description
garp timer {join|leave|leaveall}
timer_value
Adjusts the GARP application join,
leave, and leaveall GARP timer values.
show gvrp configuration
[[gigabitethernet|tengigabitether
net]port-number|vlan vlanid|port-channel LAG-number]
Displays GVRP configuration information, including timer values,
whether GVRP and dynamic VLAN
creation are enabled, and which ports
are running GVRP.
console(config)# interface gi1/0/1
console(config-if)# garp timer leave 900
console(config-if)# end
console# show gvrp configuration gi1/0/11
GVRP Feature is currently Disabled on the device.
Maximum VLANs: 223
Port(s) GVRP Registration Dynamic VLAN Timers (milliseconds)
Status Creation Join Leave Leave All
-------- ------- ------------ ----------- ------ ----- ---------
gi1/0/11 Disabled Normal Enabled 200 900 10000434 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
13
Spanning Tree
This chapter describes the Spanning Tree Protocol.
It contains the following topics:
• Spanning Tree Protocol Overview
• Global Settings
• STP Port Settings
• STP LAG Settings
• Rapid Spanning Tree
• Multiple Spanning TreeDell PowerConnect 55xx Systems User Guide 435
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Spanning Tree Protocol Overview
Spanning Tree Protocol (STP) provides tree topography for any bridge
arrangement. STP eliminates loops by providing a unique path between end
stations on a network.
Loops occur when alternate routes exist between hosts. Loops, in an extended
network, can cause bridges to forward traffic indefinitely, resulting in packets
not arriving at their destination, increased traffic, and reduced network
efficiency.
The device supports the following Spanning Tree versions:
• Classic STP — Provides a single path between end stations, avoiding and
eliminating loops. For more information on configuring Classic STP, see
"Global Settings" on page 437.
• Rapid STP (RSTP) — Provides faster convergence of the spanning tree
than Classic STP. RSTP is most effective when the network topology is
naturally tree-structured, and therefore faster convergence might be
possible. RSTP is enabled by default.
Although Classic STP is guaranteed to prevent Layer 2 forwarding loops, in
a general network topology, there might be an unacceptable delay before
convergence. This means that before convergence, each bridge or switch in
the network must decide if it should actively forward traffic or not, on each
of its ports.
For more information on configuring Rapid STP, see "Rapid Spanning
Tree" on page 450.
• Multiple STP (MSTP) — MSTP is based on RSTP. It detects Layer 2
loops, and attempts to mitigate them by preventing the involved port from
transmitting traffic.
Since loops exist on a per-Layer 2-domain basis, a situation can occur
where there is a loop in VLAN A and no loop in VLAN B. If both VLANs
are on Port X, and STP wants to mitigate the loop, it stops traffic on the
entire port, including VLAN B traffic, where there is no need to stop
traffic.
Multiple Spanning Tree Protocol (MSTP) solves this problem by enabling
several STP instances, so that it is possible to detect and mitigate loops
separately in each instance. By associating instances to VLANs, each 436 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
instance is associated with the Layer 2 domain on which it performs loop
detection and mitigation. This enables a port to be stopped in one
instance, such as traffic from VLAN A that is causing a loop, while traffic
can remain active in another domain where no loop was seen, such as on
VLAN B.
MSTP provides full connectivity for packets allocated to any VLAN, and
transmits packets assigned to various VLANs, through different multiple
spanning tree (MST) regions.
MST regions act as a single bridge.
For more information on configuring Multiple STP, see "Multiple
Spanning Tree" on page 454.Dell PowerConnect 55xx Systems User Guide 437
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Global Settings
To enable STP and select the STP mode on the device:
1 Click Switching > Spanning Tree > Global Settings in the tree view to
display the Global Settings page.
Figure 13-1. Global Settings
The currently-defined settings are displayed.
2 Enter the fields:
– Spanning Tree State — Enable Spanning Tree on the device.
– STP Operation Mode — Select the STP mode enabled on the device.
The possible options are:
• Classic STP — Enables Classic STP on the device.
• Rapid STP — Enables Rapid STP on the device. This is the
default value.
• Multiple STP — Enables Multiple STP on the device.438 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– BPDU Handling — Select how Bridge Protocol Data Unit (BPDU)
packets are managed when STP is disabled on the port/device. BPDUs
are used to transmit spanning tree information. The possible options
are:
• Filtering — Filter BPDU packets when spanning tree is disabled
on an interface.
• Flooding — Flood BPDU packets when spanning tree is disabled
on an interface.
– Path Cost Default Values — Select the method used to assign default
path costs to STP ports. The possible options are:
• Short — Specifies 1 through 65,535 range for port path costs.
• Long — Specifies 1 through 200,000,000 range for port path
costs.
The default path costs assigned to an interface vary according to the
selected method:
Bridge Settings
– Priority (0-61440 in steps of 4096) — Enter the bridge priority value.
When switches or bridges are running STP, each is assigned a priority.
After exchanging BPDUs, the device with the lowest priority value
becomes the Root Bridge. The default value is 32768. The port
priority value is provided in increments of 4096. For example, 4096,
8192, 12288, etc.
– Hello Time (1-10) — Check to use the device Hello Time, which is
the interval of time in seconds that a root bridge waits between
configuration messages. Enter a value.
– Max Age (6-40) — Check to use device Maximum Age Time, which is
the time interval in seconds that a bridge waits before sending
configuration messages. Enter a value.
Interface Long Cost Short Cost
LAG 20,000 4
1000 Mbps 20,000 4
100 Mbps 200,000 19
10 Mbps 2,000,000 100Dell PowerConnect 55xx Systems User Guide 439
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Forward Delay (4-30) — Check to use device forward delay time,
which is the interval of time in seconds that a bridge remains in a
listening and learning state before forwarding packets. Enter a value.
Designated Root — Displays the following:
– Bridge ID — The bridge priority and MAC address.
– Root Bridge ID — The root bridge priority and MAC address.
– Root Port — The port number that offers the lowest cost path from
this bridge to the Root Bridge. This is significant when the Bridge is
not the Root.
– Root Path Cost — The cost of the path from this bridge to the root.
– Topology Changes Counts — The total amount of STP state changes
that have occurred.
– Last Topology Change — The amount of time that has elapsed since
the bridge was initialized or reset, and the last topographic change
occurred.
Defining STP Global Parameters Using CLI Commands
The following table summarizes the CLI commands for defining STP global
parameters as displayed in the Global Settings pages.
Table 13-1. STP Global Parameter CLI Commands
CLI Command Description
spanning-tree
no spanning-tree
Enables spanning tree functionality.
Use the no form of this command to
disable the spanning-tree functionality.
spanning-tree mode
{stp|rstp|mstp}
no spanning-tree mode
Configures the mode of the spanning tree
protocol.
Use the no form of this command to
restore the default configuration.
spanning-tree bpdu
{filtering|flooding|bridging}
no spanning-tree bpdu
Defines BPDU handling when the
spanning tree is disabled globally or on a
single interface.
Use the no form of this command to
restore the default configuration.440 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
spanning-tree pathcost method
{long|short}
no spanning-tree pathcost
method
Sets the default path cost method.
Use the no form of this command to return
to the default configuration.
spanning-tree priority
priority
no spanning-tree priority
Configures the spanning tree priority.
Use the no form of this command to
restore the default device spanning-tree
priority.
spanning-tree hello-time
seconds
no spanning-tree hello-time
Configures the spanning tree bridge Hello
Time, which is how often the device
Broadcasts Hello messages to other
devices.
Use the no form of this command to
restore the default configuration.
spanning-tree max-age seconds
no spanning-tree max-age
seconds
Configures the spanning tree bridge
maximum age.
Use the no form of this command to
restore the default configuration
spanning-tree forward-time
seconds
no spanning-tree forward-time
Configures the spanning tree bridge
forward time, which is the amount of time
a port remains in the listening and learning
states before entering the forwarding state.
Use the no form of this command to
restore the default configuration.
show spanning-tree
[[gigabitethernet|tengigabite
thernet] port-number|portchannel LAG-number] [instance
instance-id]
Displays spanning tree configuration.
show spanning-tree [detail]
[active|blockedports]
[instance instance-id]
Displays detailed spanning tree
information on active or blocked ports.
show spanning-tree mstconfiguration
Displays spanning tree MST configuration
identifier.
Table 13-1. STP Global Parameter CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 441
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# spanning-tree
console(config)# spanning-tree mode rstp
console(config)# spanning-tree priority 12288
console(config)# spanning-tree hello-time 5
console(config)# spanning-tree max-age 12
console(config)# spanning-tree forward-time 25
console(config)# exit442 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
STP Port Settings
To assign STP properties to individual ports:
1 Click Switching > Spanning Tree > STP Port Settings in the tree view to
display the STP Port Settings: Summary page.
Figure 13-2. STP Port Settings: Summary
The ports and their STP settings are displayed.
2 To modify STP settings on a port, click Edit.
3 Select the port, and enter the fields:
– STP — Enable/disable STP on the port.
– Fast Link — Check to enable Fast Link mode for the port. If this is
enabled, the Port State is automatically placed in the Forwarding state
when the port is up. Fast Link mode optimizes the time it takes for the
STP protocol to converge. STP convergence can take 30-60 seconds in
large networks. Dell PowerConnect 55xx Systems User Guide 443
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– BPDU Guard — Check to enable BPDU Guard on the port.
– Root Guard — Check to prevent devices outside the network core
from being assigned the spanning tree root.
– Port State — Displays the current STP state of a port. If the port state
is not disabled, it determines what forwarding action is taken on
traffic. The possible port states are:
• Disabled — STP is currently disabled on the port. The port
forwards traffic while learning MAC addresses.
• Blocking — The port is currently blocked and cannot be used to
forward traffic or learn MAC addresses. Blocking is displayed
when Classic STP is enabled.
• Listening — The port is currently in the listening mode. The port
cannot forward traffic nor can it learn MAC addresses.
• Learning — The port is currently in the learning mode. The port
cannot forward traffic, however it can learn new MAC addresses.
• Forwarding — The port is currently in the forwarding mode. The
port can forward traffic and learn new MAC addresses.
– Role — Displays the port role assigned by the STP algorithm that
provides STP paths. The possible options are:
• Root — This port provides the lowest cost path to forward packets
to root switch.
• Designated — This port is the interface through which the bridge
is connected to the LAN, which provides the lowest cost path
from the LAN to the Root Bridge.
• Alternate — This port provides an alternate LAG to the root
switch from the root interface.
• Backup — This port provides a backup path to the designated
port. Backup ports occur only when two ports are connected in a
loop by a point-to-point link. Backup ports also occur when a LAN
has two or more connections connected to a shared segment.
• Disabled — This port is not participating in the Spanning Tree.444 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Speed — Displays the speed at which the port is operating.
– Path Cost (1-200000000) — Enter the port contribution to the root
path cost. The path cost is adjusted to a higher or lower value, and is
used to forward traffic when a path being rerouted.
– Default Path Cost — Check to use the default path cost.
– Priority — Select the priority value that influences the port choice
when a bridge has two ports connected in a loop. The priority value is
provided in increments of 16.
– Designated Bridge ID — Displays the bridge priority and the MAC
address of the designated bridge.
– Designated Port ID — Displays the designated port’s priority and
interface.
– Designated Cost — Displays the cost of the port participating in the
STP topology. Ports with a lower cost are less likely to be blocked if
STP detects loops.
– Forward Transitions — Displays the number of times the port has
changed from the Forwarding state to Blocking.
– LAG — Displays the LAG to which the port is attached.
Defining STP Port Settings Using CLI Commands
The following table summarizes the CLI commands for defining STP port
parameters as displayed in the STP Port Settings page.
Table 13-2. STP Port Settings CLI Commands
CLI Command Description
spanning-tree disable
no spanning-tree disable
Disables spanning tree on a specific
port.
Use the no form of this command to
enable the spanning tree on a port.
spanning-tree cost cost
no spanning-tree cost
Configures the spanning tree cost
contribution of a port
Use the no form of this command to
restore the default configuration.Dell PowerConnect 55xx Systems User Guide 445
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
spanning-tree port-priority
priority
no spanning-tree port-priority
Configures port priority.
Use the no form of this command to
restore the default configuration.
show spanning-tree
[[gigabitethernet|tengigabiteth
ernet] port-number|port-channel
LAG-number][instance instanceid]
Displays spanning tree configuration.
spanning-tree portfast
no spanning-tree portfast
Enables Fast Link mode.
Use the no form of this command to
disable the PortFast mode.
spanning-tree bpduguard
{enable|disable}
no spanning-tree bpduguard
Shuts down an interface when it
receives a bridge protocol data unit
(BPDU).
Use the no form of this command to
restore the default configuration.
spanning-tree guard root Enables root guard on all spanning tree
instances on the interface.
show spanning-tree [detail]
[active|blockedports] [instance
instance-id]
Displays detailed spanning tree
information on active or blocked ports.
Table 13-2. STP Port Settings CLI Commands (Continued)
CLI Command Description446 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console> enable
console# configure
console(config)# interface gi1/0/1
console(config-if)# spanning-tree enable
console(config-if)# spanning-tree cost 35000
console(config-if)# spanning-tree port-priority 96
console(config-if)# spanning-tree portfast
console(config-if)# exit
console(config)# exit
console# show spanning-tree gi1/0/15 instance 12
Port gi1/0/15 enabled
State: discarding Role: alternate
Port ID: 128.15 Port cost: 19
Type: P2p (configured: Auto) Internal Port Fast: No
(configured: No)
Designated bridge Priority :
32768
Address:
00:00:b0:07:07:49
Designated port ID: 128.11 Designated path cost: 0
Guard root: Disabled
Number of transitions to forwarding state: 3
BPDU: sent 482, received 1035Dell PowerConnect 55xx Systems User Guide 447
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
STP LAG Settings
To assign STP parameters to LAGs:
1 Click Switching > Spanning Tree > LAG Settings in the tree view to
display the STP LAG Settings: Summary page.
Figure 13-3. STP LAG Settings: Summary
The LAGs and their STP settings are displayed.
2 To modify STP settings on a LAG, click Edit.
3 Select a LAG from the Select a LAG drop-down menu.
4 Enter the fields.
– STP — Enable/disable STP on the LAG.
– Fast Link — Check to enable Fast Link mode for the LAG. If Fast
Link mode is enabled for a LAG, the LAG State is automatically
placed in Forwarding when the LAG is up. Fast Link mode optimizes
the time it takes for the STP protocol to converge. STP convergence
can take from 30-60 seconds in large networks.
– BPDU Guard — Check to enable BPDU Guard on the LAG.
– Root Guard — Check to prevent devices outside the network core
from being assigned the spanning tree root. 448 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– LAG State — Displays the current STP state of the LAG. If enabled,
the LAG state determines what forwarding action is taken on traffic. If
the bridge discovers a malfunctioning LAG, the LAG is placed in the
Broken state. Possible LAG states are:
• Disabled — STP is currently disabled on the LAG. The LAG
forwards traffic while learning MAC addresses.
• Blocking — The LAG is blocked and cannot be used to forward
traffic or learn MAC addresses.
• RSTP Discarding State — The LAG does not learn MAC
addresses and does not forward frames. This state is union of
Blocking and Listening state introduced in STP (802.1.D).
• Listening — The LAG is in the listening mode, and cannot
forward traffic or learn MAC addresses.
• Learning — The LAG is in the learning mode, and cannot
forward traffic, but it can learn new MAC addresses.
• Forwarding — The LAG is currently in the forwarding mode, and
it can forward traffic and learn new MAC addresses.
• Broken — The LAG is currently malfunctioning, and cannot be
used for forwarding traffic.
– Role — Displays the LAG role assigned by the STP algorithm that
provides STP paths. The possible options are:
• Root — This LAG provides the lowest cost path to forward
packets to root switch.
• Designated — This LAG is the interface through which the
bridge is connected to the LAN, which provides the lowest cost
path from the LAN to the Root Bridge.
• Alternate — This LAG provides an alternate LAG to the root
switch from the root interface.
• Backup — This LAG provides a backup path to the designated
port. Backup ports occur only when two ports are connected in a
loop by a point-to-point link. Backup ports also occur when a LAN
has two or more connections connected to a shared segment.
• Disabled — This LAG is not participating in the Spanning Tree.Dell PowerConnect 55xx Systems User Guide 449
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Path Cost (1-200000000) — Enter the amount the LAG contributes
to the root path cost. The path cost is adjusted to a higher or lower
value, and is used to forward traffic when a path is being rerouted.
The path cost has a value of 1 to 200000000.
– Default Path Cost — Check for the device to use the default path
cost.
– Priority — Select the priority value of the LAG. The priority value
influences the LAG choice when a bridge has looped ports. The
priority value is given in steps of 16.
– Designated Bridge ID — Displays the priority and the MAC address
of the designated bridge.
– Designated Port ID — Displays the ID of the selected interface.
– Designated Cost — Displays the cost of the port participating in the
STP topology. Ports with a lower cost are less likely to be blocked if
STP detects loops.
– Forward Transitions — Displays the number of times the LAG State
has changed from the Forwarding state to a Blocking state.
Defining STP LAG Settings Using CLI Commands
For information about CLI commands for defining STP LAG settings, see
Table 13-2.
The following is an example of the CLI commands:
console(config)# interface port-channel 1
console(config-if)# spanning-tree disable
console(config-if)# spanning-tree cost 35000
console(config-if)# spanning-tree port-priority 96
console(config-if)# spanning-tree portfast450 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Rapid Spanning Tree
While classic spanning tree prevents Layer 2 forwarding loops on a general
network topology, convergence can take from 30 to 60 seconds. This delay
provides time to detect possible loops, and propagate status changes.
Rapid Spanning Tree Protocol (RSTP) detects and uses network topologies
that enable a faster convergence of the spanning tree, without creating
forwarding loops.
To configure RSTP:
1 Click Switching > Spanning Tree > Rapid Spanning Tree in the tree view
to display the Rapid Spanning Tree: Summary page.
Figure 13-4. Rapid Spanning Tree: Summary
2 To modify RSTP settings on an interface, click Edit and enter the fields:
– Interface — Select a port or LAG.
– State — Displays the RSTP state of the selected interface.Dell PowerConnect 55xx Systems User Guide 451
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Role — Displays the port role assigned by the STP algorithm in order
to provide STP paths. The possible options are:
• Root — This port provides the lowest cost path to forward packets
to root switch.
• Designated — This port is the interface through which the bridge
is connected to the LAN, which provides the lowest cost path
from the LAN to the Root Bridge.
• Alternate — This port provides an alternate LAG to the root
switch from the root interface.
• Backup — This port provides a backup path to the designated
port. Backup ports occur only when two ports are connected in a
loop by a point-to-point link. Backup ports also occur when a LAN
has two or more connections connected to a shared segment.
• Disabled — This port is not participating in the Spanning Tree.
– Mode — Displays if RSTP is enabled.
– Fast Link Operational Status — Displays if Fast Link is enabled or
disabled for the port or LAG. If Fast Link is enabled for an interface,
the interface is automatically placed in the forwarding state. The
possible options are:
• Enable — Fast Link is enabled.
• Disable — Fast Link is disabled.
• Auto — Fast Link mode is enabled a few seconds after the
interface becomes active.
– Point-to-Point Admin Status — Select if a point-to-point links is
established, or permits the device to establish a point-to-point link.
The possible options are:
• Enable — Enables the device to establish a point-to-point link, or
specifies for the device to automatically establish a point-to-point
link. To establish communications over a point-to-point link, the
originating PPP first sends Link Control Protocol (LCP) packets
to configure and test the data link. After a link is established and
optional facilities are negotiated as needed by the LCP, the
originating PPP sends Network Control Protocols (NCP) packets
to select and configure one or more network layer protocols.
When each of the chosen network layer protocols has been 452 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
configured, packets from each network layer protocol can be sent
over the link. The link remains configured for communications
until explicit LCP or NCP packets close the link, or until some
external event occurs. This is the actual switch port link type. It
may differ from the administrative state.
• Disable — Disables point-to-point link.
• Auto — The device automatically establishes a point-to-point
link.
– Point-to-Point Operational Status — Displays the Point-to-Point
operating state.
– Active Protocol Migration Test — Check to run a Protocol Migration
test. This discovers whether the link partner using STP still exists, and
if so whether it has migrated to RSTP or MSTP. If it still exists as an
STP link, the device continues to communicate with it by using STP.
Otherwise, if it has been migrated to RSTP or MSTP, the device
communicates with it using RSTP or MSTP, respectively.
Defining Rapid STP Parameters Using CLI Commands
The following table summarizes the CLI commands for defining Rapid STP
parameters as displayed in the Rapid Spanning Tree pages.
Table 13-3. Rapid STP Parameters CLI Command
CLI Command Description
spanning-tree link-type {pointto-point|shared}
no spanning-tree spanning-tree
link-type
Overrides the default link-type setting
determined by the port duplex mode,
and enables RSTP transitions to the
forwarding state.
Use the no form of this command to
restore the default configuration.
clear spanning-tree detectedprotocols interface
[[gigabitethernet|tengigabiteth
ernet] port-number|port-channel
LAG-number]
Restarts the protocol migration
process.Dell PowerConnect 55xx Systems User Guide 453
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
show spanning-tree
[[gigabitethernet|tengigabiteth
ernet] port-number|port-channel
LAG-number]
Displays spanning tree configuration.
console(config)# interface gi1/0/5
console(config-if)# spanning-tree link-type shared
Table 13-3. Rapid STP Parameters CLI Command (Continued)
CLI Command Description454 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Multiple Spanning Tree
This section describes Multiple Spanning Tree Protocol (MSTP).
It contains the following topics:
• MSTP Overview
• MSTP Properties
• VLAN to MSTP Instance
• MSTP Instance Settings
• MSTP Interface SettingsDell PowerConnect 55xx Systems User Guide 455
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
MSTP Overview
MSTP maps VLANs into STP instances, using various load balancing
scenarios. As a result of this partitioning into instances, if port A is blocked in
one STP instance, the same port can be placed in the Forwarding State in
another STP instance.
In addition, packets assigned to various VLANs are transmitted along
different paths within Multiple Spanning Trees Regions (MST Regions).
Regions are one or more Multiple Spanning Tree bridges by which frames can
be transmitted.
MSTP Properties
To set an MSTP region:
1 Click Switching > Spanning Tree > MSTP Settings in the tree view to
display the MSTP Properties: Summary page.
Figure 13-5. MSTP Properties: Summary456 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Enter the following fields:
– Region Name (1-32 Characters) — Enter the user-defined MSTP
region name.
– Revision (0-65535) — Enter the unsigned 16-bit number that
identifies the current MST configuration revision. The revision
number is required as part of the MST configuration.
– Max Hops (1-40) — Enter the total number of hops that occur in a
specific region before the BPDU is discarded. Once the BPDU is
discarded, the port information is aged out.
– IST Master — Displays the Internal Spanning Tree Master ID. The
IST Master is the instance 0 root.
Configuring MST Properties Using CLI Commands
The following table summarizes the CLI commands for configuring MST
properties in the MSTP Properties pages.
Table 13-4. MSTP Properties CLI Commands
CLI Command Description
spanning-tree mst
configuration
Enters MST Configuration mode.
spanning-tree mst max-hops
hop-count
no spanning-tree mst maxhops
Configures the number of hops in an MST
region before the BDPU is discarded and the
port information is aged out (in Global
Configuration mode).
Use the no form of this command to restore
the default configuration.
name string
no name
Sets the MSTP region name.
Use the no form of this command to restore
the default setting.
revision value
no revision
Defines the MST configuration revision
number.
Use the no form of this command to restore
the default configuration.
exit Exits the MST region configuration mode
after applying configuration changes.Dell PowerConnect 55xx Systems User Guide 457
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
show {current|pending} Displays the current or pending MST region
configuration.
show spanning tree mstconfiguration
Displays the MSTP configuration.
console(config)# spanning-tree mst configuration
console(config-mst)# instance 1 add vlan 10-20
console(config-mst)# name region1
console(config-mst)# revision 1
console(config)# interface gi1/0/1
console(config-if)# spanning-tree mst 1 port-priority 144
console(config)# spanning-tree mst max-hops 10
console(config)# spanning-tree mst configuration
console(config-mst)# instance 2 add vlan 21-30
console(config-mst)# name region1
console(config-mst)# revision 1
console(config-mst)# show pending
Pending MST configuration
Name: Region1
Revision: 1
Instance VLANs Mapped
-------- ------------
0 1-9,31-4094
1 10-20
2 21-30
Table 13-4. MSTP Properties CLI Commands (Continued)
CLI Command Description458 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
VLAN to MSTP Instance
To map VLANs to MSTP instances:
1 Click Switching > Spanning Tree > VLAN to MSTP Instance in the tree
view to display the VLAN to MSTP Instance: Summary page.
Figure 13-6. VLAN to MSTP Instance: Summary
The MSTP instances and their associated VLANs are displayed.
2 To associate a VLAN with an MSTP instance, click Edit.
3 Select the MSTP instance, the VLAN and whether to add or remove the
VLAN from the MSTP instance association.
4 Enter the fields:
– Select MST Instance ID — Select an MST instance.
– VLANs — Enter the VLANs being mapped to this instance.
– Action — Select the mapping action. The possible options are: Dell PowerConnect 55xx Systems User Guide 459
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Add —Add these VLANS to the MST instance.
• Remove —Remove these VLANS from the MST instance.
Mapping VLAN to MSTP Instances Using CLI Commands
The following table summarizes the CLI commands for mapping VLANs to
MSTP instances.
The following is an example of the CLI commands:
Table 13-5. Mapping VLAN to MSTP Instances Using CLI Commands
CLI Command Description
spanning-tree mst
configuration
Enters MST Configuration mode.
instance instance-id vlan
vlan-range
no instance instance-id
vlan vlan-range
Maps VLANs to an MST instance.
Use the no form of this command to restore
default mapping.
show spanning-tree detail Displays the spanning-tree configuration
console(config)# spanning-tree mst configuration
console(config-mst)# instance 1 vlan 10-20460 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
MSTP Instance Settings
To configure MSTP instances:
1 Click Switching > Spanning Tree > MSTP Instance Settings in the tree
view to display the MSTP Instance Settings page.
Figure 13-7. MSTP Instance Settings
The MSTP instances and their associated VLANs are displayed.
2 Select an Instance ID.
3 Enter the Bridge Priority (0-61440) of this bridge for the selected MSTP
instance.
4 The following fields are displayed:
– Included VLANs — Displays VLANs included in this instance.
– Designated Root Bridge ID — Priority and MAC address of the Root
Bridge for the MST instance.Dell PowerConnect 55xx Systems User Guide 461
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Root Port — Root port of the selected instance.
– Root Path Cost — Root path cost of the selected instance.
– Bridge ID — Bridge priority and the MAC address of this switch for
the selected instance.
– Remaining Hops — Number of hops remaining to the next
destination.
Configuring MSTP Instances Using CLI Commands
The following table summarizes the CLI commands for configuring the fields
in the MSTP Instance pages.
The following is an example of the CLI commands:
Table 13-6. Configuring MSTP Instances CLI Commands
CLI Command Description
spanning-tree mst
configuration
Enters MST Configuration mode.
spanning-tree mst
instance-id priority
priority
no spanning-tree mst
instance-id priority
Configures the device priority for the specified
spanning-tree instance.
Use the no form of this command to restore
the default configuration.
show spanning-tree
detail
Displays the spanning-tree configuration
console(config)# spanning-tree mst configuration
console(config-mst)# spanning-tree mst 1 priority 4096462 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
MSTP Interface Settings
To assign interfaces to MSTP instances:
1 Click Switching > Spanning Tree > MSTP Interface Settings in the tree
view to display the MSTP Interface Settings: Summary page.
Figure 13-8. MSTP Interface Settings: Summary
MSTP interface settings for the selected instance is displayed.
2 To set MSTP settings for an interface, click Edit.
3 Select an instance, and enter the fields:
– Interface ID — Assign either ports or LAGs to the selected MSTP
instance.
– Port State — Displays whether the port is enabled or disabled in the
specific instance.
– Type — Displays whether MSTP treats the port as a point-to-point
port, or a port connected to a hub, and whether the port is internal to
the MST region or a boundary port. A Master port provides
connectivity from a MSTP region to the outlying CIST root. A Dell PowerConnect 55xx Systems User Guide 463
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Boundary port attaches MST bridges to LAN in an outlying region. If
the port is a boundary port, it also indicates whether the device on the
other side of the link is working in RSTP or STP mode.
– Role — Displays the port role assigned by the STP algorithm in order
to provide to STP paths. The possible options are:
• Root — This port provides the lowest cost path to forward packets
to root switch.
• Designated — This port is the interface through which the bridge
is connected to the LAN, which provides the lowest cost path
from the LAN to the Root Bridge.
• Alternate — This port provides an alternate LAG to the root
switch from the root interface.
• Backup — This port provides a backup path to the designated
port. Backup ports occur only when two ports are connected in a
loop by a point-to-point link. Backup ports also occur when a LAN
has two or more connections connected to a shared segment.
• Disabled — This port is not participating in the Spanning Tree.
– Interface Priority— Enter the interface priority for specified instance.
– Path Cost (1-200,000,000) — Enter the port contribution to the
Spanning Tree instance. If a loop occurs, the spanning tree considers
path cost when selecting an interface to put in the Forwarding state.
– Default Path Cost — Check to use the default path cost.
– Designated Bridge ID — Displays the bridge ID number that
connects the link or shared LAN to the root.
– Designated Port ID — Displays the Port ID number on the
designated bridge that connects the link or the shared LAN to the
root.
– Designated Cost — Displays the cost of the path from the link or the
shared LAN to the root.
– Forward Transitions — Displays the number of times the port
changed to the forwarding state.
– Remain Hops — Displays the number of hops remaining to the next
destination.464 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining MSTP Interfaces Using CLI Commands
The following table summarizes the CLI commands for defining MSTP
interfaces as displayed in the MSTP Interfaces pages.
The following is an example of the CLI commands:
Table 13-7. MSTP Interface CLI Commands
CLI Command Description
spanning-tree mst
instance-id cost cost
no spanning-tree mst
instance-id cost
Sets the path cost of the port for MST
calculations (in Interface Configuration
mode).
Use the no form of this command to restore
the default configuration.
spanning-tree mst
instance-id portpriority priority
Configures the device priority for the specified
spanning-tree instance (in Interface
Configuration mode).
Use the no form of this command to restore
the default configuration.
show spanning-tree mstconfiguration
Displays the MST configuration.
console(config)# interface gi1/0/9
console(config-if)# spanning-tree mst 1 cost 4Dell PowerConnect 55xx Systems User Guide 465
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_STP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY466 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
14
VLANs
This chapter describes how VLANs are configured on the device.
It contains the following topics:
• Virtual LAN Overview
• VLAN Membership
• Port Settings
• LAGs Settings
• Protocol Groups
• Protocol Port
• GVRP Parameters
• Private VLAN
• Voice VLANDell PowerConnect 55xx Systems User Guide 467
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Virtual LAN Overview
A VLAN is a switched network that is logically segmented on an
organizational basis, by functions, project teams, or applications rather than
on a physical or geographical basis. For example, all workstations and servers
used by a particular workgroup team can be connected to the same VLAN,
regardless of their physical connections to the network, or the fact that they
might be intermingled with other teams. Reconfiguration of the network can
be done through software rather than by physically unplugging and moving
devices or wires.
A VLAN can be thought of as a Broadcast domain that exists within a defined
set of switches. A VLAN consists of a number of end systems, either hosts or
network equipment (such as bridges and routers), connected by a single
bridging domain. The bridging domain is supported on various pieces of
network equipment; for example, LAN switches that operate bridging
protocols between them with a separate bridge group for each VLAN.
VLANs are created to provide the segmentation services traditionally
provided by routers in LAN configurations. VLANs address scalability,
security, and network management. Routers in VLAN topologies provide
broadcast filtering, security, address summarization, and traffic flow
management.
None of the switches, within a defined group, will bridge any frames, not even
broadcast frames, between two VLANs. 468 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Frame Flow
Figure 14-1 describes the flow of VLAN frames from the Ingress port to the
Egress port:
Figure 14-1. Frame Flow Through a VLAN
When a frame is received, it must be assigned a VLAN. VLAN assignment is
accomplished by the following steps:
1 If the frame contains a VLAN tag, that tag is used, otherwise the frame is
classified by the port's default VLAN (PVID), if it is defined.
2 After classification, the frame may pass (if enabled) through ingress
filtering, where the frame is dropped if the frame's VLAN ID is not one of
the VLANs to which the ingress port belongs.
3 A forwarding decision is made, as a function of the VLAN ID and the
destination MAC address.
4 The egress rules define whether the frame is to be sent as tagged or
untagged.
Special-case VLANs
VLAN#1 and VLAN#4095 are special-case VLANs:
• VLAN1 — Defined as the default VLAN, and may only be used as a Ports
Default VLAN ID (PVID). This means that if the VLAN, whose VID is the
current port's PVID, is deleted from the port (or from the system), that
port's PVID is set to 1. VLAN#1 cannot be deleted from the system.
• VLAN #4095 — Defined (according to standard and industry practice) as
the "discard" VLAN. A frame classified to this VLAN is silently dropped.
Ingress Egress
VLAN
C lassification
Ingress
Filtering
Egress
Filtering
Progress
Forwarding
Decision
Filtering
Database
Received
Frame
T ransmitted
Frame
Ingress Egress
VLAN
C lassification
Ingress
Filtering
Egress
Filtering
Progress
Forwarding
Decision
Filtering
Database
Received
Frame
T ransmitted
FrameDell PowerConnect 55xx Systems User Guide 469
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
QinQ Tagging
QinQ tagging enables you to add an additional tag to previously-tagged
packets. The added tag provides a VLAN ID to each customer, which ensures
private and segregated network traffic. The VLAN ID tag is assigned to a
customer port in the service provider network. The designated port then
provides additional services to the packets with the double-tags. This enables
administrators to expand service to VLAN users.
Port Modes
Ports participating in Layer 2 switching may be classified as:
• Access Ports
Ports set to Access mode belong to a single VLAN, whose VID is the
currently set PVID (default =1). These ports accept all untagged frames,
and all frames tagged with the VID, currently set as the port's PVID. All
traffic is sent untagged. If the VLAN, whose VID is set as the current PVID
of the port, is deleted from the system, or deleted from the port, the port's
PVID will be set to 1, meaning that the port will be made a member of
VLAN#1, the default VLAN.
Ingress filtering is always enabled for ports in Access mode.
Setting an Access port’s PVID to 4095 effectively shuts it down, as no
frames will be transferred in either direction.
Access mode ports are intended to connect end-stations to the system,
especially when the end-stations are incapable of generating VLAN tags.
• Trunk Ports
Ports set to Trunk mode may belong to multiple VLANs. The default
VLAN membership of a trunk port is all VLANs (1-4094). A PVID must be
set on the port (it can be a non-existing VLAN). Trunk ports accept tagged
and untagged frames. Untagged frames will be classified to the VLAN
whose VLAN ID (VID) is configured as the port’s PVID.
Frames, sent from the port in the VLAN, whose VID is the current PVID,
are sent untagged. Frames sent in all other VLANs active on the port are
sent tagged.470 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Ingress filtering is always enabled on Trunk-mode ports. Incoming frames
will undergo ingress filtering, and if correctly tagged, (tagged with a VID of
one of the VLANs to which the port currently belongs) are admitted.
The default PVID is 1 (the default VLAN). If another VID is configured as
the port’s PVID, and the corresponding VLAN is deleted from the port or
from the system, the port’s PVID reverts to 1, meaning that the port is
made a member of the default VLAN.
Setting a trunk-port’s PVID to 4095 limits traffic to tagged frames.
Incoming untagged frames are silently discarded, and no frames are sent
untagged.
Trunk-mode ports are intended for switch-to-switch links, where traffic is
usually tagged.
• General Ports
Ports set to General mode may be members of multiple VLANs. Each of
these VLANs may be configured to be tagged or untagged. This setting
applies to transmitted frames. Incoming untagged frames are classified
into the VLAN whose VID is the currently configured PVID.
Ingress filtering may be disabled on General ports. Ingress filtering is
enabled by default.
• Promiscuous Ports
A promiscuous port can communicate with all ports of the same Private
VLAN (PVLAN), including the isolated ports of the same PVLAN.
• Isolated
An isolated port has complete Layer 2 isolation from the other ports within
the same PVLAN, but not from the promiscuous ports. Isolated ports can
communicate with promiscuous ports.
In the factory default configuration, all ports are designated as Access ports,
and are associated with the default VLAN.Dell PowerConnect 55xx Systems User Guide 471
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Acceptable Frame Type
The acceptable frame type can be set on a port to accept all frames (tagged
and untagged), tagged only, or untagged only. This setting takes precedence
over all other settings, so that if the acceptable frame type is tagged only,
incoming untagged frames are silently discarded, even if the port has a valid
PVID.472 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
VLAN Membership
The device supports up to 2-4094 VLANs.
Ports are assigned to a VLAN in the Port Settings pages.
To view the ports in a VLAN, and assign various parameters:
1 Click Switching > VLAN > VLAN Membership in the tree view to
display the VLAN Membership: Summary page.
Figure 14-2. VLAN Membership: Summary
The ports in the selected unit/VLAN are displayed along with their
statuses.
Each port/LAG is labeled with one of the following codes, regarding its
membership in the VLAN:Dell PowerConnect 55xx Systems User Guide 473
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– T — Tagged. The interface is a member of a VLAN. All packets
forwarded by the interface are tagged. The packets contain VLAN
information.
– U — Untagged. The interface is a member of a VLAN. Packets
forwarded by the interface are untagged.
– F — Forbidden. The interface is denied membership to a VLAN.
– Blank — The interface is not a VLAN member. Packets associated
with the interface are not forwarded.
2 Enter the fields:
– Show VLAN — Check one of the possible options:
• VLAN ID — Check VLAN ID, and select a VLAN ID to view.
• VLAN Name — Check VLAN Name, and select a VLAN ID to
view.
– VLAN Name (0-32 Characters) — Enter a new VLAN name.
– Status — The VLAN type. Possible values are:
• Dynamic — The VLAN was dynamically created through GVRP.
• Static — The VLAN is user-defined.
– Authentication Not Required — Enable/disable authentication on
the VLAN.
3 To define a new VLAN, click ADD, and enter the fields. The fields in this
page are described above.
Defining VLAN Membership Using CLI Commands
The following table summarizes the CLI commands for defining VLAN
membership as displayed in the VLAN Membership pages.
Table 14-1. VLAN Membership CLI Commands
CLI Command Description
vlan database Enters the VLAN configuration mode.474 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
vlan {vlan-range}[name vlanname]
no vlan vlan-range
Creates a VLAN.
Use the no form of this command to
restore the default configuration or
delete a VLAN.
name string Adds a name to a VLAN.
dot1x auth-not-req
no dot1x auth-not-req
Enables unauthorized devices access to
the VLAN.
Use the no form of this command to
disable access to the VLAN.
console(config)# vlan database
console(config-vlan)# vlan 1972
console(config-vlan)# end
console(config)# interface vlan 1972
console(config-if)# name Marketing
console(config-vlan)# dot1x auth-not-req
console(config-if)# end
Table 14-1. VLAN Membership CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 475
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port Settings
After a VLAN has been defined, assign ports to it.
To assign a VLAN to untagged packets, arriving on the device, enter the port
default VLAN ID (PVID). All untagged packets arriving to the device are
tagged by the ports PVID.
All ports must have a defined PVID. If no other value is configured, the
default VLAN PVID is used. VLAN ID #1 is the default VLAN, and cannot
be deleted from the system.
To configure ports on a VLAN:
1 Click Switching > VLAN > Port Settings in the tree view to display the
Port Settings: Summary page.
Figure 14-3. Port Settings: Summary
All interfaces on the selected unit and their settings are displayed.
2 To modify the port settings, click Edit, and enter the fields:
– Interface — Enter the unit/port number to be modified.
– Switchport Mode — Select whether the port is in Layer 2 or Layer 3.
If the port is in Layer 2, enter the parameters described below,
otherwise the fields are not relevant.476 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Port VLAN Mode — Enter the port VLAN mode. The possible
options are:
• General — The port belongs to VLANs, and each VLAN is
user-defined as tagged or untagged (full 802.1Q mode).
• Access — The port belongs to a single untagged VLAN. When a
port is in Access mode, the packet types that are accepted on the
port cannot be designated. Ingress filtering cannot be
enabled/disabled on an access port.
• Trunk — The port belongs to VLANs on which all ports are tagged
(except for one port that can be untagged).
• Customer — When a port is in Customer mode, an added tag
provides a VLAN ID to each customer, ensuring private and
segregated network traffic for that customer.
• Private VLAN Promiscuous — The port is a promiscuous port.
• Private VLAN Host — The port is an isolated port
– Current Reserved VLAN — Displays the VLAN currently designated
by the system as the reserved VLAN.
– Reserve VLAN for Internal Use (1-4094) — Check to enter a reserved
VLAN, and enter its ID. If none is required, check None.
– PVID (1-4095) — Enter a VLAN ID to be added to untagged packets.
The possible values are 1-4095. VLAN 4095 is defined according to
standard and industry practice as the discard VLAN. Packets classified
to the discard VLAN are dropped.
– VLAN List (I - Inactive Configuration) — Enter the VLAN(s) to
which this port belongs, and indicate its type. The possible options are:
• T — Tagged. The port is a member of a VLAN. All packets
forwarded by the LAG are tagged. The packets contain VLAN
information.
• U — Untagged. The port is a member of a VLAN. Packets
forwarded by the LAG are untagged.
• F — Forbidden. The port is denied membership to a VLAN.
Click Add to move the port to the VLAN list together with its type.Dell PowerConnect 55xx Systems User Guide 477
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Frame Type — Select the packet type accepted on the port. The
possible options are:
• Admit All — Both tagged and untagged packets are accepted on
the port.
• Admit Tagged Only — Only tagged packets are accepted on the
port.
• Admit Untagged Only — Only untagged packets are accepted on
the port.
– Ingress Filtering — Enable/disable ingress filtering, which discards
packets that are destined to VLANs of which the specific port is not a
member.
– Native VLAN ID(1-4094) — Enter VLAN used for untagged traffic to
trunk ports.
– Multicast VLAN ID(1-4094) — Enter VLAN used for Multicast TV
VLAN traffic on access ports.
– Customer VLAN ID(1-4094) — Enter VLAN used for customer
ports.
Assigning Ports to VLAN Groups Using CLI Commands
The following table summarizes the CLI commands for assigning ports to
VLAN groups.
Table 14-2. Port-to-VLAN Group Assignments CLI Commands
CLI Command Description
switchport general acceptableframe-type {tagged-only|untaggedonly|all}
no switchport general acceptableframe-type
Configures ingress filtering based
on packet type tagged/untagged.
Use the no form of this command
to return to default.
switchport mode
{access|trunk|general}
Configures the VLAN
membership mode of a port.478 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
switchport access vlan {vlanid|none}
no switchport access vlan
Configures the VLAN ID when
the interface is in access mode.
Use the no form of this command
to restore the default
configuration.
switchport trunk allowed vlan
{all|none|add vlan-list|remove
vlan-list|except vlan-list}
no switchport trunk allowed vlan
Sets the trunk characteristics
when the interface is in Trunking
mode.
Use the no form of this command
to reset a trunking characteristic
to the default.
switchport trunk native vlan {vlanid|none}
no switchport trunk native vlan
Defines the native VLAN when
the interface is in trunk mode.
Use the no form of this command
to restore the default
configuration.
switchport general allowed vlan
{add|remove} vlan-list
[tagged|untagged]
no switchport general allowed vlan
Sets the general characteristics
when the interface is in general
mode.
Use the no form of this command
to reset a general characteristic to
the default.
switchport general pvid vlan-id
no switchport general pvid
Configures the PVID when the
interface is in general mode.
Use the no form of this command
to restore the default
configuration.
switchport customer vlan vlan-id
no switchport customer vlan
Sets the port's VLAN when the
interface is in customer mode.
Use the no form of this command
to restore the default
configuration.
Table 14-2. Port-to-VLAN Group Assignments CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 479
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
switchport mode
{access|trunk|general|private-vlan
{promiscuous|host}|customer}
no switchport mode
Configure the VLAN membership
mode of a port.
Use the no form of this command
to restore the default
configuration.
Table 14-2. Port-to-VLAN Group Assignments CLI Commands (Continued)
CLI Command Description480 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# vlan database
console(config-vlan)# vlan 23-25
console(config-vlan)# end
console(config)# interface vlan 23
console(config-if)# name Marketing
console(config-if)# end
console(config)# interface gi1/0/8
console(config-if)# switchport mode access
console(config-if)# switchport access vlan 23
console(config-if)# end
console(config)# interface gi1/0/9
console(config-if)# switchport mode trunk
console(config-if)# switchport mode trunk allowed vlan add
23-25
console(config-if)# end
console(config)# interface gi1/0/11
console(config-if)# switchport mode general
console(config-if)# switchport general allowed vlan add
23,25 tagged
console(config-if)# switchport general pvid 25Dell PowerConnect 55xx Systems User Guide 481
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
LAGs Settings
VLANs can either be composed of individual ports or of LAGs. Untagged
packets entering the device are tagged with the LAGs ID specified by the
PVID.
To configure LAGS on a VLAN:
1 Click Switching > VLAN > LAG Settings in the tree view to display the
VLAN LAG Settings page.
Figure 14-4. VLAN LAG Settings
All LAGs and their settings are displayed.
2 To modify the LAG settings, click Edit, and enter the fields:
– LAG — Select the LAG to be modified.
– Switchport Mode — Select whether the LAG is in Layer 2 or Layer 3.
If the LAG is in Layer 2, enter the parameters described below,
otherwise the fields are not relevant.482 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Port VLAN Mode — Enter the port VLAN mode. The possible
options are:
• General — The port belongs to VLANs, and each VLAN is
user-defined as tagged or untagged (full 802.1Q mode).
• Access — The port belongs to a single untagged VLAN. When a
port is in Access mode, the packet types that are accepted on the
port cannot be designated. Ingress filtering cannot be
enabled/disabled on an access port.
• Trunk — The port belongs to VLANs on which all ports are tagged
(except for one port that can be untagged).
• Customer — When a port is in Customer mode, an added tag
provides a VLAN ID to each customer, ensuring private and
segregated network traffic for that customer.
• Private VLAN Promiscuous — The port is a promiscuous port.
• Private VLAN Host — The port is an isolated port
– Current Reserved VLAN — Displays the VLAN currently designated
as the reserved VLAN.
– Reserve VLAN for Internal Use (1-4094) — Enter the VLAN that is
designated as the reserved VLAN after the device is reset, or select
None.
– PVID (1-4095)— Assigns a VLAN ID to untagged packets. The possible
VLAN IDs are 1-4095. VLAN 4095 is defined as per standard and
industry practice, as the discard VLAN. Packets classified to this
VLAN are dropped.
– VLAN List (I - Inactive Configuration) — Enter the VLAN(s) to
which this LAG belongs, and indicate its type. The possible options are:
• T — Tagged. The LAG is a member of a VLAN. All packets
forwarded by the LAG are tagged. The packets contain VLAN
information.
• U — Untagged. The LAG is a member of a VLAN. Packets
forwarded by the LAG are untagged.
• F — Forbidden. The LAG is denied membership to a VLAN.
Click Add to move the LAG to the VLAN list together with its type.Dell PowerConnect 55xx Systems User Guide 483
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Frame Type — Packet type accepted by the LAG. The possible options
are:
• Admit All — Tagged and untagged packets are both accepted by
the LAG.
• Admit Tag Only — Only tagged packets are accepted by the LAG.
• Admit Untagged Only — Only untagged packets are accepted on
the LAG.
– Ingress Filtering — Enable/disable Ingress filtering by the LAG.
Ingress filtering discards packets that are destined to VLANs of which
the specific LAG is not a member.
– Native VLAN ID (1-4094) — Enter VLAN used for untagged traffic
to trunk ports, or select None.
– Multicast VLAN ID (1-4094) — Enter VLAN used for Multicast TV
VLAN traffic on access ports, or select None.
– Customer VLAN ID (1-4094) — Enter VLAN used for customer
ports, or select None.
Assigning LAGs to VLAN Groups Using CLI Commands
Refer to Table 14-2 for a list of the LAG to VLAN CLI commands.484 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Protocol Groups
Protocol groups are based on protocol-based VLANs.
Protocol-based VLANs
Untagged frames received on a VLAN-aware switch can be classified by
methods others than source port, such as data-link-layer protocol
identification. This classification method is referred to as protocol-based
VLANs.
Protocol-based VLANs are useful for isolating Layer 2 traffic of various Layer
3 protocols. If, for example, a switch serves IP stations and IPX stations that
communicate with a single VLAN-unaware server, without using
protocol-based VLANs, all the Layer 2 Broadcast traffic would reach all the
stations. With protocol-based VLANs, the switch can forward incoming
traffic from the server to stations in a specific VLAN only.
Protocol-based VLANs are only available on General ports.
Classification rules are set on a per-port basis, and may be sensitive to the
frame's encapsulation. The default encapsulation assumed is Ethernet.
On each port, a user can define associations between groups of data-link layer
protocols and ports. For each group/port combination, the user may set the
VLAN to which frames incoming on that port will be classified if they belong
to any of the protocols in the group.
Several protocol-groups may be associated to a single port, and a protocol
group may be assigned to multiple ports, if so desired.
It is not guaranteed that the VLAN to which the frame is classified exists in
the system, or is active on that port.
Restrictions
The following frames (packet) types are supported: Ethernet, RFC 1042, and
LLC Other.
There may be dependencies between protocols and encapsulations, and
specifying one protocol may automatically add additional protocols to the
protocol-group, such as specifying IP implies ARP and vice-versa. Dell PowerConnect 55xx Systems User Guide 485
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Similarly, there may be implied dependencies between encapsulations, so that
specifying an encapsulation implies defining the protocol group for related
encapsulations. An example of this is specifying the Ethernet encapsulation,
even by default, implies IEEE802 encapsulation, as per RFC 1042.
The following standards are relevant:
• IEEE802.1V defines VLAN assignment by protocol type.
• IETF RFC 10-2 defines a standard for the transmission of IP datagrams
over IEEE 802 Networks
Defining Protocol Groups
Define protocol groups in two steps:
1 Define a protocol group by assigning one or more protocols to the group
and giving it a protocol-group ID (any integer), using the Protocol Group
pages.
2 Associate the group with a desired VLAN classification, per port, using the
Protocol Port pages.486 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To define a protocol group:
1 Click Switching > VLAN > Protocol Group in the tree view to display
the Protocol Group: Summary page.
Figure 14-5. Protocol Group: Summary
The currently-defined protocol groups are displayed.
2 To add a new protocol group, click Add, and enter the fields:
– Frame Type — Select a frame type to be accepted in the protocol
group.
– Protocol Value — Select a protocol name.
or
– Ethernet-Based Protocol Value (0600 - FFFF) — Enter the Ethernet
protocol group type.
– Protocol Group ID — Assign a protocol group ID number.Dell PowerConnect 55xx Systems User Guide 487
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining VLAN Protocol Groups Using CLI Commands
The following table summarizes the CLI commands for defining VLAN
Protocol groups.
The following is a sample of the CLI commands:
Table 14-3. VLAN Protocol Groups CLI Commands
CLI Command Description
map protocol protocol
[encapsulation] protocolsgroup group
no map protocol protocol
[encapsulation]
Maps a protocol to a protocol group.
Protocol groups are used for protocolbased VLAN assignment.
Use the no form of this command to
delete a protocol from a group.
console (config)# vlan database
console (config-vlan)# map protocol ip protocols-group 213488 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Protocol Port
A protocol port is a port assigned to a particular protocol group. Traffic from
particular types of frames may be assigned to a protocol group, which has a
port and VLAN associated with it.
To add an interface to a protocol group:
1 Click Switching > VLAN > Protocol Port in the tree view to display the
Protocol Port: Summary page.
Figure 14-6. Protocol Port: Summary
A list of previously-defined protocol groups is displayed.
2 To assign an interface to a protocol group, click Add, and enter the fields:
– Interface — Port or LAG number to be added to a protocol group.
– Group ID — Select a protocol group ID to which the interface is
added. Dell PowerConnect 55xx Systems User Guide 489
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Protocol ports can either be attached to aVLAN ID or a VLAN name.
– VLAN ID (1- 4094) —Check and enter a VLAN ID.
or
– VLAN Name — Check and enter a VLAN name.
Defining Protocol Ports Using CLI Commands
The following table summarizes the CLI command for defining protocol
ports.
The following is a sample of the CLI commands:
Table 14-4. Protocol Port CLI Commands
CLI Command Description
switchport general map
protocols-group group vlan
vlan-id
no switchport general map
protocols-group group
Sets a protocol-based classification rule.
Use the no form of this command to
delete a classification.
console (config-if)# switchport general map protocolsgroup 1 vlan 8490 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
GVRP Parameters
GARP VLAN Registration Protocol (GVRP) is provided for automatic
distribution of VLAN membership information among VLAN-aware bridges.
GVRP enables VLAN-aware bridges to automatically learn VLANs-to-bridgeports mapping, without having to individually configure each bridge and
register VLAN membership.
To ensure the correct operation of the GVRP protocol, it is advised to set the
maximum number of GVRP VLANs equal to a value which significantly
exceeds:
– The number of all static VLANs both currently configured and
expected to be configured.
– The number of all dynamic VLANs participating in GVRP, both
currently configured (initial number of dynamic GVRP VLANs is 128)
and expected to be configured.
To set GVRP parameters:
1 Click Switching > VLAN > GVRP Parameters in the tree view to display
the GVRP Parameters: Summary page.
Figure 14-7. GVRP Global Parameters
2 Enable/disable GVRP on the device in the GVRP Global Status field.Dell PowerConnect 55xx Systems User Guide 491
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 Check Unit ID and select a unit ID to view ports on the unit, or select
LAGs to view the LAGs in the system.
4 To set GVRP for an interface, click Edit, and enter the fields:
– Interface — Specifies port or LAG for editing GVRP settings.
– GVRP State — Enable/disable GVRP on the interface.
– Dynamic VLAN Creation — Enable/disable Dynamic VLAN creation
on the interface.
– GVRP Registration — Enable/disable VLAN registration through
GVRP on the interface.
NOTE: GVRP functions only on ports in switchport general mode. If you enable it on
another type of port, GVRP does not function.
Configuring GVRP Using CLI Commands
The following table summarizes the CLI commands for configuring GVRP as
displayed in the GVRP Global Parameters page.
Table 14-5. GVRP Global Parameters CLI Commands
CLI Command Description
gvrp enable
no gvrp enable
In Global Configuration mode, this
command enables GVRP globally. In
Interface Configuration mode, it
enables GVRP on the interface.
Use the no form of this command to
disable GVRP on the device.
gvrp vlan-creation-forbid
no gvrp vlan-creation-forbid
Enables or disables dynamic VLAN
creation.
Use the no form of this command to
enable dynamic VLAN creation or
modification.
gvrp registration-forbid
no gvrp registration-forbid
De-registers all dynamic VLANs, and
prevents dynamic VLAN registration on
the port.
Use the no form of this command to
allow dynamic registration of VLANs on
a port.492 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
show gvrp configuration
[[gigabitethernet|tengigabitet
hernet] port-number|portchannel LAG-number]
Displays GVRP configuration
information, including timer values,
whether GVRP and dynamic VLAN
creation is enabled, and which ports are
running GVRP.
show gvrp error-statistics
[[gigabitethernet|tengigabitet
hernet] port-number|portchannel LAG-number]
Displays GVRP error statistics.
show gvrp statistics
[[gigabitethernet|tengigabitet
hernet] port-number|portchannel LAG-number]
Displays GVRP statistics.
clear gvrp statistics
[[gigabitethernet|tengigabitet
hernet] port-number|portchannel LAG-number]
Clears all the GVRP statistics
information.
Table 14-5. GVRP Global Parameters CLI Commands (Continued)
CLI Command DescriptionDell PowerConnect 55xx Systems User Guide 493
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
console(config)# gvrp enable
console(config)# interface gi1/0/1
console(config-if)# gvrp enable
console(config-if)# gvrp vlan-creation-forbid
console(config-if)# gvrp registration-forbid
console(config-if)# end
console# show gvrp configuration
GVRP Feature is currently Disabled on the device.
Maximum VLANs: 4094
Port(s) GVRP-Status Registration Dynamic VLAN Timers(milliseconds)
Creation Join Leave Leave All
-------- ----------- ------------ ------------ ---- ----- --------
gi1/0/1 Disabled Normal Enabled 200 600 10000
gi1/0/2 Disabled Normal Enabled 200 600 10000
gi1/0/3 Disabled Normal Enabled 200 600 10000
gi1/0/4 Disabled Normal Enabled 200 600 10000
gi1/0/5 Disabled Normal Enabled 200 600 10000
gi1/0/6 Disabled Normal Enabled 200 600 10000
gi1/0/7 Disabled Normal Enabled 200 600 10000
gi1/0/8 Disabled Normal Enabled 200 600 10000
gi1/0/9 Disabled Normal Enabled 200 600 10000494 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Private VLAN
Private VLANs (PVLANs) provide Layer 2 isolation between ports that share
the same Broadcast domain, or in other words, they create a
point-to-multipoint Broadcast domain. The ports can be located anywhere in
the Layer 2 network, as opposed to protected ports which must be in the same
stack.
The switch ports can be members of a Private VLAN (PVLAN) in the
following membership types:
• Promiscuous ports that can communicate with all ports of the same
PVLAN, including the isolated ports of the same PVLAN.
• Isolated ports that have complete Layer 2-isolation from the other ports
within the same PVLAN, but not from the promiscuous ports. Isolated
ports can communicate with promiscuous ports.
The PVLAN entity is implemented by allocating the following VLANs per PVLAN:
• Primary VLAN: Carries traffic from promiscuous ports.
• Isolated VLAN: Carries traffic from isolated ports.Dell PowerConnect 55xx Systems User Guide 495
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To configure PVLANs:
1 Click Switching > VLAN > Private VLAN in the tree view to display the
Private VLAN: Summary page.
Figure 14-8. Private VLAN: Summary
The previously-defined private VLANs are displayed.
2 To query by Associated Primary VLAN ID, check that field, enter a VLAN
ID, and click Query. The associated VLANs are displayed.
3 To define a private VLAN, click Assign, and enter the fields:
– Private VLAN ID — Select a VLAN to be assigned.
– Private VLAN Type — Select one of the possible options:
• Primary — Traffic from promiscuous ports flow through this type
of VLAN. This is for the internet or shared servers.
• Isolated —Traffic from isolated ports flow through this type of
VLAN.496 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Associate Primary VLAN — If the Private VLAN type is Isolated,
check to associate the isolated VLAN with a primary VLAN, thus
allowing traffic between isolated and promiscuous ports.
– Primary VLAN ID — Select a VLAN to be associated with the
isolated VLAN.
4 To assign ports to the private VLAN, click Membership.
5 Select a Primary VLAN ID.
6 Select a Isolated VLAN ID.
7 Select the ports to be assigned to each VLAN, and assign each port/LAG a
port type in the Admin row of ports/LAGs. The possible options are:
– H - Host (Isolated) — Port is isolated.
– P - Promiscuous — Port is promiscuous.
– C - Conditional (operational state depends on Port VLAN Mode) —
Port receives the Port VLAN type set in the VLAN Port Settings page.
See "Port Modes" on page 469 for a description of the various port modes.
Configuring Private VLAN Using CLI Commands
The following table summarizes the CLI commands for configuring private
VLANs.
Table 14-6. Private VLAN CLI Commands
CLI Command Description
private-vlan
{primary|isolated}
no private-vlan
Configures a private VLAN.
Use the no form of this command to
return the VLAN to normal VLAN
configuration.
private-vlan association
[add|remove] secondary-vlanlist
no private-vlan association
Configures the association between the
primary VLAN and the secondary
VLANs.
Use the no form of this command to
remove the association.Dell PowerConnect 55xx Systems User Guide 497
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
switchport private-vlan
mapping primary-vlan-id
[add|remove] secondary-vlanlist
no switchport private-vlan
mapping
Configures the VLANs of the privatevlan promiscuous port.
Use the no form of this command to
reset to default
switchport private-vlan hostassociation primary-vlan-id
secondary-vlan-id
no switchport private-vlan
host-association
Configures the VLANs of the privatevlan host port.
Use the no form of this command to
reset to default.
show vlan private-vlan [tag
vlan-id]
Displays private VLAN information.
console# show vlan private-vlan
Primary Secondary Type Ports
-------- --------- ---------- ---------------------
20 Primary gi1/0/1-2
20 201 Isolated gi1/0/1-8
20 202 Isolated gi1/0/1-2 gi1/09-18
20 203 Isolated gi1/0/1-2 gi1/0/19-21
30 Primary gi1/0/22
30 301 Isolated gi1/0/22-28
30 302 Isolated gi1/0/22, gi1/0/29-38
30 303 Isolated gi1/0/22, gi1/0/39-41
Table 14-6. Private VLAN CLI Commands (Continued)
CLI Command Description498 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Voice VLAN
The Voice VLAN feature enables you to enhance VoIP service by configuring
ports to carry IP-voice traffic from IP phones on a specific VLAN. This VLAN
is configured with a QoS profile that ensures high voice quality.
Equipment, such as VOIP phones, transmits IP traffic with a pre-configured
Organizational Unique Identifier (OUI) prefix in the source MAC address.
This enables the switch to dynamically identify ports connected to the VoIP
equipment and automatically add these ports to the Voice VLAN.
IP phones use one of the following modes, both of which are supported by the
device:
• Use only tagged packets for all communications.
• Initially use untagged packets while retrieving the initial IP address
through DHCP. Then the phone uses the Voice VLAN and starts sending
tagged VoIP packets.
Non-VoIP traffic is dropped from the Voice VLAN when the device is in Auto
Voice VLAN secured mode.
The Voice VLAN feature also provides QoS actions to VoIP, ensuring that the
quality of voice does not deteriorate if the IP traffic is received unevenly.
To summarize, when Voice VLAN is enabled and configured, and VoIP
equipment is connected to one of the switch ports, the VoIP traffic triggers
the switch’s Voice VLAN feature to add this port to the Voice VLAN (a VLAN
that usually carries only voice traffic), and to assign traffic from this port a
specific QoS profile, ensuring high voice quality.
The device supports a single voice VLAN. Dell PowerConnect 55xx Systems User Guide 499
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Properties
To set voice VLAN parameters that apply to the voice VLAN on the device:
1 Click Switching > VLAN > Voice VLAN > Properties in the tree view to
display the Properties page.
Figure 14-9. Properties
2 Enter the fields:
– Voice VLAN State — Select Enable to use the Voice VLAN feature on
the device.
– Voice VLAN ID — Select the VLAN that is to be the voice VLAN.
– Class of Service — Select to add a CoS level to untagged packets,
received on the voice VLAN. The possible values are 0 to 7, where 7 is
the highest priority. 0 is used as a best-effort, and is invoked
automatically when no other value has been set.
– Remark CoS — Displays whether the Remark CoS is enabled.500 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Voice VLAN Aging Time — Enter the interval of time after which the
port exits the voice VLAN, if no voice packets are received.
The aging time starts after the MAC address is aged out from the
Dynamic MAC Address table. The default time is 300 sec. For more
information on defining MAC address age out time, see "Dynamic
Addresses" on page 427.
Defining Voice VLAN Properties Using CLI Commands
The following table summarizes the CLI command for defining voice VLAN
properties.
Table 14-7. Voice VLAN Properties CLI Commands
CLI Command Description
voice vlan enable
no voice vlan enable
Enables automatic voice VLAN
configuration for a port.
Use the no form of this command to
disable automatic voice VLAN
configuration.
voice vlan id vlan-id
no voice vlan id
Enables the voice VLAN and configures
the voice VLAN ID in Global
Configuration mode.
Use the no form of this command to
disable voice VLAN.
voice vlan cos cos-queue
[remark]
no voice vlan cos
Sets the voice VLAN Class of Service
(CoS) queue.
Use the no form of this command to
restore the default configuration.
voice vlan aging-timeout
minutes
no voice aging-timeout
Sets the voice VLAN aging timeout in
Global Configuration mode.
Use the no form of this command to
return to default.
show voice vlan
[[gigabitethernet|tengigabite
thernet] port-number|portchannel LAG-number]
Use the show voice vlan EXEC command
to display the voice VLAN status.Dell PowerConnect 55xx Systems User Guide 501
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of some of the CLI commands:
console# show
voice vlan
Aging timeout:
OUI table
1440 minutes
MAC Address -
Prefix
Description
00:E0:BB 3COM
00:03:6B Cisco
00:E0:75 Veritel
00:D0:1E Pingtel
00:01:E3 Siemens
00:60:B9 NEC/Philips
00:0F:E2 Huawei-3COM
00:09:6E Avaya
Voice VLAN VLAN
ID: 8
CoS: 6
Remark: Yes
Interface Enabled Secure Activated
--------- -------- ------ ---------
gi1/0/1 Yes Yes Yes
gi1/0/2 Yes Yes Yes
gi1/0/3 Yes Yes Yes
gi1/0/4 Yes Yes Yes502 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port Setting
To configure voice VLAN ports properties:
1 Click Switching > VLAN > Voice VLAN > Port Setting in the tree view
to display the Port Setting: Summary page.
Figure 14-10. Voice VLAN Port Setting
A list of the ports and their voice VLAN settings is displayed.
2 To modify the voice VLAN settings for an interface, click Edit, and enter
the fields:
– Interface — Enter the specific port or LAG to which the Voice VLAN
settings are applied.
– Voice VLAN Mode — Select the Voice VLAN mode. The possible
options are: Dell PowerConnect 55xx Systems User Guide 503
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• None— Disables the selected port/LAG on the Voice VLAN. This
is the default.
• Static — Statically adds the port to the Voice VLAN. This is
usually done for VoIP uplink ports that connect the device to VoIP
PBX, for example.
• Auto — Indicates that if traffic with an IP phone MAC address is
transmitted on the port/LAG, the port/LAG joins the Voice
VLAN. The port/LAG is aged out of the voice VLAN if the IP
phone’s MAC address (with an OUI prefix) is aged out. If the
MAC address of the IP phones OUI was added manually to a
port/LAG in the voice VLAN, the user cannot add it to the Voice
VLAN in Auto mode, only in Static mode.
– Voice VLAN Security — Enable/disable security on the interface.
Security ensures that packets arriving with an unrecognized OUI are
dropped (for example data packets).
Defining Voice VLAN Port Settings Using CLI Commands
The following table summarizes the CLI command for defining Voice VLAN
port settings.
Table 14-8. Voice VLAN Port Settings CLI Commands
CLI Command Description
voice vlan enable
no voice vlan enable
Enables automatic voice VLAN
configuration on a port.
Use the no form of this command to disable
automatic voice VLAN configuration on a
port.
voice vlan secure
no voice vlan secure
Configures secure mode for the voice VLAN.
Use the no form of this command to disable
secure mode.504 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
OUI
Organizationally Unique Identifiers (OUIs) are a 24-bit numbers assigned by
the Institute of Electrical and Electronics Engineers, Incorporated (IEEE)
Registration Authority to equipment manufacturers.
Up to 16 OUIs can be stored on the switch. Nine specific OUIs of popular
VoIP phones manufacturers are stored by default.
Traffic from each type of IP phone contains the OUI for the phone
manufacturer. When frames are received, in which the source MAC address’s
first three octets match one of the OUIs in the OUI list, the port on which
they are received is automatically assigned to the Voice VLAN.
console(config)# interface gi1/0/1
console(config-if)# voice vlan enable
console(config-if)# voice vlan secure
console(config-if)#Dell PowerConnect 55xx Systems User Guide 505
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To view existing OUIs, and add new OUIs:
1 Click Switching > VLAN > Voice VLAN > OUI in the tree view to
display the OUI Summary.
Figure 14-11. OUI: Summary
The previously-defined OUIs are displayed.
2 To add a new OUI, click Add, and enter the fields:
– Telephony OUI — Enter a new OUI.
– Description — Enter an OUI description up to 32 characters. 506 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining Voice VLAN OUIs Using CLI Commands
The following table summarizes the CLI command for defining Voice VLAN
OUIs.
The following is an example of the CLI commands:
Table 14-9. Voice VLAN OUIs CLI Commands
CLI Command Description
voice vlan oui-table {add
mac-address-prefix|remove
mac-address-prefix}
[text]
no voice vlan oui-table
Configures the voice OUI table.
Use the no form of this command to restore
the default configuration.
console(config)# voice vlan oui-table add 00:E0:BB
console(config)#Dell PowerConnect 55xx Systems User Guide 507
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_VLAN.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY508 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LAG.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
15
Link Aggregation
This section describes link aggregation of ports.
It contains the following topics:
• Link Aggregation Overview
• LACP Parameters
• LAG MembershipDell PowerConnect 55xx Systems User Guide 509
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LAG.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Link Aggregation Overview
Link Aggregation optimizes port usage by linking a group of ports together to
form a single LAG (aggregated group). Aggregating ports multiplies the
bandwidth between the devices, increases port flexibility, and provides link
redundancy.
The device supports the following types of LAGs:
• Static LAGs — Manually-configured LAGs.
• Link Aggregation Control Protocol (LACP) LAGs — LACP LAGs
negotiate aggregating a port’s links with other LACP ports located on a
different device. If the other device ports are also LACP ports, the devices
establishes a LAG between them.
When you aggregate ports, the ports and LAG must fulfill the following
conditions:
• All ports within a LAG must be the same media type.
• A VLAN is not configured on the port.
• The port is not assigned to another LAG.
• Auto-negotiation mode is not configured on the port.
• The port is in full-duplex mode.
• All ports in the LAG have the same ingress filtering and tagged modes.
• All ports in the LAG have the same back pressure and flow control modes.
• All ports in the LAG have the same priority.
• All ports in the LAG have the same transceiver type.
• The device supports up to 32 LAGs, and eight ports in each LAG.
• Ports can be configured as LACP ports only if the ports are not part of a
previously configured LAG.510 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LAG.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Ports added to a LAG lose their individual port configuration. When ports are
removed from the LAG, the original port configuration is applied to the ports.
The device uses a hash function to assign packets to a LAG member. The
hash function statistically load-balances the aggregated link members. The
device considers an Aggregated Link to be a single logical port.
Aggregate ports can be linked into link-aggregation port-groups. Each group
comprises ports with the same speed, set to full-duplex operations.
Ports in a LAG can contain different media types if the ports are operating at
the same speed. Aggregated links can be manually or automatically
configured by enabling LACP on the relevant links.Dell PowerConnect 55xx Systems User Guide 511
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LAG.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
LACP Parameters
To define LACP LAGs, configure LACP global and port parameters, such as
LACP system priority, timeout, and port priority.
With all factors equal, when the LAG is configured with more candidate ports
than the maximum number of active ports allowed, the switch activates the
highest priority candidate ports from the dynamic LAG.
To set LACP parameters:
1 Click Switching > Link Aggregation > LACP Parameters in the tree
view to display the LACP Parameters page.
Figure 15-1. LACP Parameters
The LACP parameters for all ports are displayed.
2 Enter the global LACP System Priority (1-65535) value that determines
which candidate ports will become members of the LAG.
The page displays the LACP settings of the ports on the selected unit.
3 To modify LACP parameters for a particular port, click Edit, and enter the
following fields:
– Port — Select the port for which timeout and priority values are
assigned.512 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LAG.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– LACP Port Priority (1-65535) — Enter the LACP priority value for
the port.
– LACP Timeout — Select the rate of periodic transmissions of LACP
PDUs. The possible options are:
• Long — Slow transmission rate
• Short — Fast transmission rate
Configuring LACP Parameters Using CLI Commands
The following table summarizes the CLI commands for configuring LACP
parameters as displayed in the LACP Parameters page.
Table 15-1. LACP Parameters CLI Commands
CLI Command Description
lacp system-priority value Configures the system priority.
lacp port-priority value Configures the priority value for
physical ports.
lacp timeout{long|short} Assigns an administrative LACP
timeout.
show lacp
[gigabitethernet|tengigabitether
net] port-number
[parameters|statistics|protocolstate]
Displays LACP information for
ethernet ports.Dell PowerConnect 55xx Systems User Guide 513
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LAG.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console (config)# lacp system-priority 120
console (config)# interface gi1/0/11
console (config-if)# lacp port-priority 247
console (config-if)# lacp timeout long
console (config-if)# end
console# show lacp gi1/0/11 statistics
Port gi1/0/11 LACP Statistics:
LACP PDUs sent:2
LACP PDUs received:2514 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LAG.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
LAG Membership
Each device supports up to 32 LAGs per system, and eight ports per LAG.
When you add a port to a LAG, the port acquires the LAG’s properties. If the
port cannot be configured with the LAG’s properties, it is not added to the
LAG and an error message is generated.
If the first port joining the LAG cannot be configured with the LAG settings,
the port is added to the LAG, using the port default settings, and an error
message is generated. Since this is the only port in the LAG, the entire LAG
operates with the port’s settings, instead of the LAG’s defined settings.
To assign ports to LAGs:
1 Click Switching Link Aggregation LAG Membership in the tree view
to display the LAG Membership: Summary page.
Figure 15-2. LAG Membership: SummaryDell PowerConnect 55xx Systems User Guide 515
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LAG.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The LACP and static LAGs on each unit are displayed along with their
member ports.
This page displays the following fields:
– LACP — Aggregates the port to a LAG, using LACP.
– LAG — Adds a port to a LAG, and indicates the specific LAG to
which the port belongs.
2 Click Edit to change the status of a port in a LAG.
3 Select the LAG.
4 In the LACP row (the first row), toggle the button under the port number
to assign either the LACP or the static LAG.
5 In the LAG row (the second row), toggle the button to a specific number
to aggregate or remove the port to that LAG number.
Adding Ports to LAGs Using CLI Commands
The following table summarizes the CLI commands for assigning ports to
LAGs as displayed in the LAG Membership pages.
The following is an example of the CLI commands:
Table 15-2. LAG Membership CLI Commands
CLI Command Description
channel-group LAG-number
mode {on|auto}
no channel-group
Associates a port with a port-channel with or
without a LACP operation.
Use the no form of this command to remove
the channel-group configuration from the
interface.
show interfaces portchannel [LAG-number]
Displays port-channel information for all port
channels or for a specific port channel.
console(config)# interface gi1/0/11
console(config-if)# channel-group 1 mode on516 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
16
Multicast
This chapter describes Multicast support on the device.
It contains the following topics:
• Multicast Support Overview
• Global Parameters
• Bridge Multicast Groups
• Bridge Multicast Forward All
• IGMP Snooping
• Unregistered Multicast
• Multicast TV VLAN
• Multicast TV VLAN MappingDell PowerConnect 55xx Systems User Guide 517
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Multicast Support Overview
Multicast forwarding enables a single packet to be forwarded to multiple
destinations. Layer 2 Multicast service is based on a Layer 2 device receiving a
single packet addressed to a specific Multicast address. Multicast forwarding
creates copies of the packet, and transmits the packets to the relevant ports.
There are two types of Multicast groups:
• Registered Multicast Group — When traffic addressed to a registered
Multicast group is received, it is handled according to its entry in the
Multicast Filtering Database and forwarded only to the registered
ports.
• Unregistered Multicast Group — If traffic addressed to an
unregistered Multicast group is received, it is handled by a special
entry in the Multicast Filtering Database. The default setting of this is
to flood all such traffic (traffic in unregistered Multicast groups).
The device supports:
• Forwarding L2 Multicast Packets — Forwards Layer 2 Multicast
packets. Layer 2 Multicast filtering is enabled by default, and is not
user-configurable.
• Filtering L2 Multicast Packets — Forwards Layer 2 packets to
interfaces. If Multicast filtering is disabled, Multicast packets are
flooded to all relevant ports.
NOTE: The system supports Multicast filtering for 256 Multicast groups.
Layer 2 Switching
Layer 2 switching forwards Multicast packets to all relevant VLAN ports by
default, managing the packet as a single Multicast transmission. While
Multicast traffic forwarding is effective, it is not optimal, as irrelevant ports
also receive the Multicast packets. The excess packets cause increased
network traffic. Multicast forwarding filters enable forwarding of Layer 2
packets to a subset of ports instead of to all ports.518 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
IGMP
Internet Group Multicast Protocol (IGMP) adds IGMP packets to Multicast
traffic. When IGMP Snooping is enabled globally, all IGMP packets are
forwarded to the CPU. The CPU analyzes the incoming packets and
determines:
• Which ports want to join which Multicast groups.
• Which ports have Multicast routers generating IGMP queries.
• What routing protocols are forwarding packets and Multicast traffic.
Ports requesting to join a specific Multicast group issue an IGMP report,
specifying that the Multicast group is accepting members. This results in the
creation of an entry in the Multicast filtering database. Dell PowerConnect 55xx Systems User Guide 519
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Global Parameters
To enable Multicast filtering and IGMP Snooping:
1 Click Switching > Multicast Support > Global Parameters in the tree
view to display the Global Parameters page.
Figure 16-1. Global Parameters
2 Enter the fields:
– Bridge Multicast Filtering — Enable/disable Multicast filtering.
Disabled is the default value.
– IGMP Snooping Status — Enable/disable IGMP Snooping on the
device. Disabled is the default value. 520 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Enabling Multicast Filtering and IGMP Snooping Using CLI Commands
The following table summarizes the CLI commands for enabling Multicast
Filtering and IGMP snooping as displayed on the Global Parameters page.
The following is an example of the CLI commands:
Table 16-1. Multicast Filtering and Snooping CLI Commands
CLI Command Description
bridge multicast filtering
no bridge multicast filtering
Enables filtering of Multicast addresses.
Use the no form of this command to
disable multicast address filtering.
ip igmp snooping
no ip igmp snooping
Enables Internet Group Membership
Protocol (IGMP) snooping.
Use the no form of this command to
disable IGMP snooping.
console(config)# bridge multicast filtering
console(config)# ip igmp snoopingDell PowerConnect 55xx Systems User Guide 521
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Bridge Multicast Groups
The Bridge Multicast Group: Summary page displays the ports and LAGs
attached to a Multicast service group and the manner in which the port or
LAG joined it.
To add and configure a Multicast group:
1 Click Switching > Multicast Support > Bridge Multicast Group in the
tree view to display the Bridge Multicast Group: Summary page.
Figure 16-2. Bridge Multicast Group: Summary
The ports and LAGs in the selected Multicast Group are displayed.522 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Select a VLAN and enter the Multicast group IP address in Bridge
Multicast Address.
Two rows of ports and LAGs are displayed: for each unit
– Static — Displays available static ports/LAGs. These port/LAGs can
be included or excluded from the Multicast groups, as described
below.
– Current — Displays status of ports/LAGs in the Multicast group, as
actually applied.
3 For each port in the VLAN, toggle to S to join the port to the selected
Multicast group as a static port. Toggle a port to F to indicate that it is
Forbidden to this group. Leave the field empty if it is not involved in the
VLAN.
4 To add a new Multicast group, click Add, and enter the fields:
– VLAN ID — Select the VLAN ID to set its forwarding method.
– New Bridge IP Multicast — Enter a Multicast group IP address.
– New Bridge MAC Multicast — Enter a Multicast group MAC
address.
– Ports — Select the ports to be added to a Multicast service. Toggle a
port to S to join the port to the selected Multicast group as a static
port. Toggle a port to F to indicate that it is Forbidden to this service.
Leave the field empty if it is not involved in the VLAN.
– LAGs — Select the LAGs to be added to a Multicast service. Toggle a
LAG to S to join the port to the selected Multicast group as a static
LAG. Toggle a port to F to indicate that it is Forbidden to this service.
Leave the field empty if it is not involved in the VLAN.
The following table describes the codes used for the interface in this page:
Table 16-2. IGMP Port/LAG Members Table Control Settings
Port Control Definition
S Attaches the port to the Multicast group as static member in the static row.
The port/LAG has joined the Multicast group statically in the current row.
F Forbidden. The port cannot belong to the Multicast group.
Blank The port is not attached to a Multicast group, but it is also not forbidden.Dell PowerConnect 55xx Systems User Guide 523
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Managing Bridge Multicast Groups Using CLI Commands
The following table summarizes the CLI commands for managing Multicast
service members as displayed in the Bridge Multicast Group pages.
The following is an example of the CLI commands:
Table 16-3. Bridge Multicast Group CLI Commands
CLI Command Description
bridge multicast address {macmulticast-address|ip-multicastaddress}
no bridge multicast filtering
Registers MAC-layer Multicast
addresses to the bridge table, and
adds static ports to the group.
Use the no form of this command to
disable Multicast address filtering.
bridge multicast forbidden
address {mac-multicastaddress|ip-multicastaddress}[add|remove]
{[gigabitethernet|tengigabitethe
rnet] interface-list|portchannel LAG-number-list}
no bridge multicast forbidden
address {mac-multicast-address}
Forbids adding a specific Multicast
address to specific ports. Use the no
form of this command to return to
default
Use the no form of this command to
restore the default configuration.
show bridge multicast addresstable [vlan vlan-id] [address
{mac-multicast-address|ipmulticast-address}] [format
ip|mac]
Displays Multicast MAC address
table information.
console(config-if)# bridge multicast address 0100.5e02.0203
add gi1/0/11,gi1/0/12
console(config-if)# end
console # show bridge multicast address-table
VLAN MAC Address Type Ports
---- ----------- ----- ----------
1 0100.5e02.0203 static gi1/0/11,
gigi1/0/12
Forbidden ports for multicast addresses:524 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
VLAN MAC Address Ports
---- ----------- ----------
1 0100.5e02.0203 gi1/0/8
19 0100.5e02.0208 gi1/0/8
console # show bridge multicast address-table format ip
VLAN IP Address Type Ports
---- ----------- ----- ----------
1 224-239.130|2.2.3 static gi1/0/11, gi1/0/12
Forbidden ports for multicast addresses:
VLAN IP Address Ports
---- ----------- ----------
1 224-239.130|2.2.3 gi1/0/8Dell PowerConnect 55xx Systems User Guide 525
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Bridge Multicast Forward All
Use the BridgeMulticast Forward All page to attach ports or LAGs to a device
that is attached to a neighboring Multicast router/switch. After IGMP
Snooping is enabled, Multicast packets are forwarded to the appropriate port
or VLAN.
To attach interfaces to a Multicast service:
1 Click Switching > Multicast Support > Bridge Multicast Forward All in
the tree view to display the Bridge Multicast Forward All page.
Figure 16-3. Bridge Multicast Forward All
2 Select a unit/VLAN and click on the ports and LAGs to be attached to the
Multicast service. Toggle a port to S to join the port to the selected
Multicast group as a static port. Toggle a port to F to add it as a Forbidden
port.
Two rows of ports and LAGs are displayed:526 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Static — Displays available static ports/LAGs. These port/LAGs can
be included or excluded from the Multicast groups, as described
below.
– Current — Displays status of ports/LAGs, as actually applied, in the
Multicast group.
Managing LAGs and Ports Attached to Multicast Routers Using CLI Commands
The following table summarizes the CLI commands for managing LAGs and
ports attached to Multicast routers as displayed on the Bridge Multicast
Forward All page.
The following is an example of the CLI commands:
Table 16-4. Managing LAGs and Ports Attached to Multicast Routers CLI Commands
CLI Command Description
show bridge multicast filtering
vlan-id
Displays the Multicast filtering
configuration.
bridge multicast forward-all
{add|remove}
{[gigabitethernet|tengigabitethe
rnet] interface-list|portchannel LAG-number-list}
Enables forwarding of all Multicast
packets on a port.
Use the no form of this command to
return to default.
console(config)# interface vlan 1
console(config-if)# bridge multicast forward-all add
gi1/0/3
console(config-if)# end
console# show bridge multicast filtering 1
Filtering: Enabled
VLAN: Forward-All
Port Static Status
------- ----------------- -----------
gi1/0/11 Forbidden Filter
gi1/0/12 Forward Forward(s)
gi1/0/13 - Forward(d)Dell PowerConnect 55xx Systems User Guide 527
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
IGMP Snooping
IGMP Snooping can be enabled globally, as described in the Global
Parameters page. It can also be enabled per VLAN to support selective IPv4
Multicast forwarding. In this case, Bridge Multicast filtering must also be
enabled.
By default, a Layer 2 switch forwards Multicast frames to all ports of the
relevant VLAN, essentially treating the frame as if it were a Broadcast. When
IGMP Snooping is enabled per VLAN, the switch forwards Multicast frames
to ports that have registered as Multicast clients in the VLAN.
NOTE: The switch supports IGMP Snooping only on static VLANs. It does not
support IGMP Snooping on dynamic VLANs.528 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The IGMP Snooping Querier is used to support a Layer 2 Multicast domain
of snooping switches in the absence of a Multicast router, for example, where
Multicast content is provided by a local server, but the router (if one exists)
on that network does not support Multicast.
There should only be a single IGMP Querier in a Layer 2 Multicast domain.
The switch supports standards-based IGMP Querier election when more than
one IGMP Querier is present in the domain.
The speed of IGMP Querier activity should be aligned with the IGMPsnooping-enabled switches. Queries should be sent at a rate that is aligned to
the snooping table aging time. If queries are sent at a rate lower than the
aging time, the subscriber cannot receive the Multicast packets.
To enable IGMP Snooping on a VLAN:
1 Click Switching Multicast Support IGMP Snooping in the tree view
to display the IGMP Snooping page.
Figure 16-4. IGMP Snooping
The IGMP snooping information for the VLANs on the switch is
displayed.
2 To enable IGMP Snooping on a VLAN, click Edit and select the VLAN
from the VLAN ID drop down menu.Dell PowerConnect 55xx Systems User Guide 529
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 Enter the fields:
• IGMP Snooping Status — Enable/disable the monitoring of network
traffic to determine which hosts have asked to be sent Multicast
traffic. The switch performs IGMP snooping only if IGMP snooping
and Bridge Multicast filtering are both globally enabled.
• Operational IGMP Snooping Status — Displays whether IGMP
Snooping is enabled.
• MRouter Ports Auto Learn — Enables or disables auto learning of the
ports to which the Mrouter is connected.
• Query Robustness (1-7) — Enter the Robustness variable value to be
used. The Robustness value enables tuning for the expected packet
loss on a link. If a link is expected to have losses, the Robustness Value
may be increased.
• Operational Query Robustness — Displays the robustness variable
sent by the elected querier.
• Query Interval (30-18000) — Enter the interval between general
queries sent by the querier .
• Operational Query Interval — The time interval in seconds between
general queries sent by the elected querier
• Query Max Response Interval (5-20) — Enter the amount of time in
which a host should respond to a query.
• Operational Query Max Response Interval — Displays the actual
delay.
• Last Member Query Counter (1-7) — Enter the number of IGMP
group-specific queries sent before the switch assumes there are no
local members. To use the default, check Use Default.
• Operational Last Member Query Counter — Displays the
operational value of the Last Member Query counter.
• Last Member Query Interval (100-25500)— Enter the time between
two consecutive group-specific queries that are sent by the querier.
• Operational Last Member Query Interval— Displays the Last
Member Query Interval sent by the elected querier.
• Intermediate Leave — Enable/disable an immediate timeout period.
The default timeout is 10 seconds.530 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• IGMP Querier Status — Enables or disables the IGMP Querier. The
IGMP Querier simulates the behavior of a Multicast router, enabling
snooping of the Layer 2 Multicast domain even though there is no
Multicast router.
• Querier Source IP Address — Select the IP address of the IGMP
Querier. Use either the VLAN’s IP address or define a unique IP
address that will be used as a source address of the querier.
• Operational Source Querier IP Address — Operational Querier IP
address.
Configuring IGMP Snooping Using CLI Commands
The following table summarizes the CLI commands for configuring IGMP
snooping on a VLAN:
Table 16-5. IGMP Snooping CLI Commands
CLI Command Description
ip igmp snooping vlan vlan-id
no ip igmp snooping vlan vlanid
Enables IGMP snooping on a specific
VLAN.
Use the no form of this command to
disable IGMP snooping on a VLAN
interface.
ip igmp snooping vlan vlan-id
mrouter learn pim-dvmrp
no ip igmp snooping vlan vlanid mrouter learn pim-dvmrp
Enables automatic learning of
Multicast router ports in the context of
a specific VLAN.
Use the no form of this command to
remove the configuration.
ip igmp robustness count
no ip igmp robustness
Changes the value of the IGMP
robustness variable.
Use the no format of the command to
return to default.
ip igmp query-interval seconds
no ip igmp query-interval
Configures the Query interval.
Use the no format of the command to
return to default.Dell PowerConnect 55xx Systems User Guide 531
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
ip igmp query-max-responsetime seconds
no ip igmp query-max-responsetime
Configures the Query Maximum
Response time.
Use the no format of the command to
return to default.
ip igmp last-member-querycount count
no ip igmp last-member-querycount
Configures the Last Member Query
Counter.
Use the no format of the command to
return to default.
ip igmp snooping vlan vlan-id
immediate-leave
no ip igmp snooping vlan vlanid immediate-leave
Enables the IGMP Snooping
Immediate-Leave processing on a
VLAN.
Use the no format of the command to
disable IGMP Snooping ImmediateLeave processing.
ip igmp snooping vlan vlan-id
querier
no ip igmp snooping vlan vlanid querier
Enables the IGMP querier on a specific
VLAN.
Use the no form of this command to
disable the IGMP querier on a VLAN
interface.
ip igmp snooping querier
address source-ip-address
no ip igmp snooping querier
address
Defines the source IP address that the
IGMP Snooping querier would use.
Use the no form of this command to
return to default.
show ip igmp snooping groups
[vlan vlan-id] [address ipmulticast-address]
Displays the Multicast groups learned
by IGMP snooping.
show ip igmp snooping
interface vlan-id
Displays IGMP snooping configuration.
show ip igmp snooping mrouter
[interface vlan-id]
Displays information about
dynamically learned Multicast router
interfaces.
Table 16-5. IGMP Snooping CLI Commands (Continued)
CLI Command Description532 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console (config)# ip igmp snooping
console (config)# interface vlan 1
console (config-if)# ip igmp snooping mrouter learn-pim-dvmrp
console (config)# interface vlan 1
console (config-if)# ip igmp snooping leave-time-out 60
console # do show ip igmp snooping groups
VLAN IP Address Querier Ports
---- ---------- ------ ----------------------
1 224-239.130 |2.2.3 Yes gi1/0/1, gi1/0/2
console # show ip igmp snooping interface 1
IGMP Snooping is globaly disabled
IGMP Snooping admin: Enabled
IGMP Snooping oper mode: Disabled
Routers IGMP version: 3
IGMP snooping querier admin: disabled
IGMP snooping querier oper: disabled
IGMP snooping querier address admin:
IGMP snooping querier address oper: 10.5.234.232
IGMP snooping robustness: admin 2 oper 2
IGMP snooping query interval: admin 125 sec oper 125 sec
IGMP snooping query maximum response: admin 10 sec oper 10 sec
IGMP snooping last member query counter: admin 2 oper 2
IGMP snooping last member query interval: admin 1000 msec oper
1000 msec
IGMP snooping last immediate leave: disable
Automatic learning of Multicast router ports is enabledDell PowerConnect 55xx Systems User Guide 533
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Unregistered Multicast
Multicast frames are generally forwarded to all ports in the VLAN. If IGMP
Snooping is enabled, the device learns about the existence of Multicast
groups and tracks which ports have joined what Multicast group.
Multicast groups can also be statically enabled. This enables the device to
forward the Multicast frames (from a registered Multicast group) only to
ports that are registered to that Multicast group.
Traffic from unregistered Multicast groups, which are the groups that are not
known to the device, can either be filtered or forwarded. After a port has been
set to Forwarding/Filtering, its configuration is valid for any VLAN of which it
is a member (or will be a member of).
To set the action for unregistered Multicast groups on a port:
1 Click Switching > Multicast Support > Unregistered Multicast in the
tree view to display the Unregistered Multicast: Summary page.
Figure 16-5. Unregistered Multicast: Summary534 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The action for each port is displayed.
2 To modify the forwarding action for an interface, click Edit, and enter the
fields.
• Interface — Select a port or LAG.
• Unregistered Multicast — Select the forwarding status of the selected
interface. The possible options are:
• Forwarding — Enables forwarding of unregistered Multicast
frames on the selected port or port-channel.
• Filtering — Enables filtering of unregistered Multicast frames on
the selected VLAN interface.
Configuring Unregistered Multicast Using CLI Commands
The following table summarizes the CLI commands for configuring
Unregistered Multicast on the device:
The following is an example of the CLI commands:
Table 16-6. Unregistered Multicast CLI Commands
CLI Command Description
bridge multicast unregistered Configures the forwarding state of
unregistered multicast addresses.
show bridge multicast unregistered Displays the unregistered multicast
filtering configuration.
console # show bridge multicast unregistered
Port Unregistered
------- --------
gi1/0/1 Forward
gi1/0/2 Filter
gi1/0/3 FilterDell PowerConnect 55xx Systems User Guide 535
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Multicast TV VLAN
This section describes the Multicast TV VLAN feature.
It contains the following sections:
• Multicast TV VLAN Overview
• Multicast TV VLAN Membership
• Multicast TV VLAN Mapping
Multicast TV VLAN Overview
The Multicast TV VLAN feature provides the ability to supply Multicast
transmissions to Layer 2-isolated subscribers, without replicating the
Multicast transmissions for all subscriber VLANs. The subscribers are the
only receivers of the Multicast transmissions.
• A Multicast TV VLAN can be defined for an Access port (a port that is
in Access mode for VLAN membership).
• All static VLANs are permitted to be a Multicast-TV VLAN.
• The configuration is performed per port.
One or more IP Multicast address groups can be associated with a Multicast
VLAN. The source port must belong to the Multicast VLAN. Source and
receiver ports do not have to be members of the same VLAN.
An end port is defined as a receiver port for the Multicast VLAN. Receiving
ports can belong to a single user VLAN and additionally to one Multicast
VLAN. The receiver port can be an access member in any VLAN, but not in
the defined Multicast VLAN. In Multicast VLAN, the receiver port can only
receive traffic and not send traffic on it. Receivers of same Multicast VLAN
are isolated in different User (Access port) VLANs and therefore isolated from
each other.
If a Multicast-TV VLAN is defined on an access port, then:
• The access port joins the Multicast-TV VLAN.
• The Multicast-TV VLAN on the receiver port is always untagged.
• The acceptable frame type of the port is set to Admit Untagged Only.536 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Multicast TV VLAN Membership
To view Multicast TV VLANs:
• Click Switching > Multicast Support > Multicast TV VLAN
Membership in the tree view to display the Multicast TV VLAN
Membership page.
Figure 16-6. Multicast TV VLAN Membership
The receiver and transceiver ports in the selected TV VLAN are displayed.
Displaying Multicast TV VLAN Membership Using CLI Commands
The following table summarizes the CLI command for displaying Multicast
TV VLAN membership:
Table 16-7. Multicast TV VLAN Membership CLI Commands
CLI Command Description
show vlan multicast-tv
vlan vlan-id
Displays information on the source ports and
receiver ports of multicast-TV VLAN.Dell PowerConnect 55xx Systems User Guide 537
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
Multicast TV VLAN Mapping
To set the Multicast Group IP address for a TV VLAN:
1 Click Switching > Multicast Support > Multicast TV VLAN Mapping
in the tree view to display the Multicast TV VLAN Mapping: Summary
page.
Figure 16-7. Multicast TV VLAN Mapping: Summary
The Multicast Group IP addresses for the selected TV VLAN are displayed.
2 To add the Multicast Group IP address for a VLAN, click Add, and enter
the fields:
• VLAN ID — Enter a VLAN ID.
console # show vlan multicast-tv vlan 1
Source Ports
-------------------------------------
gi1/0/8, gi1/0/9
Receiver Ports
-------------------------------------
gi2/0/1-18, gi3/0/1-18, gi4/0/1-18538 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Multicast Group IP Address — Enter the Multicast group IP address
for which the IGMP Snooping is enabled.
Mapping Multicast TV VLANs to IP Addresses Using CLI Commands
The following table summarizes the CLI command for mapping Multicast
TV VLANs to Multicast IP addresses:
The following is an example of the CLI commands:
Table 16-8. Unregistered Multicast CLI Commands
CLI Command Description
ip igmp snooping vlan vlan-id
multicast-tv ip-multicast-address
[count number]
no ip igmp snooping vlan vlan-id
multicast-tv ip-multicast-address
[count number]
Defines the Multicast IP
addresses that are associated
with a Multicast-TV VLAN.
Use the no form of this
command to remove all
associations.
show ip igmp snooping multicast-tv
[vlan vlan-id]
Displays the IP addresses associated with Multicast TV VLANs.
console# show ip igmp snooping multicast-tv
VLAN IP Address
---- -----------
1000 239.255.0.0
1000 239.255.0.1
1000 239.255.0.2
1000 239.255.0.3
1000 239.255.0.4
1000 239.255.0.5Dell PowerConnect 55xx Systems User Guide 539
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_Multicast.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY540 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
17
LLDP
The section describes the Link Layer Discovery Protocol (LLDP).
It contains the following topics:
• LLDP Overview
• LLDP Properties
• LLDP Port Settings
• MED Network Policy
• LLDP MED Port Settings
• Neighbors InformationDell PowerConnect 55xx Systems User Guide 541
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
LLDP Overview
The Link Layer Discovery Protocol (LLDP) enables network managers to
troubleshoot and enhance network management by discovering and
maintaining network topologies over multi-vendor environments. LLDP
discovers network neighbors by standardizing methods for network devices to
advertise themselves to other systems, and to store discovered information.
Discovery information includes:
• Device identification
• Device capabilities
• Device configuration
The advertising device transmits multiple advertisement message sets in a
single LAN packet. The multiple advertisement message sets are sent in the
packet’s Type Length Value (TLV) field.
LLDP devices must support chassis and port ID advertisements, as well as
system name, system ID, system description, and system capability
advertisements.
LLDP Media Endpoint Discovery (LLDP-MED) increases network flexibility
by enabling various IP systems to co-exist on a single network, and provides
the following features:
• Detailed network topology information, including information on which
devices are located on the network and where the devices are located, for
example, which IP phone is connect to which port, which software is
running on which switch, and which port is connected to which device.
• Automatic deployment of policies over networks for:
– QoS Policies
– Voice VLANs
• Emergency Call Service (E-911) via IP phone location information.
• Troubleshooting information. LLDP MED sends network managers alerts
for:
– Port speed and duplex mode conflicts
– QoS policy misconfigurations542 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
LLDP Properties
To enable and configure LLDP:
1 Click System > LLDP > LLDP Properties in the tree view to display the
LLDP Properties page.
Figure 17-1. LLDP Properties
The current LLDP properties are displayed.
2 Enter the fields:
– Enable LLDP — Enable/disable LLDP on the device.
– Updates Interval (5-32768) — Enter the rate at which LLDP
advertisement updates are sent.
– Hold Multiplier (2-10) — Enter the hold time to be sent in the
LLDP update packets, as a multiple of the timer value.Dell PowerConnect 55xx Systems User Guide 543
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Reinitializing Delay (1-10) — Enter the minimum time, in seconds,
that an LLDP port waits before reinitializing LLDP transmission.
– Transmit Delay (1-8192) — Enter the amount of time that passes
between successive LLDP frame transmissions, due to changes in the
LLDP local systems MIB.
To use the default values for any field, select Use Default.544 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring LLDP Using CLI Commands
The following commands are used to set the fields in the LLDP Properties
page.
Table 17-1. LLDP Properties CLI Commands
CLI Command Description
lldp run
no lldp run
Enables enable LLDP.
Use the no form of this command to
disable LLDP.
lldp timer seconds
no lldp timer
Specifies how often the software sends
LLDP updates.
Use the no form of this command to
restore the default configuration.
lldp hold-multiplier number
no lldp hold-multiplier
Specifies the time that the receiving
device should hold a Link Layer Discovery
Protocol (LLDP) packet before discarding
it.
Use the no form of this command to
restore the default configuration.
lldp reinit seconds
no lldp reinit
Specifies the minimum time an LLDP
port will wait before reinitializing.
Use the no form of this command to revert
to the default setting.
lldp tx-delay seconds
no lldp tx-delay
Specifies the delay between successive
LLDP frame transmissions.
Use the no form of this command to
restore the default configuration.Dell PowerConnect 55xx Systems User Guide 545
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# interface gi1/0/1
console(config-if)# lldp run
console(config)# lldp timer 30
console(config)# lldp hold-multiplier 3
console(config)# lldp reinit 4546 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
LLDP Port Settings
LLDP configuration of a port includes activating LLDP notification on it,
and selecting the optional TLVs that will be sent in the LLDP PDU, in
addition to the mandatory ones.
By setting these properties, it is possible to provide additional types of
information to those network devices that support the LLDP.
To configure LLDP per port:
1 Click System > LLDP > LLDP Port Settings in the tree view to display
the LLDP Port Settings: Summary page.
Figure 17-2. LLDP Port Settings: Summary
LLDP settings for all ports are displayed.
2 To modify the LLDP settings for a port, click Edit and select the port to be
configured.
3 Select the transmission type on which LLDP is to be configured in the
State field. The possible options are:
• Tx Only — Enables LLDP on transmitting LLDP packets only.
• Rx Only — Enables LLDP on receiving LLDP packets only. Dell PowerConnect 55xx Systems User Guide 547
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Tx & Rx — Enables LLDP on transmitting and receiving LLDP
packets.
• Disable — LLDP is disabled on the port.
4 Move the optional TLVs that the switch should advertise from the
Available TLV list to the Optional TLV list. The TLVs advertise the
following:
– Port Description — Information about the port, including
manufacturer, product name, and hardware/software version.
– System Name — System's assigned name (in alpha-numeric format).
This value equals the sysName object.
– System Description — Description of the network entity (in alphanumeric format). This includes the system's name and versions of the
hardware, operating system, and networking software supported by the
switch. This value equals the sysDescr object.
– System Capabilities — Primary functions of the switch, and whether
or not these functions are enabled in the switch. The capabilities are
indicated by two octets. Bits 0 through 7 indicate Other, Repeater,
Bridge, WLAN AP, Router, Telephone, DOCSIS cable device, and
station respectively. Bits 8 through 15 are reserved.
– 802.3 MAC-PHY — Duplex and bit rate capability and the current
duplex and bit rate settings of the sending device. It also advertises
whether the current settings are due to auto-negotiation or manual
configuration.
An alternative way to select the TLVs is to select the Use Default field, in
which case only mandatory TLVs are used. These are: Chassis subtype
(MAC address), Port subtype (port number), and TTL (time-to-leave).
5 Enter the Management IP Address that is advertised from the interface.
Check Use Default to use the default Management IP address.548 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring LLDP Port Settings Using CLI Commands
The following commands are used to configure LLDP on ports.
The following is an example of the CLI commands:
Table 17-2. LLDP Port Settings CLI Commands
CLI Command Description
lldp transmit
no lldp transmit
Enables transmitting LLDP on an
interface.
Use the no form of this command to stop
transmitting LLDP on an interface.
lldp receive
no lldp receive
Enables receiving LLDP on an interface.
Use the no form of this command to stop
receiving LLDP on an interface.
lldp optional-tlv tlv1 [tlv2
… tlv5]
Specifies which optional TLVs
from the basic set should be
transmitted
console(config)# interface gi1/0/1
console(config-if)# lldp transmit
console(config-if)# lldp receive
console(config-if)# lldp optional-tlv port-descDell PowerConnect 55xx Systems User Guide 549
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
MED Network Policy
An LLDP-MED network policy is a set of configuration settings that is
identified by a network policy number. Policies are loaded into LLDP-MED
TLVs, and sent to devices connected to the switch. A network policy instructs
the connected device as to how to send traffic, for example, a policy can be
created for VoIP phones that instructs them to:
• Send voice traffic on VLAN 10
• Tag voice traffic with DSCP=63
• Transmit data-traffic to the switch (from the PC connected to the switch
through the VoIP phone) without modification to traffic sent by the PC
(typically, Untagged).
For network policies to be implemented, they must be created and then
associated with ports.
Before policies are defined, the administrator must create the VLANs, and
configure memberships in the VLANs, based on the specification in the
LLDP-MED network policies. 550 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To add a MED network policy:
1 Click System > LLDP > MED Network Policy in the tree view to display
the MED Network Policy: Summary page.
Figure 17-3. MED Network Policy: Summary
Previously-defined network policies are displayed.
2 To add a network policy, click Add, and enter the fields:
– Network Policy Number — Select an available network policy
number.
– Application — Select the application (type of traffic) for which the
network policy is defined.
– VLAN ID — Enter the VLAN ID to which the traffic should be sent.
– VLAN Type —Select whether the traffic is Tagged or Untagged.Dell PowerConnect 55xx Systems User Guide 551
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– User Priority — Select the traffic priority assigned to the network
application.
– DSCP Value — Select the value to be used by neighbors to mark the
traffic sent to the switch.
Configuring MED Network Policies Using CLI Commands
The following commands are used to configure MED network policies.
The following is an example of the CLI commands:
Table 17-3. LLDP MED Network Policies CLI Commands
CLI Command Description
lldp med network-policy number
application [vlan id] [vlan-type
{tagged|untagged}] [up
priority][dscp value]
no lldp med network-policy number
Defines an LLDP MED network
policy.
Use the no form of this command
to remove an LLDP MED
network policy.
console(config)# lldp med network-policy 1 voice-signaling
vlan 1552 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
LLDP MED Port Settings
To assign MED network policies to ports:
1 Click System > LLDP > MED Port Settings in the tree view to display
the MED Port Settings: Summary page.
Figure 17-4. MED Port Settings: Summary
2 Select the unit in the stack. All ports on that unit are displayed along with
the following fields:
– LLDP MED Status — Specifies if LLDP-MED is enabled on the
selected port.
– Network Policy — Specifies whether a network policy is assigned to
the port.
– Location — Specifies whether the location is advertised.
– PoE — Specifies whether PoE is enabled on the port.
3 To modify network policies on a port, click Edit.
4 Select the port to be configured, and enter the fields for the port:
– Enable LLDP-MED — Enable/disable LLDP-MED on the port.Dell PowerConnect 55xx Systems User Guide 553
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Available TLVs — Contains a list of available TLVs that can be
advertised by the port. The possible options are:
• Network Policy — Advertises the network policy attached to the
port.
• Location — Advertises the port’s location.
• PoE-PSE — Indicates if the connected media is a PoE or PSE
(Power Sourcing Equipment) device.
Move the TLVs to be published to the Tx Optional TLVs list.
– Available Network Policy — Contains a list of network policies that
can be assigned to a port. Move the network policies to be assigned to
the port to the Network Policy list.
– Location Coordinate (16 Bytes in Hex) — Displays the device’s
location map coordinates.
– Location Civic Address (6-160 Bytes in Hex) — Displays the device’s
civic or street address location, for example 414 23rd Ave E.
– Location ECS ELIN (10-25 Bytes in Hex) — Displays the device’s
ECS ELIN location.
5 To view MED details for a port, click Details and select a port.
The following fields are displayed for the port:
– Auto-Negotiation Status — Enabled specifies that auto-negotiation is
enabled on the port; Disabled indicates that it is not.
– Advertised Capabilities — The list of port capabilities advertised for
the port.
– MAU Type — The Media Attachment Unit type. The MAU performs
physical layer functions, including digital data conversion from the
Ethernet interfaces' collision detection and bit injection into the
network, for example, 100BASE-TX full duplex mode.
– System Name — The system's assigned name (in alpha-numeric
format). This value equals the sysName object.
– System Description — A description of the network entity (in alphanumeric format). This includes the system's name and versions of the
hardware, operating system, and networking software supported by the
switch. This value equals the sysDescr object. 554 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Device ID — The device ID advertised, for example, the device MAC
address.
– Device Type — The type of device.
– LLDP MED Capabilities — The TLVs that are advertised by the
port.
– LLDP MED Device Type — Specifies whether a sender is a network
connectivity device or an endpoint device.
– Application — The following fields are displayed for each possible
application type:
• Application Type — The application type.
• Flags — The VLAN tagging status for the application type:
Tagged or Untagged.
• VLAN ID — The VLAN number for the application type.
• User Priority — The user priority for the application type.
• DSCP — The DSCP value assigned to the network policy.
– Location Type — Displays the port’s LLDP location type:
• Coordinates— Device’s location map coordinates.
• Civic Address — Device’s civic or street address location, for
example 414 23rd Ave E.
• ECS ELIN — Device’s ECS ELIN location.
– Location Address — Displays the port’s LLDP location, according to
the Location Type.Dell PowerConnect 55xx Systems User Guide 555
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring MED on Ports Using CLI Commands
The following commands are used to set the fields in the MED Port Settings
pages.
Table 17-4. LLDP Properties CLI Commands
CLI Command Description
lldp med enable [tlv … tlv4]
no lldp med enable
Enables LLDP MED on an interface.
Use the no form of this command to
disable LLDP MED on an interface.
lldp med network-policy
{add|remove} number
no lldp med network-policy
number
Attaches or removes an LLDP MED
network policy on an interface.
Use the no form of this command to
remove all the LLDP MED network
policies from the interface
lldp med location
{{coordinate data}|{civicaddress data}|{ecs-elin
data}}
no lldp med location
{coordinate|civicaddress|ecs-elin}
configure the LLDP MED for an
interface.
Use the no form of this command to
delete location information for an
interface.
show lldp med configuration
[gigabitethernet|tengigabitet
hernet] port-number
Displays the LLDP MED configuration
for all interfaces or for a specific
interface.
show lldp local
[gigabitethernet|tengigabitet
hernet] port-number
Displays the LLDP information that is
advertised from a specific port.556 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# interface gi1/0/3
console(config)# lldp med location civic-address 6162636465
console# show lldp med configuration
Fast Start Repeat Count: 4.
Network policy 1
-------------------
Application type: voiceSignaling
VLAN ID: 1 untagged
Layer 2 priority: 0
DSCP: 0
Port Capabilities Network Location PoE Notif Inventory
Policy ications
--------- -------------- ---------------- ---------- ------
gi1/0/1 Yes Yes Yes No Enabled No
gi1/0/2 Yes Yes No No Enabled NoDell PowerConnect 55xx Systems User Guide 557
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Neighbors Information
Use the Neighbors Information page to view information that was received in
LLDP advertisements from neighboring devices.
The neighbor’s information is deleted after timeout. Timeout is the
maximum interval that can pass without receiving an LLDP PDU from a
neighbor. The timeout value is computed from the neighbor’s Time to Live
TLV.
To view neighbors information:
1 Click System > LLDP > Neighbors Information in the tree view to
display the Neighbors Information page.
Figure 17-5. Neighbors Information
The following fields are displayed for each port on the device that has a
discovered neighbor:
– Port — Port number for which neighboring information is displayed 558 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Device ID — Neighboring device ID
– System Name — Name of the neighboring system
– Port ID — Neighboring port ID
– Capabilities — Neighboring device capabilities
2 Click Clear Neighbors Table to delete all the entries or select Remove to
delete a specific port entry.
3 Click the Details button of a port to display the Neighbors Information:
Details page for that port.
In addition to the fields displayed in the MED Port Settings: Details
Advertise Information page and the Green Ethernet Configuration pages,
the following fields are displayed for the neighbors of the selected port:
– Power Type — Port’s power type
– Power Source — Port’s power source
– Power Priority — Port’s power priority
– Power Value — Port’s power value, in Watts
– Hardware revision — Hardware revision
– Firmware revision — Firmware revision
– Software revision — Software revision
– Serial number — Device serial number
– Manufacturer name — Device manufacturer name
– Model name — Device model name
– Asset ID — Asset ID
Configuring LLDP Neighbors Using CLI Commands
The following commands are used to configure LLDP neighbors.
Table 17-5. LLDP Neighbors Information CLI Commands
CLI Command Description
show lldp neighbors
[gigabitethernet|tengigabite
thernet] port-number
Displays information about neighboring
devices discovered using LLDPDell PowerConnect 55xx Systems User Guide 559
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_LLDP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console# show lldp neighbors
Port Device ID Port ID System Capabili TTL
Name ties
--------- ----------------- -------- ------- ------- ----
gi2/0/17 00:75:73:71:72:55 1/e21 0 91
gi2/0/33 00:12:cf:7c:63:a0 1/e1 0 92
gi2/0/33 00:11:22:11:22:33 1/g39 0 107
gi2/0/33 00:aa:aa:aa:aa:aa 1/e37 0 106
gi2/0/41 a4:ba:db:57:7c:8d g13 O 97560 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
18
Dynamic ARP Inspection
This section describes dynamic ARP inspection.
It contains the following topics:
• Dynamic ARP Inspection Overview
• Global Settings
• Dynamic ARP Inspection List
• Dynamic ARP Inspection Entries
• VLAN Settings
• Trusted InterfacesDell PowerConnect 55xx Systems User Guide 561
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Dynamic ARP Inspection Overview
ARP Inspection eliminates man-in-the-middle attacks, where false ARP
packets are inserted into the subnet. ARP requests and responses are
inspected, and their MAC-address-to-IP-address binding is checked according
to the ARP Inspection List defined by the user (in the Dynamic ARP
Inspection List and Dynamic ARP Inspection Entries pages). If the packet’s IP
address was not found in the ARP Inspection List, and DHCP Snooping is
enabled for a VLAN, a search of the DHCP Snooping database is performed.
See "How DHCP Snooping Works" on page 573 for an explanation of the
DHCP Snooping database. If the IP address is found the packet is valid, and is
forwarded.
Packets with invalid ARP Inspection bindings are logged and dropped.
Ports are classified as follows:
• Trusted — Packets are not inspected.
• Untrusted —Packets are inspected as described above.
The following additional validation checks may be configured by the user:
• Source MAC — Compares the packet’s source MAC address in the
Ethernet header against the sender’s MAC address in the ARP request.
This check is performed on both ARP requests and responses.
• Destination MAC — Compares the packet’s destination MAC address in
the Ethernet header against the destination interface’s MAC address. This
check is performed for ARP responses.
• IP Addresses — Compares the ARP body for invalid and unexpected IP
addresses. Addresses include 0.0.0.0, 255.255.255.255, and all IP Multicast
addresses. 562 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Global Settings
To enable ARP inspection on the device:
1 Click Switching > Dynamic ARP Inspection > Global Settings in the
tree view to display the Global Settings page.
Figure 18-1. Global Settings
2 Enter the fields:
• Enable ARP Inspection — Enable/disable ARP inspection.
• ARP Inspection Validate — Enable/disable the following checking
source MAC address, destination MAC address and IP addresses
against the respective addresses in the ARP body.
• Minimal Syslog Interval (0 – 86400) — Enter the minimum time
interval between successive ARP SYSLOG messages. Dell PowerConnect 55xx Systems User Guide 563
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Setting Dynamic ARP Inspection Global Settings Using CLI Commands
The following table summarizes the CLI commands for configuring the fields
in the Global Settings pages.
The following is an example of some of the CLI commands:
Table 18-1. ARP Inspection Global Settings CLI Commands
CLI Command Description
ip arp inspection
no ip arp inspection
Enables ARP inspection.
Use the no form of this command to
disable ARP inspection.
ip arp inspection validate
no ip arp inspection
validate
Performs specific checks for dynamic ARP
inspection.
Use the no form of this command to
restore the default configuration.
ip arp inspection logging
interval {seconds |
infinite}
no ip arp inspection logging
interval
Sets the minimum time interval between
successive ARP SYSLOG messages.
Use the no form of this command to
restore the default configuration.
console(config)# ip arp inspection
console(config)# ip arp inspection validate564 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Dynamic ARP Inspection List
An ARP inspection list consists of entries where each entry is a pair of
MAC/IP addresses.
To create a new ARP inspection list and add the first entry to it:
1 Click Switching > Dynamic ARP Inspection > Dynamic ARP
Inspection List in the tree view to display the Dynamic ARP Inspection
List: Summary page.
Figure 18-2. Dynamic ARP Inspection List: Summary
The dynamic ARP lists are displayed.
2 To create a new list and enter the first address pair in it, click Add, and
enter the fields:
• List Name — Create and enter a list name.
• IP Address — Enter the IP address that will be mapped to the MAC
address entered below.
• MAC Address — Enter the MAC address that will be mapped to the
IP address entered above.Dell PowerConnect 55xx Systems User Guide 565
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Creating a Dynamic ARP Inspection List Using CLI Commands
The following table summarizes the CLI commands for configuring the fields
in the Dynamic ARP Inspection List pages.
The following is an example of some of the CLI commands:
Table 18-2. Dynamic ARP Inspection List CLI Commands
CLI Command Description
ip arp inspection list
create name
no ip arp inspection list
create name
Creates a static ARP binding list and
enters the ARP list configuration mode.
Use the no form of this command to
delete the list.
console(config)# ip arp inspection list create servers
console(config-ARP-list)#566 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Dynamic ARP Inspection Entries
To add additional addresses to the lists defined in the Dynamic ARP
Inspection List page:
1 Click Switching > Dynamic ARP Inspection Entries > Dynamic ARP
Inspection Entries in the tree view to display the Dynamic ARP
Inspection Entries: Summary page.
Figure 18-3. Dynamic ARP Inspection Entries: Summary
The dynamic ARP entries for the selected list are displayed.
2 To add a new address pair to a list, click Add and select the list.
3 Enter the fields:
• IP Address — Enter the IP address that will be mapped to the MAC
address entered below.
• MAC Address — Enter the MAC address that will be mapped to the
IP address entered above.Dell PowerConnect 55xx Systems User Guide 567
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Adding Entries to a Dynamic ARP Inspection List Using CLI Commands
The following table summarizes the CLI commands for configuring the fields
in the Dynamic ARP Inspection Entries pages.
The following is an example of some of the CLI commands:
Table 18-3. Dynamic ARP Inspection List Entries CLI Commands
CLI Command Description
ip ip-address mac-address
mac-address
no ip ip-address mac-address
mac-address
Creates a static ARP binding.
Use the no form of this command to
delete a static ARP binding..
show ip arp inspection list Displays the static ARP binding list.
console(config)# ip arp inspection list create servers
console(config-arp-list)# ip 172.16.1.1 mac-address
0060.704c.7321
console(config-arp-list)# ip 172.16.1.2 mac-address
0060.704c.7322
console(config-arp-list)# do show ip arp inspection list
List name: servers
Assigned to VLANs:
IP MAC
--------------- ------------------
172.16.1.1 00:60:70:4c:73:21
172.16.1.2 00:60:70:4c:73:22
console(config-arp-list)#568 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
VLAN Settings
To assign a list of IP/MAC address pairs, defined in the Dynamic ARP
Inspection List pages, to a VLAN:
1 Click Switching > Dynamic ARP Inspection Entries > VLAN Settings in
the tree view to display the VLAN Settings: Summary page.
Figure 18-4. VLAN Settings: Summary
The VLANs and their associated lists of IP/MAC address pairs are
displayed.
2 To designate a VLAN to be associated with an ARP inspection list, click
Add VLAN and enter the VLAN ID.
3 Click Assign and select the List Name to be associated with the VLAN.Dell PowerConnect 55xx Systems User Guide 569
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Assigning IP/MAC Address Pairs to VLANs Using CLI Commands
The following table summarizes the CLI commands for configuring the fields
in the VLAN Settings pages.
The following is an example of some of the CLI commands:
Table 18-4. Assigning IP/MAC Address Pairs to VLANs CLI Commands
CLI Command Description
ip arp inspection vlan vlanid
Enables ARP inspection on a VLAN, based
on the DHCP Snooping database.
Use the no form of this command to
disable ARP inspection on a VLAN.
ip arp inspection list
assign vlan-id name
no ip arp inspection list
assign vlan
Assigns a static ARP binding list to a
VLAN.
Use the no form of this command to
delete the assignment.
console(config)# ip arp inspection list assign 37 servers570 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Trusted Interfaces
Interfaces are untrusted if the packet is received from an interface outside the
network or from an interface beyond the network firewall. Trusted interfaces
receive packets only from within the network or the network firewall.
To configure an interface to be trusted:
1 Click Switching Dynamic ARP Inspection Trusted Interface in the
tree view to display the Trusted Interface: Summary page.
Figure 18-5. Trusted Interface: Summary
The ports on the selected unit and their trusted status are displayed.
2 To modify the status of an interface, click Edit.
3 Select the interface and enable/disable its Trust Status, which is the
DHCP Snooping Trust mode.Dell PowerConnect 55xx Systems User Guide 571
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_ARP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring Trusted Interfaces Using CLI Commands
The following table summarizes the CLI commands for configuring the fields
in the Trusted Interface pages.
The following is an example of some of the CLI commands:
Table 18-5. Configuring Trusted Interface Parameters CLI Commands
CLI Command Description
ip arp inspection trust
no ip arp inspection trust
Configures an interface trust state that
determines if incoming ARP packets are
inspected.
Use the no form of this command to
restore the default configuration.
show ip arp inspection
[[gigabitethernet|tengigabit
ethernet] port-number|portchannel LAG-number]
Displays the ARP inspection configuration
for all interfaces or a specific interface.
console(config)# interface gi1/0/3
console(config-if)# ip arp inspection trust572 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
19
DHCP Snooping
This section describes DHCP Snooping and DHCP Relay features.
It contains the following topics:
• DHCP Snooping
• DHCP RelayDell PowerConnect 55xx Systems User Guide 573
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
DHCP Snooping
This section describes DHCP snooping.
It contains the following topics:
• DHCP Snooping Overview
• Global Parameters
• VLAN Settings
• Trusted Interfaces
• Snooping Binding Database
DHCP Snooping Overview
DHCP snooping expands network security by providing layer security
between untrusted interfaces and DHCP servers. By enabling DHCP
snooping, network administrators can differentiate between trusted interfaces
connected to end-users or DHCP Servers, and untrusted interfaces located
beyond the network firewall.
How DHCP Snooping Works
DHCP snooping filters untrusted messages, and stores these messages in a
database. Interfaces are untrusted if the packet is received from an interface
outside the network, or from an interface beyond the network firewall.
Trusted interfaces receive packets only from within the network or the
network firewall.
The DHCP Snooping Binding database contains the untrusted interfaces’
MAC address, IP address, Lease Time, VLAN ID, and interface information.
Table 19-1 describes how DHCP packets are handled when DHCP snooping
is enabled on an interface.
Table 19-1. DHCP Packet Handling when DHCP Snooping is Enabled
Packet Type Arriving from Untrusted
Ingress Interface
Arriving from Trusted
Ingress Interface
DHCPDISCOVER Forward to trusted
interfaces only.
Forwarded to trusted
interfaces only.574 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
DHCPOFFER Filter. Forward the packet
according to DHCP
information. If the
destination address is
unknown the packet is
filtered.
DHCPREQUEST Forward to trusted
interfaces only.
Forward to trusted
interfaces only.
DHCPACK Filter. Same as DHCPOFFER
and an entry is added to
the Binding database.
DHCPNAK Filter. Same as DHCPOFFER.
Remove entry if exists.
DHCPDECLINE Check if there is
information in the
database. If the
information exists and
does not match the
interface on which the
message was received, the
packet is filtered.
Otherwise the packet is
forwarded to trusted
interfaces only, and the
entry is removed from
database.
Forward to trusted
interfaces only
DHCPRELEASE Same as
DHCPDECLINE.
Same as
DHCPDECLINE.
DHCPINFORM Forward to trusted
interfaces only.
Forward to trusted
interfaces only.
DHCPLEASEQUERY Filtered. Forward.
Table 19-1. DHCP Packet Handling when DHCP Snooping is Enabled (Continued)
Packet Type Arriving from Untrusted
Ingress Interface
Arriving from Trusted
Ingress InterfaceDell PowerConnect 55xx Systems User Guide 575
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
As shown in Table 19-1, the DHCP Snooping Binding database is updated by
interception of DHCPACK, DHCPDECLINE and DHCPRELEASE packets,
and is stored in non-volatile memory.
Even if a port is down, its entries are not deleted.
NOTE: Only DHCP requests on untrusted ports are maintained in the Binding
database.
Limitations
The following limitations apply:
• Enabling DHCP snooping uses TCAM resources.
• The switch writes changes to the binding database only when the switch
system clock is synchronized with SNTP.
• The switch does not update the Binding database when a station moves to
another interface.
Global Parameters
Use the Global Parameters page to:
• Enable/disable DHCP snooping globally.
• Determine whether to forward or filter DHCP packets received from
untrusted interfaces, whose source MAC address and the DHCP client
MAC address do not match.
• Determine whether to forward or filter DHCP packets, received from
untrusted interfaces, with option-82 information.
• Set Binding database update interval.576 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To configure DHCP snooping on the device:
1 Click Switching > DHCP Snooping > Global Parameters in the tree view
to display the Global Parameters page.
Figure 19-1. Global Parameters
2 Enable/disable DHCP snooping on the device in the DHCP Snooping
Status field.
3 If DHCP snooping is enabled, enter the fields:
– Option 82 Passthrough — Enable/disable whether to forward (enable)
or filter (disable) DHCP packets, received from untrusted interfaces,
with option-82 information.
– Verify MAC Address — Enable/disable MAC addresses verification.
This determines whether to forward (enable) or filter (disable) DHCP
packets received from untrusted interfaces, whose source MAC
address and the DHCP client MAC address do not match.
– Save Binding Database to File — Enable/disable saving the DHCP
snooping database to flash memory.
– Save Binding Database Internal(600-86400) — Enter how often, in
seconds, the Binding database is updated.
Configuring DHCP Snooping Global Parameters Using CLI CommandsDell PowerConnect 55xx Systems User Guide 577
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following table summarizes the CLI commands for configuring DHCP
snooping global parameters.
Table 19-2. DHCP Snooping Global Parameters CLI Commands
CLI Command Description
ip dhcp snooping
no ip dhcp snooping
Globally enables DHCP snooping.
Use the no form of this command to
return to the default setting.
ip dhcp snooping information
option allowed-untrusted
no ip dhcp snooping information
option allowed-untrusted
Allows a device to accept DHCP
packets with option-82 information
from an untrusted port.
Use the no form of this command to
return to the default setting.
ip dhcp snooping verify
no ip dhcp snooping verify
Configures the switch to verify on an
untrusted port that the source MAC
address in a DHCP packet matches the
client hardware address.
Use the no form of this command to
configure the switch to not verify the
MAC addresses.
ip dhcp snooping database
no ip dhcp snooping database
Configures the DHCP snooping
binding file.
Use the no form of this command to
delete the binding file.
ip dhcp snooping database
update-freq seconds
no ip dhcp snooping database
update-freq
Configures the update frequency of
the DHCP snooping binding file.
Use the no form of this command to
return to default.
show ip dhcp snooping
[[gigabitethernet|tengigabiteth
ernet] port-number|port-channel
LAG-number]
Displays the DHCP snooping
configuration.578 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of some of the CLI commands:
console(config)# ip dhcp snooping
console(config)# ip dhcp snooping information option
allowed-untrusted
console(config)# ip dhcp snooping verify
console(config)# ip dhcp snooping database
console(config)# ip dhcp snooping database frequency 1200
console# show ip dhcp snooping
DHCP snooping is enabled
DHCP snooping database: enabled
Option 82 on untrusted port is allowed
Verification of hwaddr field is enabled
DHCP snooping file update frequency is configured to: 1200
seconds
Interface Trusted
--------- ----------
gi2/0/1 yes
gi2/0/2 yesDell PowerConnect 55xx Systems User Guide 579
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
VLAN Settings
To separate ports in a VLAN, enable DHCP snooping on it.
Before you enable DHCP snooping on a VLAN, you must globally enable
DHCP snooping on the device.
When DHCP snooping is disabled for a VLAN, the Binding entries that were
collected for that VLAN are removed from the Binding database.
To enable/disable DHCP snooping on a VLAN:
1 Click Switching > DHCP Snooping > VLAN Settings in the tree view to
display the VLAN Settings page.
Figure 19-2. VLAN Settings
The list of existing VLANs are displayed in the VLAN ID list.
2 Click Add to move the VLANs, for which you want to enable DHCP
snooping, from the VLAN ID list to the Enabled VLANs list. To remove a
VLAN, click Remove to move it from the Enabled VLANs list to the
VLAN ID list.580 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring DHCP Snooping on VLANs Using CLI Commands
The following table summarizes the CLI commands for configuring DHCP
snooping on VLANs .
The following is an example of some of the CLI commands:
Table 19-3. DHCP Snooping on VLANs CLI Commands
CLI Command Description
ip dhcp snooping vlan vlan-id
no ip dhcp snooping vlan-id
Enables DHCP snooping on a VLAN.
Use the no form of this command to
disable DHCP snooping on a VLAN.
console(config)# ip dhcp snooping vlan 1Dell PowerConnect 55xx Systems User Guide 581
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Trusted Interfaces
To define a trusted interface:
1 Click Switching > DHCP Snooping > Trusted Interface in the tree view
to display the Trusted Interface: Summary page.
Figure 19-3. Trusted Interfaces: Summary
A list of the interfaces is displayed.
2 To change the trust status of an interface, click Edit, and enter the fields:
– Interface — Select a unit and port or LAG.
– Trust Status — Enable/disable DHCP Snooping Trust mode on the
selected port or LAG. 582 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring DHCP Snooping Trusted Interfaces Using CLI Commands
The following table summarizes the CLI commands for configuring DHCP
snooping trusted interfaces.
The following is an example of some of the CLI commands:
Snooping Binding Database
Entries in the DHCP Snooping Binding database consist of pairs of MAC/IP
addresses.
In addition to the entries added by DHCP snooping, entries to the Snooping
Binding database can be manually added or deleted. These entries are added
to the Snooping Binding database and Snooping Binding file, if it exists, but
they are not added to the configuration files.
A manually-added entry can be either dynamic or a static. When configuring
a dynamic entry, an expiration date must be assigned.
The refresh time (in seconds) of the binding table is added in the Global
Parameters pages.
Table 19-4. DHCP Snooping Trusted Interfaces CLI Commands
CLI Command Description
ip dhcp snooping trust
no ip dhcp snooping
trust
Configures an interface as trusted for DHCP
snooping purposes.
Use the no form of this command to return to the
default setting.
console(config)# interface gi1/0/5
console(config-if)# ip dhcp snooping trustDell PowerConnect 55xx Systems User Guide 583
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To query and add IP addresses to the Binding database:
1 Click Switching > DHCP Snooping > Binding Database in the tree view
to display the Binding Database: Summary page.
Figure 19-4. Binding Database
A list of the database entries is displayed.
2 To query the database, enter query criteria and click Query. Database
entries matching the query are displayed.
3 To add a entry, click Add, and enter the fields:
– Type — Select the entry type. The possible options are:
• Static —IP address was statically configured.
• Dynamic —IP address was dynamically configured.
– MAC Address — Enter the MAC address to be recorded in the entry. 584 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– VLAN ID — Select the VLAN ID to which the IP address is
associated in the entry.
– IP Address — Enter the IP address to be recorded in the entry.
– Interface — Select the unit and port or LAG to be recorded in the
entry.
– Lease Time — If the entry is dynamic, enter the amount of time that
the entry will be active in the DHCP Database. If there is no Lease
Time, check Infinite.
Configuring DHCP Snooping Binding Database Using CLI Commands
The following table summarizes the CLI commands for configuring the
DHCP Snooping Binding database.
Table 19-5. DHCP Snooping Binding Database CLI Commands
CLI Command Description
ip dhcp snooping database
no ip dhcp snooping database
Enables the DHCP Snooping
binding database file.
Use the no form of this command
to delete the DHCP Snooping
binding database file.
ip dhcp snooping database updatefreq seconds
no ip dhcp snooping database
update-freq
Enables the DHCP Snooping
binding database file.
Use the no form of this command
to delete the DHCP Snooping
binding database file.
ip dhcp snooping binding macaddress vlan-id ip-address
[gigabitethernet|tengigabitethern
et] port-number|port-channel LAGnumber] expiry {seconds|infinite}
no ip dhcp snooping binding macaddress vlan-id
Configures the DHCP snooping
binding database and adds
binding entries to the database.
Use the no form of this command
to delete entries from the binding
database.
clear ip dhcp snooping database Clears the DHCP binding
database.Dell PowerConnect 55xx Systems User Guide 585
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of some of the CLI commands:
show ip dhcp snooping binding
[mac-address mac-address] [ipaddress ip-address] [vlan vlanid][[gigabitethernet|tengigabitet
hernet] port-number|port-channel
LAG-number]]
Displays the DHCP snooping
binding database and
configuration information for all
interfaces or some interfaces on a
switch.
console(config)# ip dhcp snooping database
console(config)# ip dhcp snooping update-freq 3600
console# show ip dhcp snooping binding
Update frequency: 3600
Total number of binding: 2
MAC Address IP Address Lease
(sec)
Type VLAN Interface
----------- ---------- ------ -------- ----- ----------
0060.704C.73FF 10.1.8.1 7983 snooping 3 gi1/0/21
0060.704C.7BC1 10.1.8.2 92332 snooping (s)3 gi1/0/22
Table 19-5. DHCP Snooping Binding Database CLI Commands (Continued)
CLI Command Description586 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
DHCP Relay
This section describes DHCP relay.
It contains the following topics:
• DHCP Relay Overview
• Option 82
• Global Settings
• Interface Settings
DHCP Relay Overview
The device can act as a DHCP Relay agent that listens for DHCP messages,
and relays them between DHCP servers and clients, which reside in different
VLANs or IP subnets.
This functionality is intended to be used when the client ingress VLAN is
different than the VLAN on which DHCP servers are connected.
The switch can relay DHCP messages received from its IPv4 interfaces to one
or more configured DHCP servers. The switch puts the IPv4 address into the
message giaddr before relaying it to the servers. It uses the switch’s IPv4
address of the interface where the message is received. The switch uses the
giaddr from the response to determine how to forward the response back to
the DHCP client.
DHCP Relay must be enabled globally and per VLAN. Dell PowerConnect 55xx Systems User Guide 587
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Option 82 Overview
The relay agent information option (Option 82) in the DHCP protocol
enables a DHCP relay agent to send additional client information when
requesting an IP address. Option 82 specifies the relaying switch's MAC
address, the port identifier, and the VLAN that forwarded the packet.
Both DHCP snooping and DHCP relay can insert option 82 into traversing
packets.
DHCP snooping with option 82 insertion provides transparent Layer 2 relay
agent functionality when the DHCP server is on the same VLAN as the
clients.
Limitations
The following limitations exist for DHCP Relay:
• It is not supported on IPv6.
• It is not relayed to servers on the client’s VLAN.
• Packets that have option-82 information, added by other devices, are
discarded.
• It does not support Option 82 on non-VLAN interfaces.
• It can be enabled only on a VLAN/Port/LAG that has an IP address defined
on it.588 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Option 82
To enable Option82 insertion:
1 Click Switching > DHCP Relay > Option 82 in the tree view to display
the Option 82 page.
Figure 19-5. Option 82
2 Enable/disable Option 82 insertion.Dell PowerConnect 55xx Systems User Guide 589
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring Option 82 Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed in the Option 82 page.
The following is an example of the CLI command:
Global Settings
To set the DHCP Relay global settings:
1 Click Switching > DHCP Relay > Global Settings in the tree view to
display the Global Settings: Summary page.
Figure 19-6. Global Settings: Summary
The currently-define DHCP servers are displayed.
2 Enable/disable DHCP relay.
Table 19-6. CLI Option 82 Commands
CLI Command Description
ip dhcp information option
no ip dhcp information option
Enables DHCP option-82 data insertion.
Use the no form of this command to
disable DHCP option-82 data insertion.
console(config)# ip dhcp information option590 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 To add a DHCP server, click Add.
4 Enter the IP address of the DHCP server in the DHCP Server IP Address
field.
Defining Global Parameters Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed in the Global Settings pages.
The following is an example of the CLI commands:
Table 19-7. Global Parameters CLI Commands
CLI Command Description
ip dhcp relay enable
no ip dhcp relay enable
Enables DHCP relay features on the
device.
Use the no form of this command to
disable the DHCP relay agent.
ip dhcp relay address ipaddress
no ip dhcp relay address [ipaddress]
Defines the DHCP servers available for
the DHCP relay.
Use the no form of this command to
remove servers from the list.
show ip dhcp relay Displays the server addresses on the
DHCP relay.
console(config-if)# ip dhcp relay enable
console(config)# ip dhcp relay address 176.16.1.1
console(config)# do show ip dhcp relay
DHCP relay is Enabled
Option 82 is Disabled
Maximum number of supported VLANs without IP Address is 0
DHCP relay is not configured on any port.
DHCP relay is not configured on any VLAN.
Servers: 176.16.1.1
console(config)#Dell PowerConnect 55xx Systems User Guide 591
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Interface Settings
. NOTE: For DHCP Relay to function on an interface, it also must be activated
globally in the Global Settings page.
To enable DHCP relay on a port, LAG, or VLAN:
1 Click Switching > DHCP Relay > Interface Settings in the tree view to
display the Interface Settings: Summary page.
Figure 19-7. Interface Settings: Summary
The currently-define DHCP interfaces are displayed.
2 To enable DHCP relay on an interface, click Add.
3 Select the interface.592 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining Interface Settings Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed in the Interface Settings pages.
The following is an example of the CLI commands that enable DHCP Relay
on VLAN 2, assign it an IP address and show the DHCP Relay status:
Interface Settings Parameters CLI Commands
CLI Command Description
ip dhcp relay enable
no ip dhcp relay enable
Enables the DHCP relay features on the
interface (in Interface Configuration
mode).
Use the no form of this command to
disable the DHCP relay agent feature on
the interface.
ip dhcp relay address ipaddress
no ip dhcp relay address
Defines a DHCP servers available for
DHCP relay.
Use the no form of this command to
remove servers from the list.
console(config)# interface vlan 2
console(config-if)# ip dhcp relay enable
console(config)# ip dhcp relay address 176.16.1.1
console> show ip dhcp relay
DHCP relay is Enabled
Option 82 is Disabled
Maximum number of supported VLANs without IP Address is 0
DHCP relay is not configured on any port.
DHCP relay is not configured on any vlan.
No servers configuredDell PowerConnect 55xx Systems User Guide 593
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_DHCP.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY594 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
20
iSCSI Optimization
This section describes iSCSI optimization.
It contains the following topics:
• Optimizing iSCSI Overview
• Global Parameters
• iSCSI Targets
• iSCSI Sessions
• Configuring iSCSI Using CLIDell PowerConnect 55xx Systems User Guide 595
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Optimizing iSCSI Overview
The Internet Small Computer System Interface (iSCSI) is an IP-based
storage networking standard for linking data storage facilities. By carrying
SCSI commands over IP networks, iSCSI is used to facilitate data transfers
over intranets, and to manage storage over long distances.
iSCSI can be used to transmit data over local area networks (LANs), wide area
networks (WANs), or the Internet, and can enable location-independent data
storage and retrieval.
Unlike traditional Fiber channels, which requires special-purpose cabling,
iSCSI can be run over long distances, using existing network infrastructure.
The protocol enables clients (called initiators) to send SCSI commands
(CDBs) to SCSI storage devices (targets) on remote servers. This enables
organizations to consolidate storage into data center storage arrays, while
providing hosts (such as database and web servers) with the illusion of
locally-attached disks.
The targets listen on a well-known TCP port (or any other TCP port that has
been explicitly specified) for incoming connections. The login process is
started when the initiator establishes a TCP connection to the desired target,
through the TCP port that was explicitly specified.
The group of iSCSI TCP connections that link an initiator with a target is
called an iSCSI session.
When you connect an EqualLogic device to the switch, and iSCSI
optimization is enabled, the switch automatically recognizes the port to
which the EqualLogic equipment is connected to, and configures the STP
Mode to RSTP to support fast network convergence.
Optimizing iSCSI
iSCSI optimization provides the following features:
• Ability to assign a specific QoS profile to the iSCSI flows
• Display of iSCSI session details (connections, initiator, target, and so on)
• Identification of (self-discovered) iSCSI sessions
• Identification of iSCSI session termination
• Identification of non-active iSCSI sessions596 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Limitations
The following limitations exist:
• All iSCSI connections receive the relevant QoS, regardless of whether they
are being monitored or not. If, for example, a feature was disabled for some
period and was enabled again, it is possible that there are iSCSI TCP
connections that were established during this period of time. These cannot
be monitored, because all relevant information was already passed at the
beginning of the session. But these unidentified sessions will still be
assigned to iSCSI QoS.
• The maximum number of iSCSI TCP connections, which is also the
default setting, is 1K. This can be changed after reset.
• The number of iSCSI connections affects other system features.
iSCSI-aware, DHCP Snooping, and ACL rules all use the TCAM system
resource. If the number of iSCSI connections has been increased, the
other application rules (DHCP Snooping or ACL) can be removed after
reset.
• If the target uses redirect messages upon the initiator request, and, as a
result, the initiator opens a connection to a different target, the new target
must be configured as part of the general configuration.
• Only iSCSI flows to targets that use the iSCSI well-known port or other
explicit user-defined configuration are assigned QoS.
• The aging configuration works for each connection. The mechanism
checks connection activities in a group of 28 TCP iSCSI connections,
within the aging time. In the worst case, when the maximum number of
1K TCP connections are monitored and are not terminated gracefully, the
mechanism causes inaccuracy, namely, the last 28 TCP iSCSI connections
are aged out after (1K/28)*aging-time.
• In general, the greater the number of ungracefully terminated iSCSI TCP
connections, the greater the inaccuracy is. Not all iSCSI TCP connections
are monitored for aging at the same time. Sessions, whose associated TCP
connections are not being currently monitored, will show unchanged aging
time.
• Encryption (Ipsec) must not be applied on iSCSI traffic, otherwise a QoS
profile will not be assigned to iSCSI.
• iSCSI optimization does not work with IP fragmented frames.Dell PowerConnect 55xx Systems User Guide 597
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Each session supports at most four TCP connections. If a new TCP
connection of an already opened iSCSI session arrives, and there are
already four TCP connections, the new connection replaces the oldest one,
within this specific iSCSI session.
• A short flow interruption, caused by STP topology change or
administrative port-down action, might cause the TCP connection to
reinitiate without closing the iSCSI session. If the actual iSCSI session
used only one TCP connection, the reinitiated one will be added to the
monitoring table, for an aging-time period. After that, it is removed from
the list.598 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Global Parameters
Use the Global Parameters page to enable iSCSI and to set iSCSI QoS frame
priority. You may also enable Remark to change the DSCP or CoS user
priority field in the packet. In the QoS Properties pages, you can then set the
queuing to strict priority or WRR, and map the CoS or DSCP to the desired
queue in the CoS to Queue or DSCP to Queue pages.
To enable iSCSI and set its QoS parameters:
1 Click System > iSCSI Optimization > Global Parameters in the tree
view to display the Global Parameters page.
Figure 20-1. Global Parameters
2 Enter the fields:
– iSCSI Status — Enable/disable iSCSI optimization.
– iSCSI COS Status — Enable/disable the Class of Service profile to
apply to iSCSI flows.
– Classification — Select whether the priority of iSCSI packets is
determined by CoS or DSCP. Check the classification, and select the
desired value.
– Remark — Enable/disable whether iSCSI frames will be remarked
with the CoS or DSCP value.Dell PowerConnect 55xx Systems User Guide 599
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– iSCSI Aging Time — Enter how long the device will wait, after the
last received frame of an iSCSI session, before deleting the session
from the list.
Enabling iSCSI automatically enables Jumbo frames and enables Flow
Control on all interfaces. Jumbo frames are only enabled after copying the
Running configuration to the Startup configuration and resetting the device
(the Flow Control changes are effective immediately).
Defining iSCSI Global Parameters Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed in the iSCSI Global Parameters pages.
Table 20-1. iSCSI Global Parameters CLI Commands
CLI Command Description
iscsi enable
no iscsi enable
Enables iSCSI awareness.
Use the no form of the command to
disable iSCSI awareness.
iscsi cos {vpt vpt|dscp dscp}
[remark]
no iscsi cos
Sets the quality of service profile that will
be applied to iSCSI flows.
Use the no form of the command to
return to default.
iscsi aging time minutes
no iscsi aging time
Sets the aging time for iSCSI sessions.
Use the no form of the command to
cancel aging.
show iscsi Displays iSCSI settings.600 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# iscsi enable
console(config)# iscsi cos dscp 31
console(config)# iscsi aging time 10
console# show iscsi
Target: iqn.1993-11.com.disk-vendor:diskarrays.sn.45678
--------------------------------------------------------
Session 1:
---------
Initiator: iqn.1992-04.com.os-vendor.plan9:cdrom.12.
storage:sys1.xyz
Time started: 23-Jul-2002 10:04:50
Time for aging out: 10 min
ISID: 11
Initiator Initiator Target Target
IP Address TCP Port IP Address IP port
---------- --------- ---------- -------
172.16.1.3 49154 172.16.1.20 30001 Dell PowerConnect 55xx Systems User Guide 601
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
iSCSI Targets
To add an iSCSI target:
1 Click System > iSCSI Optimization > iSCSI Targets in the tree view to
display the iSCSI Targets: Summary page.
Figure 20-2. iSCSI Targets: Summary
The currently-defined targets are displayed.
2 To add a new target, click Add.
3 Enter the fields:
– TCP Port — TCP port used by the target for iSCSI communications.
– IP Address — IP address of the target. The IP address 0.0.0.0 is any IP
address.
– Target Name (0-223 characters) — Name of the target.602 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining iSCSI Targets Using CLI Commands
The following table summarizes the CLI commands for defining fields
displayed in the iSCSI Targets Table.
The following is an example of the CLI commands:
Table 20-2. iSCSI Targets Table CLI Commands
CLI Command Description
iscsi target port tcp-port-1
[tcp-port-2… tcp-port-8]
[address ip-address] [name
target-name]
no iscsi target port tcpport-1 [tcp-port-2… tcp-port-
8] [address ip-address]
Configures iSCSI port/s, target address
and name.
Use the no form of this command to
delete an iSCSI target.
show iscsi sessions Show the current iSCSI targets and
sessions.
console(config)# iscsi target port 30001 address
176.16.1.1 name iqn.1993-11.com.disk
vendor:diskarrays.sn.45678.tape:sys1.xyzDell PowerConnect 55xx Systems User Guide 603
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
iSCSI Sessions
To display information about iSCSI communications to various targets:
1 Click System > iSCSI Optimization > iSCSI Sessions in the tree view to
display the iSCSI Sessions page.
Figure 20-3. iSCSI Sessions
2 Select a target and click Details. The following is displayed:
– Target Name — The name of the target.
– Initiator Name — The name of the initiator.
– ISID — The iSCSI session ID.
– Session Life Time — The amount of time that has passed since the
first frame of the session.
– Aging Time — The time left until the session ages out and is
removed.604 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Initiators/Targets — The IP address and TCP port used by each
initiator and target in the session is displayed.
Displaying iSCSI Sessions Using CLI Commands
The following table summarizes the CLI commands for displaying iSCSI
sessions.
The following is an example of the CLI commands:
Table 20-3. iSCSI CLI Commands
CLI Command Description
show iscsi sessions
[detailed]
Displays iSCSI sessions
console(config)# show iscsi sessions
Target: iqn.1993-11.com.disk-vendor:diskarrays.sn.45678
-------------------------------------------------------------
Initiator: iqn.1992-04.com.os-vendor.plan9:cdrom.12
ISID: 11
Initiator: iqn.1995-05.com.os-vendor.plan9:cdrom.10
ISID: 222
--------------------------------------------------------------
Target: iqn.103-1.com.storage-vendor:sn.43338.storage.tape:sys1.xyz
--------------------------------------------------------------
Initiator: iqn.1992-04.com.os-vendor.plan9:cdrom.12
ISID: 44
Initiator: iqn.1995-05.com.os-vendor.plan9:cdrom.10
ISID: 65
--------------------------------------------------------------
console# show iscsi sessions detailed
Target: iqn.1993-11.com.disk-vendor:diskarrays.sn.45678
--------------------------------------------------------------
Session 1:
---------
Initiator: iqn.1992-04.com.os-vendor.plan9:cdrom.12.storage:sys1.xyz
UP Time: 02:10:45 (DD:HH:MM)
Time for aging out: 10 min
ISID: 11
Initiator IP Address Initiator TCP Port Target IP Address Target IP Port
-------------------- ----------------- ---------------- -------------
172.16.1.3 49154 172.16.1.20 3001
172.16.1.3 49154 172.16.1.20 3001
1172.16.1.3 49154 172.16.1.20 3001
30001Initiator: iqn.1995-05.com.os-vendor.plan9:cdrom.10
Status: Active
UP Time: 00:04:50 (DD:HH:MM)
Time for aging out: 2 min
ISID: 22Dell PowerConnect 55xx Systems User Guide 605
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGSwitching_iscsi.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring iSCSI Using CLI
The following is a sample procedure to configure the iSCSI feature using CLI:
Table 20-4. Sample CLI Script to Configure iSCSI
CLI Command Description
iscsi enable Enable iSCSI.
iscsi cos vpt 2 remark Set iSCSI flow to use VPT 2 (Layer 2
CoS). This VPT value replaces the
original VPT in the packet.
show iscsi sessions Verify that iSCSI is enabled and that the
iSCSI flows are displayed. Template Last Updated - 2/7/2007Dell PowerConnect 55xx Systems User Guide 606
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
21
Statistics/RMON
This section describes many of the statistics available on the device. The only
exception is the QoS statistics described in "Quality of Service" on page 650.
It contains the following topics:
• Table Views
• RMON Components
• ChartsDell PowerConnect 55xx Systems User Guide 607
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Table Views
This section displays statistics in table form.
It contains the following topics:
• Denied ACEs Counters
• Utilization Summary
• Counter Summary
• Interface Statistics
• Etherlike Statistics
• GVRP Statistics
• EAP Statistics608 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Denied ACEs Counters
The Denied ACEs counters contain the number of packets that were dropped
(denied) because they did not meet ACL criteria expressed in some ACE.
To display the denied ACE counters:
1 Click Statistics/RMON > Table Views > Denied ACEs Counters in the
tree view to display the Denied ACEs Counters page.
Figure 21-1. Denied ACEs Counters
The global number of dropped packets is displayed along with the number
of dropped packets on each interface.
2 To clear the counters, select either a stack unit and port or LAG. All
ports/LAGs in the unit are displayed.
3 Mark the counters to be cleared and click Clear Counters.
4 To clear all counters, click Clear All Counters. Dell PowerConnect 55xx Systems User Guide 609
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Viewing Denied ACE Counters Statistics Using the CLI Commands
The following table contains the CLI commands for viewing denied ACE
counters statistics.
The following is an example of the CLI commands:
Table 21-1. Denied ACE Counters CLI Commands
CLI Command Description
show interfaces access-lists
counters
[gigabitethernet|tengigabite
thernet] port-number|portchannel LAG-number]
Displays Access List counters.
console# show interfaces access-lists counters
Interface Denied ACE hits
--------- -------------
gi1/0/1 55
gi1/0/2 33
gi1/0/3 32610 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Utilization Summary
Use the Utilization Summary page to display interface utilization. This page
is refreshed periodically to minimize impact on performance. Display may be
disrupted during this period.
To display interface utilization statistics:
1 Click Statistics/RMON > Table Views > Utilization Summary in the tree
view to display the Utilization Summary page.
Figure 21-2. Utilization Summary
2 Select a unit and port/LAG.
The following fields are displayed:
– Port/LAG — The port/LAG number.
– Interface Status — The status of the interface: Up, Down or Not
Present when no port is attached to the LAG.
– % Interface Utilization — Network interface utilization percentage,
based on the duplex mode of the interface. The range of this reading is
from 0 to 200%. The maximum reading of 200% for a full duplex
connection indicates that 100% of bandwidth of incoming and
outgoing connections is used by the traffic travelling through the
interface. The maximum reading for a half duplex connection is 100%.Dell PowerConnect 55xx Systems User Guide 611
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– % Unicast Received — Percentage of Unicast packets received on the
interface.
– % Non Unicast Packets Received — Percentage of non-Unicast
packets received on the interface.
– % Error Packets Received — Percentage of packets with errors
received on the interface.
3 Select one of the Refresh Rate options to specify how frequently the
statistics should be refreshed.
The CPU utilization chart is displayed.612 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Counter Summary
To display the number of received and transmitted packets on ports, as
numeric figures and not percentages:
1 Click Statistics/RMON > Table Views > Counter Summary in the tree
view to display the Counter Summary page.
Figure 21-3. Counter Summary
Counters for the selected units or LAG are displayed.
2 Select a port/LAG.
The following fields are displayed:
– Port/LAG — The interface number.
– Interface Status — Status of the interface: Up or Down.
– Received Unicast Packets — Number of received Unicast packets on
the interface.Dell PowerConnect 55xx Systems User Guide 613
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Transmitted Unicast Packets — Number of transmitted Unicast
packets from the interface.
– Received Non Unicast Packets — Number of received non-Unicast
packets on the interface.
– Transmitted Non Unicast Packets — Number of transmitted nonUnicast packets from the interface.
– Received Errors — Number of received packets with errors on the
interface.
3 Select one of the Refresh Rate options to specify how frequently the
counters should be refreshed.614 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Interface Statistics
To display the number of received and transmitted packets on an interface:
1 Click Statistics/RMON > Table Views > Interface Statistics in the tree
view to display the Interface Statistics page.
Figure 21-4. Interface Statistics
2 Select a port/LAG.
3 Select one of the Refresh Rate options to specify how frequently the
counters should be refreshed.
The following fields are displayed:
Receive Statistics
– Total Bytes (Octets) — Amount of octets received on the selected
interface.Dell PowerConnect 55xx Systems User Guide 615
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Unicast Packets — Number of Unicast packets received on the
selected interface.
– Multicast Packets — Number of Multicast packets received on the
selected interface.
– Broadcast Packets — Number of Broadcast packets received on the
selected interface.
– Packets with Errors — Number of errors packets received on the
selected interface.
Transmit Statistics
– Total Bytes (Octets) — Number of octets transmitted from the
selected interface.
– Unicast Packets — Number of Unicast packets transmitted from the
selected interface.
– Multicast Packets — Number of Multicast packets transmitted from
the selected interface.
– Broadcast Packets — Number of Broadcast packets transmitted from
the selected interface.
4 Click Reset All Counters to clear these counters.616 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Etherlike Statistics
To display interface error statistics:
1 Click Statistics/RMON > Table Views > Etherlike Statistics in the tree
view to display the Etherlike Statistics page.
Figure 21-5. Etherlike Statistics
2 Select a port/LAG.
The following fields are displayed:
– Frame Check Sequence (FCS) Errors — Number of frames received
that are an integral number of octets in length but do not pass the
FCS check.
– Single Collision Frames — Number of frames that are involved in a
single collision, and are subsequently transmitted successfully.
– Late Collisions — Number of collisions detected after the first 512
bits of data.Dell PowerConnect 55xx Systems User Guide 617
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Excessive Collisions — Number of frames for which transmission fails
due to excessive collisions.
– Internal MAC Transmit Errors — Number of frames for which
reception fails due to an internal MAC sublayer receive error.
– Oversize Packets — Number of frames received that exceed the
maximum permitted frame size.
– Received Pause Frames — Number of MAC Control frames received
with a PAUSE operation code.
– Transmitted Pause Frames — Number of MAC Control frames
transmitted on this interface with a PAUSE operation code.
3 Select one of the Refresh Rate options to clears the statistics for the
selected interface.
Viewing Interface Statistics Using the CLI Commands
The following table contains the CLI commands for viewing utilization,
counters and interface statistics.
Table 21-2. Interface Statistics CLI Commands
CLI Command Description
show interfaces counters
[[gigabitethernet|tengigabit
ethernet] port-number|portchannel LAG-number]
Displays traffic seen by the physical
interface.618 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI command for all ports:
The following is an example of the CLI command for a single port:
console# show interfaces counters
Port InUcastPkts InMcastPkts InBcastPkts InOctets
------- ------------ ----------- ----------- --------
gi2/0/1 0 0 0 0
gi2/0/2 0 0 0 0
gi2/0/3 0 0 0 0
gi2/0/4 0 0 0 0
gi2/0/5 0 0 0 0
Port OutUcastPkts OutMcastPkts OutBcastPkts OutOctets
--------- ------------ ------------ ------------ ------------
gi2/0/1 0 0 0 0
gi2/0/2 0 0 0 0
gi2/0/3 0 0 0 0
gi2/0/4 0 0 0 0
console# show interfaces counters gi1/0/1
Port InUcastPkts InMcastPkts InBcastPkts InOctets
-------- ------------- ------------ ------------ ------------
gi1/0/1 0 0 0 0
Port OutUcastPkts OutMcastPkts OutBcastPkts OutOctets
-------- ----------- ------------ ------------ ------------
gi1/0/1 0 0 0 0
Alignment Errors: 0
FCS Errors: 0
Single Collision Frames: 0
Multiple Collision Frames: 0
SQE Test Errors: 0
Deferred Transmissions: 0
Late Collisions: 0
Excessive Collisions: 0
Carrier Sense Errors: 0
Oversize Packets: 0
Internal MAC Rx Errors: 0
Symbol Errors: 0
Received Pause Frames: 0Dell PowerConnect 55xx Systems User Guide 619
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
GVRP Statistics
To display device GVRP statistics:
1 Click Statistics/RMON > Table Views > GVRP Statistics in the tree view
to display the GVRP Statistics page.
Figure 21-6. GVRP Statistics
2 Select a port/LAG.
The number of received and transmitted packets in the following counters
is displayed:
GVRP Statistics Table
– Join Empty — The number of GVRP Join Empty packets.
– Empty — The number of GVRP empty packets.
– Leave Empty — The number of GVRP Leave Empty packets.
– Join In — The number of GVRP Join In packets.620 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Leave In — The number of GVRP Leave In packets.
– Leave All — The number of GVRP Leave All packets.
GVRP Error Statistics
– Invalid Protocol ID — The number of GVRP Invalid Protocol ID
errors.
– Invalid Attribute Type — The number of GVRP Invalid Attribute ID
errors.
– Invalid Attribute Value — The number of GVRP Invalid Attribute
Value errors.
– Invalid Attribute Length — The number of GVRP Invalid Attribute
Length errors.
– Invalid Event — The number of GVRP Invalid Events errors.
3 Select one of the Refresh Rate options to specify how frequently the
statistics should be refreshed.
Viewing GVRP Statistics Using the CLI Commands
The following table contains the CLI commands for viewing GVRP statistics.
Table 21-3. GVRP Statistics CLI Commands
CLI Command Description
show gvrp statistics
[[gigabitethernet|tengigabitethernet
] interface|port-channel LAG-number]
Displays GVRP statistics.
show gvrp error-statistics
[[gigabitethernet|tengigabitethernet
] interface|port-channel LAG-number]
Displays GVRP error
statistics.Dell PowerConnect 55xx Systems User Guide 621
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console# show gvrp statistics
GVRP Statistics:
----------------
Legend:
rJE : Join Empty Received rJIn: Join In Received
rEmp : Empty Received rLIn: Leave In Received
rLE : Leave Empty Received rLA : Leave All Received
sJE : Join Empty Sent sJIn: Join In Sent
sEmp : Empty Sent sLIn: Leave In Sent
sLE : Leave Empty Sent sLA : Leave All Sent
Port rJE rJIn rEmp rLIn rLE rLA sJE sJIn sEmp sLIn sLE sLA
----- ----- ----- ----- ----- ----- ----- ---- ----- ---- --- ---- ---622 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
EAP Statistics
For information about EAP, see "Dot1x Authentication" on page 132.
To display EAP statistics:
1 Click Statistics/RMON > Table Views > EAP Statistics in the tree view
to display the EAP Statistics page.
Figure 21-7. EAP Statistics
2 Select a port/LAG.
The following fields are displayed:
– Frames Received — The number of valid EAPOL frames received on
the port.
– Frames Transmitted — The number of EAPOL frames transmitted
via the port.Dell PowerConnect 55xx Systems User Guide 623
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Start Frames Receive — The number of EAPOL Start frames received
on the port.
– Log off Frames Receive — The number of EAPOL Logoff frames
received on the port.
– Respond ID Frames Receive — The number of EAP Resp/ID frames
received on the port.
– Respond Frames Receive — The number of valid EAP Response
frames received on the port.
– Request ID Frames Transmit — The number of EAP Req/ID frames
transmitted via the port.
– Request Frames Transmitted — The number of EAP Request frames
transmitted via the port.
– Invalid Frames Receive — The number of unrecognized EAPOL
frames received on this port.
– Length Error Frames Receive — The number of EAPOL frames with
an invalid Packet Body Length received on this port.
– Last Frame Version — The protocol version number attached to the
most recently received EAPOL frame.
– Last Frame Source — The source MAC address attached to the most
recently received EAPOL frame.
3 Select one of the Refresh Rate options to specify how frequently the
statistics should be refreshed.
Viewing EAP Statistics Using the CLI Commands
The following table summarizes the CLI commands for viewing EAP
statistics.
Table 21-4. EAP Statistics CLI Commands
CLI Command Description
show dot1x statistics Displays 802.1X statistics for the
specified interface.624 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console# show dot1x statistics gi1/0/1
EapolFramesRx: 11
EapolFramesTx: 12
EapolStartFramesRx: 1
EapolLogoffFramesRx: 1
EapolRespIdFramesRx: 3
EapolRespFramesRx: 6
EapolReqIdFramesTx: 3
EapolReqFramesTx: 6
InvalidEapolFramesRx: 0
EapLengthErrorFramesRx: 0
LastEapolFrameVersion: 1
LastEapolFrameSource: 0008.3b79.8787Dell PowerConnect 55xx Systems User Guide 625
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
RMON Components
This section describes Remote Monitoring (RMON), which enables network
managers to display network information from a remote location.
It contains the following topics:
• Statistics
• History Control
• History Table
• Events Control
• Events Log
• Alarms626 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Statistics
To display device utilization statistics and errors that occurred on the device:
1 Click Statistics/RMON > RMON > Statistics in the tree view to display
the Statistics page.
Figure 21-8. Statistics
2 Select a port/LAG.
The following fields are displayed:
– Received Bytes (Octets) — Number of bytes received on the selected
interface.
– Received Packets — Number of packets received on the selected
interface.
– Broadcast Packets Received — Number of good Broadcast packets
received on the interface since the device was last refreshed. This
number does not include Multicast packets. Dell PowerConnect 55xx Systems User Guide 627
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Multicast Packets Received — Number of good Multicast packets
received on the interface, since the device was last refreshed.
– CRC&Align Errors — Number of packets received with a length
(excluding framing bits, but including FCS octets) of between 64 and
1518 octets, inclusive, but with either a bad Frame Check Sequence
(FCS) with an integral number of octets (FCS Error) or a bad FCS
with a non-integral number of octets (Alignment Error).
– Undersize Packets — Number of packets received, less than 64 octets
long (excluding framing bits, but including FCS octets), and
otherwise well formed.
– Oversize Packets — Number of packets received, longer than 1518
octets (excluding framing bits, but including FCS octets), and
otherwise well formed.
– Fragments — Number of packets received, less than 64 octets in
length (excluding framing bits but including FCS octets), which has
either a bad Frame Check Sequence (FCS) with an integral number of
octets (FCS Error), or a bad FCS with a non-integral number of octets
(Alignment Error).
– Jabbers — Number of packets received, longer than 1518 octets
(excluding framing bits, but including FCS octets), and having either
a bad Frame Check Sequence (FCS) with an integral number of
octets (FCS Error), or a bad FCS with a non-integral number of octets
(Alignment Error).
– Collisions — Number of collisions received on the interface, since the
device was last refreshed.
– Frames of 64 Bytes — Number of 64-byte frames received on the
interface, since the device was last refreshed.
– Frames of 65 to 127 Bytes — Number of 65-127-byte frames received
on the interface, since the device was last refreshed.
– Frames of 128 to 255 Bytes — Number of 128-255-byte frames
received on the interface, since the device was last refreshed.
– Frames of 256 to 511 Bytes — Number of 256-511-byte frames
received on the interface, since the device was last refreshed.
– Frames of 512 to 1023 Bytes — Number of 512-1023-byte frames
received on the interface, since the device was last refreshed.628 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Frames of 1024 to Max Octets — Number of 1024-Max Octet frames
received on the interface, since the device was last refreshed.
3 Select one of the Refresh Rate options to specify how frequently the
statistics should be refreshed.
Configuring RMON Statistics Using the CLI Commands
The following table contains the CLI commands for viewing and enabling
RMON statistics.
The following is an example of the CLI commands:
Table 21-5. Configuring RMON Statistics Using CLI Command
CLI Command Description
show rmon statistics
{[gigabitethernet|tengigabiteth
ernet] interface|port-channel
LAG-number]
Displays RMON Ethernet statistics.
console# show rmon statistics gi1/0/1
Port te1/0/1
Dropped: 0
Octets: 0 Packets: 0
Broadcast: 0 Multicast: 0
CRC Align Errors: 0 Collisions: 0
Undersize Pkts: 0 Oversize Pkts: 0
Fragments: 0 Jabbers: 0
64 Octets: 0 65 to 127 Octets: 1
128 to 255 Octets: 1 256 to 511 Octets: 1
512 to 1023 Octets: 0 1024 to max Octets: 0Dell PowerConnect 55xx Systems User Guide 629
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
History Control
To display the requested RMON history group statistics or request a new
sample of interface statistics:
1 Click Statistics/RMON > RMON > History Control in the tree view to
display the History Control: Summary page.
Figure 21-9. History Control: Summary
Previously-defined samples are displayed.
2 To add a new entry, click Add. The New History Entry number, which
uniquely identifies the sample, is displayed.
3 Enter the fields for the entry:
– Source Interface — Sampled Ethernet interface.
– Owner (0-20 characters) — RMON station or user that configured the
entry.630 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Max No. of Samples to Keep (1-50) — Number of samples to be
saved.
– Sampling Interval (1-3600) — The time interval in seconds between
samples.
Configuring RMON History Control Using the CLI Commands
The following table contains the CLI commands for configuring RMON
history control.
The following is an example of the CLI commands:
Table 21-6. RMON History Control CLI Commands
CLI Command Description
rmon collection stats index
[owner ownername|bucket
bucket-number] [interval
seconds]
no rmon collection stats index
Enables and configures RMON on an
interface.
Use the no form of this command to
remove a specified RMON history
group of statistics.
show rmon collection history
[[gigabitethernet|tengigabitet
hernet] interface|port-channel
LAG-number]
Displays RMON collection history
statistics.
console(config)# interface gi1/0/8
console(config-if)# rmon collection stats 1 interval
2400Dell PowerConnect 55xx Systems User Guide 631
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
History Table
The History Table page displays interface-specific statistical network
samplings. Each table entry represents the counter values compiled during a
single sample.
To display RMON statistics for a specified sample:
1 Click Statistics/RMONRMONHistory Table in the tree view to
display the History Table page.
Figure 21-10. History Table
2 Select a History Entry No.
The following fields are displayed:
– Owner — RMON station or user that requested the RMON
information.
– Sample No. — Number of the specific sample the information in the
table reflects.632 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Drop Events — Number of dropped packets due to lack of network
resources during the sampling interval. This may not represent the
exact number of dropped packets, but rather the number of times
dropped packets were detected.
– Received Bytes (Octets) — Number of data octets, including bad
packets, received on the network.
– Received Packets — Number of packets received during the sampling
interval.
– Broadcast Packets — Number of good Broadcast packets received
during the sampling interval.
– Multicast Packets — Number of good Multicast packets received
during the sampling interval.
– CRC Align Errors — Number of packets received during the sampling
session, with a length of between 64-1632 octets, who had a bad
Check Sequence (FCS) with an integral number of octets, or a bad
FCS with a non-integral number.
– Undersize Packets — Number of packets, having less than 64 octets,
received during the sampling session.
– Oversize Packets — Number of packets having more than 1632 octets,
received during the sampling session.
– Fragments — Number of packets, having less than 64 octets and
having a FCS, received during the sampling session.
– Jabbers — Number of packets, having more than 1632 octets and who
had an FCS, received during the sampling session.
– Collisions — Estimated number of packet collision that occurred
during the sampling session. Collisions are detected when repeater
port detects two or more stations transmitting simultaneously.
– Utilization — Estimated main physical layer network usage on an
interface during the session sampling. The value is stated in
hundredths of a percent.Dell PowerConnect 55xx Systems User Guide 633
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Viewing the RMON History Table Using the CLI Commands
The following table contains the CLI commands for viewing the RMON
history table.
The following is an example of a CLI command:
Table 21-7. RMON History Table CLI Commands
CLI Command Description
show rmon history index
{throughput|errors|other
} [period seconds]
Displays RMON Ethernet statistics history.
console# show rmon history 1 throughput
Sample Set: 1
Interface: 1/0/1
Requested samples: 50
Owner: CLI
Interval: 1800
Granted samples: 50
Maximum table size: 500
Time
--------------------
Jan 18 2005 21:57:00
Octets
---------
303595962
Packets
--------
357568
Broadcast
---------
3289
Multicast
----------
7287
Util
--------
19%634 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Events Control
Events are actions that are performed when an alarm is generated (alarms are
defined in the Alarms page).
An event can be any combination of logs/traps. If the action includes logging,
then the events are logged in the Events Log page.
To define an RMON event:
1 Click Statistics/RMON > RMON > Events Control in the tree view to
display the Events Control: Summary page.
Figure 21-11. Events Control: Summary
The currently-defined events are displayed. Along with the fields described
in the Events Control: Add page, the following field is displayed for the
events:
– Time — The time that the event occurred.
2 To define a new event, click Add.Dell PowerConnect 55xx Systems User Guide 635
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 Enter the fields:
– Event Entry — Displays a new event number.
– Community — Enter the community to which the event belongs or
keep the default community.
– Description — Enter the event description.
– Type — Select the event action. The possible options are:
• None — No action is taken.
• Log — When an alarm occurs, a log entry is recorded.
• Trap — When an alarm occurs, a trap is generated.
• Log and Trap — When an alarm occurs, a log entry is recorded
and a trap is generated.
– Owner — Enter the event owner.
Defining RMON Events Using the CLI Commands
The following table contains the CLI commands for defining RMON events.
Table 21-8. RMON Event Definition CLI Commands
CLI Command Description
rmon event index
{none|log|trap|log-trap}
[community text]
[description text] [owner
name]
no rmon event index
Configures an event.
Use the no form of this command to
remove an event.
show rmon events Displays RMON event table.636 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# rmon event 1 log
console(config)# exit
console# show rmon events
Index Description Type Community Owner Last Time
Sent
----- ----------- ------ --------- ----- -----------
1 Errors Log Default
Community
CLI Jan 18 2002
23:58:17
2 High
Broadcast
LogTrap
Router Manager Jan 18 2002
23:59:48Dell PowerConnect 55xx Systems User Guide 637
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Events Log
The Events log displays the log of events that occurred. An event is logged
when the type of the event is Log or Log and Trap. The action in the event is
performed when the event is bound to an alarm (see the Alarms page) and
the conditions of the alarm have occurred.
To display the events log:
• Click Statistics/RMON > RMON > Events Log in the tree view to
display the Events Control page.
Figure 21-12. Events Control
The following fields are displayed:
– Event — The event identifier.
– Log No. — The log number.
– Log Time — Time when the log entry was entered. 638 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Description — Description of the log entry.
Viewing Device Events Using the CLI Commands
The following table contains the CLI commands for viewing device events.
The following is an example of the CLI commands:
Alarms
RMON alarms provide a mechanism for setting thresholds and sampling
intervals to generate exception events on a counter or any other SNMP object
counter maintained by the agent.
Both the rising and falling thresholds must be configured in the alarm. After a
rising threshold is crossed, another rising event is not generated until the
companion falling threshold is crossed. After a falling alarm is issued, the next
Table 21-9. Device Event Viewing CLI Commands
CLI Command Description
show rmon log [event] Displays the RMON logging table.
console(config)# rmon event 1 log
console> show rmon log
Maximum table size: 500
Event Description Time
----- --------------- --------------
1 Errors Jan 18 2002 23:58:17
2 High Broadcast Jan 18 2002 23:59:48Dell PowerConnect 55xx Systems User Guide 639
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
alarm is issued when a rising threshold is crossed. One or more alarms are
bound to an event. The event indicates the action to be taken when the alarm
occurs.
To add an RMON alarm:
1 Click Statistics/RMON > RMON > Alarms in the tree view to display
the Alarms: Summary page.
Figure 21-13. Alarms: Summary
The currently-defined alarms are displayed.
2 To add a new alarm, click Add and enter the fields:
– Alarm Entry — Displays a new alarm entry.
– Interface — Select the interface for which RMON statistics are
displayed.
– Counter Name — Select the selected MIB variable. 640 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Sample Type — Select the sampling method for the selected variable
and comparing the value against the thresholds. The possible options
are:
• Delta — Subtracts the last sampled value from the current value.
The difference in the values is compared to the threshold.
• Absolute — Compares the values directly with the thresholds at
the end of the sampling interval.
– Rising Threshold (0–2147483647) — Enter the rising counter value
that triggers the rising event alarm.
– Rising Event — Select one of the previously-defined events.
– Falling Threshold (0–2147483647) — Enter the falling counter value
that triggers the falling event alarm.
– Falling Event — Select one of the previously-defined events.
– Startup Alarm — Select the trigger that activates the alarm. The
possible options are:
• Rising Alarm — A rising counter value triggers the alarm
• Falling Alarm — A falling counter value triggers the alarm.
• Rising and Falling — Both rising and falling counter values
trigger the alarm.
– Interval (1–2147483647) — Enter the alarm interval time in seconds.
This is the interval in seconds over which the data is sampled and
compared with the rising and falling thresholds.
– Owner — Enter the name of the user or network management system
that receives the alarm.Dell PowerConnect 55xx Systems User Guide 641
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining Device Alarms Using the CLI Commands
The following table contains the CLI commands for defining device alarms.
Table 21-10. Device Alarm CLI Commands
CLI Command Description
rmon alarm index
MIB_Object_ID interval
rthreshold fthreshold
revent fevent [type type]
[startup direction] [owner
name]
no rmon alarm index
Configures RMON alarm conditions.
Use the no form of this command to
remove an alarm.
show rmon alarm-table Displays summary of the alarm table.
show rmon alarm number Displays the RMON alarm
configuration.642 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console(config)# rmon alarm 1000
1.3.6.1.2.1.2.2.1.10.1 360000 1000000 1000000 10 20
console# show rmon alarm-table
Index
-----
123
OID
----------------------
1.3.6.1.2.1.2.2.1.10.1
1.3.6.1.2.1.2.2.1.10.1
1.3.6.1.2.1.2.2.1.10.9
Owner
-------
CLI
Manager
CLIDell PowerConnect 55xx Systems User Guide 643
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Charts
This section describes how to display statistics as charts.
It contains the following topics:
• Ports
• LAGs
• CPU Utilization
Ports
To display port statistics in chart format:
1 Click Statistics/RMON > Charts > Ports in the tree view to display the
Ports page.
Figure 21-14. Ports
2 Select the unit ID of a unit in the stack for which you want to display
statistics.644 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 Check the type of statistics to be displayed:
– Interface Statistics — Select the interface statistics to display.
– Etherlike Statistics — Select the frame error statistics to display.
– RMON Statistics — Select the RMON statistics to display.
– GVRP Statistics — Select the GVRP statistics type to display.
– Refresh Rate — Select the amount of time that passes before the
statistics are refreshed.
4 To draw a chart for the selected statistics, click Draw. The chart for the
selected statistic is displayed on the page.Dell PowerConnect 55xx Systems User Guide 645
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Viewing Port Statistics Using the CLI Commands
The CLI commands for viewing port statistics are the same CLI commands
described above. The Ports page simply shows the same statistics in chart
form.
LAGs
To display LAG statistics in chart format:
1 Click Statistics/RMON > Charts > LAGs in the tree view to display the
LAGs page.
Figure 21-15. LAGs
2 Check the type of statistics to be displayed:
– Interface Statistics — Select the interface statistics to display.
– Etherlike Statistics — Select the frame error statistics to display.
– RMON Statistics — Select the RMON statistics to display.646 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– GVRP Statistics — Select the GVRP statistics type to display.
– Refresh Rate — Select the amount of time that passes before the
statistics are refreshed.
3 To draw a chart for the selected statistics, click Draw. The chart for the
selected statistic is displayed on the page.
Viewing LAG Statistics Using the CLI Commands
The following table contains the CLI commands for viewing LAG statistics.
Table 21-11. LAG Statistic CLI Commands
CLI Command Description
show interfaces counters
[[gigabitethernet|tengigabitet
hernet] interface|port-channel
LAG-number]
Displays traffic seen by the physical
interface.
show rmon statistics
{[gigabitethernet|tengigabitet
hernet] interface|port-channel
LAG-number}
Displays RMON Ethernet
statistics.
show gvrp statistics
{[gigabitethernet|tengigabitet
hernet] interface|port-channel
LAG-number}
Displays GVRP statistics.
show gvrp-error statistics
{[gigabitethernet|tengigabitet
hernet] interface|port-channel
LAG-number}
Displays GVRP error statistics.Dell PowerConnect 55xx Systems User Guide 647
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
console# show rmon statistics gi1/0/1
Port gi1/0/1
Dropped: 0
Octets: 0 Packets: 0
Broadcast: 0 Multicast: 0
CRC Align Errors: 0 Collisions: 0
Undersize Pkts: 0 Oversize Pkts: 0
Fragments: 0 Jabbers: 0
64 Octets: 0 65 to 127 Octets: 1
128 to 255 Octets: 1 256 to 511 Octets: 1
512 to 1023 Octets: 0 1024 to max Octets: 0648 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
CPU Utilization
Use the CPU Utilization page to display the system’s CPU utilization and
percentage of CPU resources consumed by each unit in the stack. Each unit
in the stack is assigned a color on the graph.
To display CPU utilization in chart format:
1 Click Statistics/RMON > Charts > CPU Utilization in the tree view to
display the CPU Utilization page.
Figure 21-16. CPU Utilization
2 Select the Refresh Rate to specify how frequently the statistics should be
refreshed.
3 The CPU utilization chart is displayed. Dell PowerConnect 55xx Systems User Guide 649
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGStatistics.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Viewing CPU Utilization Using CLI Commands
The following table summarizes the CLI commands for viewing CPU
utilization.
The following is an example of the CLI commands:
Table 21-12. CPU Utilization CLI Commands
CLI Command Description
show cpu utilization Displays CPU utilization.
console# show cpu utilization
CPU utilization service is on.
CPU utilization
--------------------------
five seconds: 5%; one minute: 3%; five minutes: 3%Template Last Updated - 2/7/2007Dell PowerConnect 55xx Systems User Guide 650
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
22
Quality of Service
This section provides information for configuring Quality of Service (QoS).
It contains the following topics:
• QoS Features and Components
• General
• QoS Basic Mode
• QoS Advanced Mode
• QoS StatisticsDell PowerConnect 55xx Systems User Guide 651
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
QoS Features and Components
The QoS feature is used to optimize network performance. It provides
classification of incoming traffic into traffic classes, based on one or more
attributes, including:
– Device configuration
– Ingress interface
– Packet contents
QoS includes the following features:
• Traffic Classification — Classifies each incoming packet, as belonging to
a specific traffic flow, based on the packet contents and/or interface. The
classification is done by an ACL (Access Control List), and only traffic
that meets the ACL criteria is subject to classification.
• Assignment to Hardware Queues — Assigns incoming packets to
forwarding queues. Packets are sent to a particular queue for handling as a
function of the traffic class to which they belong.
• Other Traffic Class-Handling Attribute — Applies QoS mechanisms to
various classes, including bandwidth management.
QoS Modes
A single QoS mode is selected and applies to all interfaces in the system. The
modes are:
• Basic Mode — Class of Service (CoS).
– Traffic is divided into classes that determine how it is treated. All
traffic in a class is treated with the same QoS action. The QoS action
for the class of traffic determines the egress queue on the egress port,
based on the indicated QoS value in the incoming frame.
The QoS value in the incoming frame is:
• Layer 2 Packets — VLAN Priority Tag (VPT) 802.1p value
• Layer 3 IPv4 Frames — Differentiated Service Code Point
(DSCP) value
• Layer 3 IPv6 Frames —Traffic Class (TC) value
When operating in Basic mode, the switch trusts this
externally-assigned QoS value. 652 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
This is the default QoS mode.
• Advanced Mode — Per-flow Quality of Service (QoS).
In Advanced mode, a per-flow QoS consists of a class map and a policer:
– A class map defines the kind of traffic in a flow, and contains one or
more ACLs. Packets that match the ACLs belong to the flow.
– A policer applies the configured QoS to a flow. The QoS configuration
of a flow may consist of the egress queue, the DSCP or CoS value, and
actions on out-of-profile (excess) traffic.
• Disable Mode (QoS is not enabled)
In this mode, all traffic is mapped to a single best-effort queue, so that no
type of traffic is prioritized over another.
Only a single mode can be active at a time. When the system is configured to
work in QoS Advanced mode, settings for QoS Basic mode are not active and
vice versa.
When the QoS mode is changed, the following occurs:
• When changing from Advanced mode to any other mode, policy profile
definitions and class maps are deleted. ACLs, which are bonded directly to
interfaces, remain bonded.
• When changing from Basic mode to Advanced mode, the QoS Trust mode
configuration in Basic mode is not retained.
• When disabling QoS, the shaper and queue setting (WRR/SP bandwidth
settings) are reset to default values.
All other user configurations remain intact.Dell PowerConnect 55xx Systems User Guide 653
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
General
This section contains the following topics:
• QoS Mode
• QoS Properties
• Queue
• Mapping to Queue
• Bandwidth
• TCP Congestion Avoidance
QoS Mode
To enable/disable the QoS mode:
1 Click Quality of Service > General >QoS Mode in the tree view to
display the QoS Mode page.
Figure 22-1. QoS Mode
2 Select the QoS Mode. The possible options are:
– Basic — QoS is enabled in Basic mode on the switch654 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Advanced — QoS is enabled in Advanced mode on the switch.
– Disable — QoS is not enabled on the switch.
Setting QoS Mode Using CLI Commands
The following table summarizes the CLI commands for setting the QoS
mode.
The following is an example of the CLI commands:
Table 22-1. QoS Mode CLI Commands
CLI Command Description
qos [basic|advanced]
no qos
Enables QoS on the device.
Use the no form of this command to disable QoS
on the device
show qos Displays the QoS mode.
console(config)# qos basicDell PowerConnect 55xx Systems User Guide 655
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
QoS Properties
To set the default CoS value on incoming, untagged packets:
1 Click Quality of Service > General > QoS Properties in the tree view to
display the QoS Properties: Summary page.
Figure 22-2. QoS Properties: Summary
The default CoS values for all interfaces on the selected unit are displayed.
2 To modify the CoS value for an interface, click Edit, and enter the fields:
– Interface — Select a port or LAG if required.
– Set Default CoS — Enter the default CoS tag value for untagged
packets.656 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring QoS Properties Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the QoS Properties: Summary page.
The following is an example of the CLI command:
Queue
The switch supports eight queues for each interface. Queue number eight is
the highest priority queue. Queue number one is the lowest priority queue.
Traffic Limitation Methods
There are two ways of determining how traffic in queues is handled, Strict
Priority and Weighted Round Robin (WRR):
• Strict Priority — Egress traffic from the highest-priority queue is
transmitted first. Traffic from the lower queues is processed only after the
highest queue has been transmitted, thus providing the highest level of
priority of traffic to the lowest-numbered queue.
• Weighted Round Robin (WRR) — In WRR mode, the number of packets
sent from the queue is proportional to the weight of the queue (the higher
the weight, the more frames are sent). For example, if all eight queues are
WRR and the default weights are used, queue 1 receives 1/15 of the
bandwidth (assuming all queues are saturated and there is congestion),
queue 2 receives 2/15, queue 3 receives 4/15, and queue 8 receives 8/15 of
the bandwidth. The type of WRR algorithm used in the device is not the
standard Deficit WRR (DWRR), but rather Shaped Deficit WRR
(SDWRR).
Table 22-2. QoS Properties CLI Commands
CLI Command Description
qos cos default-cos
no qos cos
Defines the default CoS value of a port.
Use the no form of this command to restore the
default configuration.
console(config)# interface gi1/0/15
console(config-if)# qos cos 3Dell PowerConnect 55xx Systems User Guide 657
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Combination of WRR and Strict Priority
The priority for handling traffic can be selected for each queue. When the
queuing mode is Weighted Round Robin for all queues, queues are serviced
according to their weights. If all queues are assigned strict priority, queues are
serviced according to that order.
The following is true if some queues are assigned strict priority and others are
assigned WRR:
• If one queue is assigned strict priority, all higher queues are also assigned
strict priority. Conversely, if a queue is assigned a WRR weight, all lower
queues must also have a WRR weight assigned to them.
• In the above case, traffic for the strict priority queues is always sent before
traffic from the WRR queues. Traffic from the WRR queues is forwarded
only after the strict priority queues have been emptied. The relative
portion from each WRR queue depends on its weight.658 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To select the priority method and enter WRR weights:
1 Click Quality of Service > General > Queue in the tree view to display
the Queue page.
Figure 22-3. Queue
The queues are displayed.
2 Enter the parameters for the queues:
– Strict Priority — Check to indicate that traffic scheduling for the
selected queue, and all higher queues, is based strictly on the queue
priority.
– WRR — Check to indicate that traffic scheduling for the selected
queue is based on WRR. The time period is divided between the
WRR queues that are not empty, meaning they have descriptors to
egress. This happens only if strict priority queues are empty. Dell PowerConnect 55xx Systems User Guide 659
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Scheduling WRR Weight — If WRR is selected, enter the WRR
weight assigned to the queue.
– % of WRR Bandwidth — Displays the amount of bandwidth assigned
to the queue. These values represent the percent of the WRR weight.
Configuring Queue Settings Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the Queue page.
The following is an example of the CLI commands:
Mapping to Queue
This section provides information for mapping DSCP and CoS values to
service queues, and contains the following topics:
• CoS to Queue
• DSCP to Queue
Table 22-3. Queue Setting CLI Commands
CLI Command Description
priority-queue out num-ofqueues number-of-queues
no priority-queue out numof-queues
Configures the number of expedite
queues.
Use the no form of this command to
restore the default configuration.
wrr-queue bandwidth weight1
weight2 ... weight_n
no wrr-queue bandwidth
Assigns WRR weights to egress queues.
Use the no form of this command to
restore the default configuration.
console(config)# priority-queue out num-of-queues 2
console(config-if)# wrr-queue bandwidth 6 6 6 6 6 6660 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
CoS to Queue
The CoS to Queue page maps CoS priorities to an egress queue, meaning
that the egress queues of the incoming packets is based on the CoS priority in
their VLAN Tags. For incoming, untagged packets, the CoS priority is the
default CoS priority assigned to ingress ports.
By changing CoS to Queue mapping, Queue schedule method, and
bandwidth allocation, it is possible to achieve the desired quality of services in
a network.
The CoS to Queue mapping is applicable only if one of the following exists:
• The switch is in QoS Basic mode, and CoS is the trusted mode.
• The switch is in QoS Advanced mode, and the packets belong to flows that
are CoS trusted.Dell PowerConnect 55xx Systems User Guide 661
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To map CoS values to egress queues:
1 Click Quality of Service > General > CoS to Queue in the tree view to
display the CoS to Queue page.
Figure 22-4. CoS to Queue
The CoS/queue mappings are displayed.
2 Enter the fields:
– Class of Service — The CoS priority tag values, where zero is the
lowest priority and 7 is the highest priority.
– Queue — The queue to which the CoS priority is mapped. 662 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Mapping CoS Priorities to Queues Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the CoS to Queue page .
The following is an example of the CLI commands:
DSCP to Queue
The DSCP to Queue mapping determines the egress queues of the incoming
IP packets, based on their DSCP values. The original VPT (VLAN Priority
Tag) of the packet is unchanged.
By changing the DSCP to Queue mapping, the Queue schedule method, and
bandwidth allocation, it is possible to achieve improved quality of service in a
network.
The DSCP to Queue mapping is applicable to IP packets when:
• The switch is in Basic mode and DSCP is the trusted mode
• The switch is in Advanced mode and the packets belongs to flows that are
DSCP trusted
Non-IP packets are always classified to the best-effort queue.
Table 22-4. CoS to Queue CLI Commands
CLI Command Description
wrr-queue cos-map queue-id
cos1 ... cos8
no wrr-queue cos-map [queueid]
Maps CoS values to the egress queues.
Use the no form of this command to
restore the default configuration.
console(config)# wrr-queue cos-map 4 7Dell PowerConnect 55xx Systems User Guide 663
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To map DSCP to queues:
1 Click Quality of Service > General > DSCP to Queue in the tree view to
display the DSCP to Queue page.
Figure 22-5. DSCP to Queue
The DSCP values in the incoming packet and its associated queues are
displayed.
2 Enter the fields:
– DSCP In — The values of the DSCP field in the incoming packet.
– Queue — The queue to which packets with the specific DSCP value is
assigned. The values are 1-8, where 1 is the lowest value, and 8 is the
highest.664 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Mapping DSCP Values to Queues Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the DSCP to Queue page.
The following is an example of the CLI command:
Bandwidth
The amount of traffic that can be received and transmitted on an interface
can be limited by the following:
• Ingress Rate Limit — Number of bits per second that can be received
from the ingress interface. Excess bandwidth above this limit is discarded.
• Egress Shaping Rates is defined by the following:
– Committed Information Rate (CIR) sets the average maximum
amount of data allowed to be sent on the egress interface, measured in
bits per second
– Committed Burst Shape (CBS) sets the maximum burst of data that
is allowed to be sent, even though it is above the CIR. This is defined
in number of bytes of data.
Table 22-5. DSCP to Queue CLI Commands
CLI Command Description
qos map dscp-queue dscp-list to
queue-id
no qos map dscp-queue [dscplist]
Modifies the DSCP to queue
mapping.
Use the no form of this command to
restore the default configuration.
console(config)# qos map dscp-queue 33 40 41 to 1Dell PowerConnect 55xx Systems User Guide 665
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To configure bandwidth limitation:
1 Click Quality of Service > General > Bandwidth in the tree view to
display the Bandwidth: Summary page.
Figure 22-6. Bandwidth: Summary
The ingress and egress rates are displayed for all ports on the selected unit.
2 To set interface parameters, click Edit.
3 Select an interface, and enter the fields:
– Enable Ingress Rate Limit — Enable/disable ingress traffic limit for
the interface. If this field is selected, enter the Ingress Rate Limit.
– Ingress Rate Limit — Enter the ingress traffic limit for the interface.666 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Egress Shaping Rate — Enable/disable egress traffic limitation. If this
field is selected, enter the following fields.
– Committed Information Rate (CIR) — Enter the average maximum
amount of data allowed to be sent on the egress interface, measured in
bits per second.
– Committed Burst Size (CBS) — Enter the maximum burst of data
that is allowed to be sent on the egress interface, even though it is
above the CIR. This is defined in number of bytes of data.
Configuring Bandwidth Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the Bandwidth pages.
The following is an example of the CLI commands:
Table 22-6. Bandwidth CLI Commands
CLI Command Description
traffic-shape committed-rate
[committed-burst]
no traffic-shape
Sets shaper on egress port.
Use no form in order to disable
the shaper.
rate-limit committed-rate-kbps
[burst committed-burst-byte]
no rate-limit
Limits the rate of the incoming
traffic.
Use the no form to disable rate
limit.
console(config)# interface gi1/0/5
console(config-if)# traffic-shape 124000 9600
console(config-if)# rate-limit 150000Dell PowerConnect 55xx Systems User Guide 667
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
TCP Congestion Avoidance
Use the TCP Congestion Avoidance page to activate a congestion avoidance
algorithm. The algorithm breaks up or prevents TCP global synchronization
in a congested node, where the congestion is due to various sources sending
packets with the same byte count.
To configure TCP congestion avoidance:
1 Click Quality of Service > General > TCP Congestion Avoidance in the
tree view to display the TCP Congestion Avoidance page.
NOTE: TCP Congestion Avoidance increases network reliability, but it also
increases network traffic. Continue only if you are sure it will improve overall
network performance. For this change to be effective you must save the
configuration and reboot the device.
Figure 22-7. TCP Congestion Avoidance
2 Check TCP Congestion Avoidance to enable the algorithm.668 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring TCP Congestion Avoidance Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the TCP Congestion Avoidance page.
The following is an example of the CLI commands:
Table 22-7. TCP Congestion Avoidance CLI Commands
CLI Command Description
qos wrr-queue wrtd
no qos wrr-queue wrtd
Enables Weighted Random Tail Drop (WRTD).
Use the no form of this command to disable
WRTD.
console(config)# qos wrr-queue wrtd
This setting will take effect only after copying running
configuration to startup configuration and resetting the
device.Dell PowerConnect 55xx Systems User Guide 669
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
QoS Basic Mode
This section describes QoS Basic mode.
It contains the following topics:
• Basic Mode Overview
• Workflow to Configure Basic Mode
• Global Settings
• DSCP Rewrite
• Interface Settings
Basic Mode Overview
In QoS Basic mode, a specific domain in the network can be defined as
trusted. Within that domain, packets are marked with CoS priority and/or
DSCP values, to signal the type of service they require. Nodes within the
domain use these fields to assign the packet to a specific output queue. The
initial packet classification and marking of these fields is done in the ingress
of the trusted domain.
Workflow to Configure Basic Mode
To configure Basic QoS mode, perform the following:
1 Select Basic mode for the system in the QoS Mode page.
2 Select the trust-behavior in the Global Settings page.
3 If there is any port that, as an exception, should not trust the incoming
CoS mark, disable the QoS state on that port in the Interface Settings
pages.
If a port is disabled without trusted mode, all its ingress packets are
forwarded in best effort. It is recommended that you disable the trusted
mode at the ports where the CoS and/or DSCP values in the incoming
packets are not trustworthy. Otherwise, performance in the network might
be negatively affected.
4 If you selected DSCP Rewrite in the Global Settings page, set the DSCP
in/out values in the DSCP Rewrite page.670 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Global Settings
Use the Global Settings page to enable Trust on all interfaces on the switch.
This configuration is only active when the QoS mode is Basic. Packets
entering a QoS domain are classified at the edge of the QoS domain.
For more information on setting Trust mode on an interface, see "Interface
Settings" on page 674.
To define Trust configuration:
1 Click Quality of Service > QoS Basic Mode > Global Settings in the tree
view to display the Global Settings page.
Figure 22-8. Global SettingsDell PowerConnect 55xx Systems User Guide 671
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 Enter the fields:
– Trust Mode — Enable/disable Trust mode.
• CoS — Traffic is mapped to queues, based on the VPT field in the
VLAN tag, or based on the per-port default CoS value (if there is
no VLAN tag on the incoming packet). The mapping of the VPT
to queue can be configured in the CoS to Queue page.
• DSCP — All IP traffic is mapped to queues, based on the DSCP
field in the IP header. The mapping of the DSCP to queue is
configured in the DSCP to Queue page.
– Always Rewrite DSCP — Check to always rewrite the DSCP values in
the incoming packets with the new values set in the DSCP to Queue
page. When this field is enabled, the switch uses the new DSCP
values to select the egress queue.
Assigning Global Settings Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the Global Settings page.
The following is an example of the CLI commands:
Table 22-8. Global Settings CLI Commands
CLI Command Description
qos trust {cos|dscp}
no qos trust
Configures the system to either the
CoS or DSCP trust state.
Use the no form of this command to
return to the default configuration.
qos dscp-mutation
no qos dscp-mutation
Applies the DSCP Mutation map to
system DSCP trusted ports.
Use the no form of this command to
restore the trusted port with no
DSCP mutation.
console(config)# qos trust dscp
console(config)# qos dscp-mutation672 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
DSCP Rewrite
Use the DSCP Rewrite page to rewrite the DSCP tags for incoming traffic,
when different DSCP values are used in the incoming and outgoing domains.
Changing the DSCP value used in one domain to the DSCP value used in the
other domain preserves the priority of traffic used in the first domain.
As an example, assume that there are three levels of service: Silver, Gold, and
Platinum. The DSCP incoming values used to mark these levels are 10, 20,
and 30 respectively. If this traffic is forwarded to another service provider that
has the same three levels of service, but uses DSCP values 16, 24, and 48, the
values set in the DSCP Rewrite page are used to change the incoming values
to the outgoing values.
These settings are active globally when the system is in QoS Basic mode.Dell PowerConnect 55xx Systems User Guide 673
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To map DSCP In values to DSCP Out values:
1 Click Quality of Service > QoS Basic Mode > DSCP Rewrite in the tree
view to display the DSCP Rewrite page.
Figure 22-9. DSCP Rewrite674 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 For each DSCP In value (DSCP value of the incoming packet) that needs
to be rewritten to an alternative value, set a DSCP Out value.
Assigning DSCP Rewrite Values Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the DSCP Rewrite page.
The following is an example of the CLI commands:
Interface Settings
QoS Trust mode can be configured on each port of the switch, as follows:
• QoS Trust State Disabled on an Interface — All inbound traffic on the
port is mapped to the best effort queue and no classification/prioritization
takes place.
• QoS Trust State Enabled on an Interface — Port prioritized traffic on
ingress is based on the system- wide configured trusted mode, which is
either CoS Trusted mode or DSCP Trusted mode.
Table 22-9. DSCP Rewrite CLI Commands
CLI Command Description
qos map dscp-mutation indscp to out-dscp
no qos map dscp-mutation
[in-dscp]
Configures the DSCP to DSCP Mutation
table.
Use the no form of this command to restore
the default configuration.
console(config)# qos map dscp-mutation 1 2 4 5 6 to 63Dell PowerConnect 55xx Systems User Guide 675
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To define QoS Trust for an interface:
1 Click Quality of Service > QoS Basic Mode > Interface Settings in the
tree view to display the Interface Settings: Summary page.
Figure 22-10. Interface Settings: Summary
Trust mode is displayed for each interface on the selected unit.
2 To change the QoS trust state for an interface, click Edit, and select an
interface on a unit.
3 Enable/disable the QoS Trust State.676 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Assigning Interface Settings Using CLI Commands
The following table summarizes the CLI commands for configuring fields in
the Interface Settings page.
The following is an example of the CLI commands:
Configuring QoS Basic Mode Using CLI Commands
The following is a sample script configuring QoS Basic mode.
Table 22-10. Interface Settings CLI Commands
CLI Command Description
qos trust
no qos trust
Enables each port trust state while the
system is in the basic QoS mode.
Use the no form of this command to
disable the trust state on each port.
show qos interface[buffers |
queueing | policers | shapers
| rate-limit] [interface-id]]
Displays QoS information on the
interface.
console(config)# interface gi1/0/15
console(config-if)# qos trust
Table 22-11. Sample CLI Script to Configure QoS Basic Mode
CLI Command Description
console#configure
console(config)# qos basic
Enable QoS in Basic mode.
console(config)#mac access-list
extended MAC1
Define an ACL named
"MAC1"
console(config-mac-a1)#deny
00:00:00:00:00:11 00:00:00:00:00:ff
any
MAC1 discards all traffic with
source MAC
00:00:00:00:00:XX addresses.
console(config-mac-a1)# permit any
any
MAC1 permits all other
traffic.
console(config-mac-a1)#exit Exit ACL mode.Dell PowerConnect 55xx Systems User Guide 677
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
console(config)#interface gi1/0/1 Enter Interface mode on port
gi1/0/1.
console(config-if)#service-acl input
mac1
Bind MAC1 to port gi1/0/1.
Table 22-11. Sample CLI Script to Configure QoS Basic Mode (Continued)
CLI Command Description678 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
QoS Advanced Mode
This section describes QoS Advanced mode.
It contains the following topics:
• Advanced Mode Overview
• Workflow to Configure Advanced QoS Mode
• DSCP Mapping
• Class Mapping
• QoS Policers
• Policy Binding
Advanced Mode Overview
In Advanced mode, the switch uses policies to support per-flow QoS. A policy
and its components have the following characteristics and relationships:
• A policy contains one or more class maps.
• A class map defines a flow with one or more associated ACLs. Packets that
match the ACL rules (ACEs) in a class map with Permit (forward) action,
belong to the same flow, and are subject to the same quality of service
action. A policy can contain one or more flows, each with a user-defined
QoS action.
• The QoS of a class map (flow) may be enforced by the associated policer.
There are two type of policers, as described in "Defining Class Mapping
Using CLI Commands" on page 684.
• Per-flow QoS actions are applied to flows by binding the policy maps to the
desired ports. A policy map and its class maps can be bound to one or more
ports, but each port is bound with, at the most, one policy map.
The following points should be considered:
• An ACL can be configured to one or more class maps, regardless of
policies.
• A class map can belong to only one policy map.
• When a class map, using a single policer, is bound to multiple ports, each
port has its own instance of the policer. Each instance applies the QoS
actions on the class map (flow) at a port independent of each other.Dell PowerConnect 55xx Systems User Guide 679
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• If you bind a policy map to more than one port and one of its classes
contains a single policer, all policy map rules will be multiplied per port
(using up more TCAM resources).
• An aggregate policer applies the QoS to all of its flows in aggregation,
regardless of policies and ports.
Advanced QoS settings consist of the following elements:
• Rules — All frames matching a single group of rules are considered to be a
flow.
• Actions — To be applied to frames in each flow that match the rules.
– Policers — See "Single Policers" on page 689
– Aggregate Policers — "Aggregate Policers" on page 687
– Trust —"Interface Settings" on page 674, "Policy Class Maps" on
page 692
– Set DSCP/CoS — "Policy Class Maps" on page 692
– Set Queue — "DSCP Mapping" on page 680
• Binding — Combination of rules and actions that are bound to one or
more interfaces.
Workflow to Configure Advanced QoS Mode
To configure Advanced QoS mode, perform the following:
1 Select Advanced mode for the system in the QoS Mode page.
2 If external DSCP values are different from those used on incoming
packets, map the external values to internal values in the DSCP Rewrite
page.
3 Create ACLs, as described in "Network Security" on page 97.
4 When ACLs are defined, create class maps and associate the ACLs with
them in the Class Mapping pages.
5 Create a policy map in the Policy Class Maps pages, and associate the
policy map with one or more class maps. Specify the QoS action, if needed,
for example by assigning a policer to a class map, when you associate the
class map to the policy.680 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
a Single Policer — Create a policy that associates a class map with a
single policer in the Policy Table pages and the Class Mapping pages.
Within the policy, define the single policer.
b Aggregate Policer — Create a QoS action for each flow. This action
sends all matching frames to the same policer (aggregate policer),
defined in the Aggregate Policer pages. Create a policy that associates
a class map with the aggregate policer in the Policy Table pages.
6 Bind the policy to an interface in the Policy Binding pages.
DSCP Mapping
When a policer is assigned to a class map (flow), you can specify the action to
take when the amount of traffic in the flow(s) exceeds the QoS-specified
limits. The portion of the traffic that causes the flow to exceed its QoS limit
is referred to as out-of-profile packets.
If the exceed action is Remark DSCP (as opposed to Drop), the switch
rewrites the original DSCP value of the out-of-profile IP packets to a new
value, based on the values entered in the DSCP Mapping page. The switch
uses the new values to assign resources and egress queues to these packets.
The switch physically replaces the original DSCP value in the out-of-profile
packets with the new DSCP value.
To use the Remark DSCP exceed action, set the DSCP Out value in the
DSCP Mapping page. Otherwise the action is null, because the DSCP value
in the packet is rewritten to the original DSCP value, set by factory default.Dell PowerConnect 55xx Systems User Guide 681
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To set new DSCP values:
1 Click Quality of Service > QoS Advanced Mode > DSCP Mapping to
display the DSCP Mapping page.
Figure 22-11. DSCP Mapping
2 If the Exceed Action is Out-of-Profile (in the Policy Class Maps page) or
Remark DSCP (in the Aggregate Policy page), the DSCP In values are
rewritten with the DSCP Out values. Set the DSCP Out values as
required.682 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Configuring DSCP Mapping Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the DSCP Mapping page.
The following is an example of the CLI commands:
Class Mapping
A Class Map defines a traffic flow associated with ACL(s). A MAC-based
ACL, IP-based ACL, and an IPv6-based ACL can be combined into a class
map. Class maps are configured to match packet criteria on a match-all or
match-any basis. They are matched to packets on a first-fit basis, meaning
that the action associated with the first-matched class map is the action
performed by the system. Packets that match the same class map belong to
the same flow.
There are two possible types of matching:
• match-all — Traffic matches class map if it matches IP/IPV6 and MAC
ACLs
• match-any — Traffic matches class map if it matches at least one of the
ACLs
If a more complex set of rules is needed, several class maps can be grouped
into a super-group called a policy (see "Defining Class Mapping Using CLI
Commands" on page 684).
Table 22-12. DSCP Mapping CLI Commands
CLI Command Description
qos map policed-dscp dscp-list
to dscp-mark-down
no qos map policed-dscp [dscplist]
Configures the policed-DSCP map for
remarking purposes.
Use the no form of this command to
restore the default configuration.
console(config)# qos map policed-dscp 3 to 43Dell PowerConnect 55xx Systems User Guide 683
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To define a class map:
1 Click Quality of Service > QoS Advanced Mode > Class Mapping to
display the Class Mapping: Summary page.
Figure 22-12. Class Mapping: Summary
The previously-defined class maps are displayed.
2 To add a class map, click Add.
A new class map is added by selecting one or two ACLs and assigning them
a class map name. If a class map has two ACLs, specify that a frame must
match both ACLs, or that it must match either one or both of the ACLs
selected.
3 Enter the parameters.
– Class Map Name — Enter the name of a new class map.684 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Match ACL Type — Enter the criteria that a packet must match in
order to belong to the flow defined by the class map. The possible
options are:
• IP — A packet must match either of the IP-based ACLs in the
class map.
• MAC — A packet must match the MAC-based ACL in the class
map.
• IP and MAC — A packet must match the IP-based ACL and the
MAC-based ACL in the class map (match-all).
• IP or MAC — A packet must match either the IP-based ACL or
the MAC-based ACL in the class map (match-any).
– IPACL — Select the IPv4-based ACL or the IPv6-based ACL for the
class map.
– MAC ACL — Select the MAC-based ACL for the class map.
– Preferred ACL — Select whether packets are first matched to an
IP-based ACL or a MAC-based ACL.
Defining Class Mapping Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the Class Mapping pages.
Table 22-13. Class Mapping CLI Commands
CLI Command Description
class class-map-name [accessgroup acl-name]
no class class-map-name
Defines a traffic classification and
enters the Policy-map Class
Configuration mode.
Use the no form of this command to
detach a class map from the policy
map.
class-map class-map-name
[match-all|match-any]
no class-map class-map-name
Creates or modifies a class map and
enters the Class-map Configuration
mode.
Use the no form of this command to
delete a class map.Dell PowerConnect 55xx Systems User Guide 685
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
QoS Policers
This section describes QoS policers.
It contains the following topics:
• QoS Policers Overview
• Aggregate Policers
• Single Policers
match access-group acl-name
no match access-group acl-name
Defines the match criteria for
classifying traffic.
Use the no form of this command to
delete the match criteria.
show class-map [class-map-name] Displays information about the class
map.
console(config)# qos advanced
console(config)# class-map class1 match-all
console(config-cmap)# match access-group enterprise
console(config-cmap)# do show class-map class1
Class Map matchAll class1
Match access-group enterprise
Table 22-13. Class Mapping CLI Commands (Continued)
CLI Command Description686 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
QoS Policers Overview
The rate of traffic that matches a pre-defined set of rules can be measured,
and limits, such as limiting the rate of file-transfer traffic that is allowed on a
port, can be enforced.
This is done by using the ACLs in the class map(s) to match the desired
pattern of traffic, and by using a policer to apply QoS on the matching traffic.
A policer is configured with a QoS specification. There are two kinds of
policers:
• Single Policer — A single policer applies the QoS to a single class map,
and to a single flow, based on the policer's QoS specification. When a class
map, using a single policer, is bound to multiple ports, each port has its
own instance of the single policer; each applying the QoS on the class map
(flow) at ports that are otherwise independent of each other. A single
policer is created in the Policy Table and Policy Class Maps pages.
• Aggregate Policer — An aggregate policer applies QoS to one or more class
maps, and to one or more flows. An aggregation policer can support class
maps from various policies. An aggregate policer applies QoS to all its
flow(s) in aggregation, regardless of policies and ports. An aggregate policer
is created in the Aggregate Policer pages.
An aggregate policer is defined if the policer is to be shared with more than
one class.
Each policer is defined with its own QoS specification, and is composed of a
combination of the following parameters:
• Committed Information Rate (CIR) — A maximum allowed rate of
traffic, measured in Kbps.
• Committed Burst Size (CBS) — An amount of traffic, measured in bytes,
which is allowed to pass as a temporary burst, even if it is above the
defined maximum rate.
• Exceed Action — An action to be applied to frames that are over the limits
(called out-of-profile traffic). These frames can be forwarded as is,
dropped, or forwarded, after rewriting their DSCP value with a value that
marks them as lower-priority frames for all subsequent handling within the
device.
A policer is assigned to a class map when a class map is added to a policy.Dell PowerConnect 55xx Systems User Guide 687
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Aggregate Policers
To define an aggregate policer:
1 Click Quality of Service > QoS Advanced Mode > Aggregate Policer to
display the Aggregate Policer: Summary page.
Figure 22-13. Aggregate Policer: Summary
The existing aggregate policers are displayed.
2 To add an aggregate policer, click Add, and enter the fields.
– Aggregate Policer Name — Enter the name of the Aggregate Policer.
– Committed Information Rate (CIR) — Enter the maximum
bandwidth allowed in bits per second. See the description of this field
in "Bandwidth" on page 664.
– Committed Burst Size (CBS) — Enter the maximum burst size
(even if it goes beyond the CIR) in bytes. See the description of this in
the "Bandwidth" on page 664.688 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Exceed Action — Select the action to be performed on incoming
packets that exceed the CIR. The possible options are:
• None — No action is performed on packets exceeding the defined
CIR value.
• Drop — Packets exceeding the defined CIR value are dropped.
• Remark DSCP — The DSCP values of packets exceeding the
defined CIR value are rewritten to a value entered in the DSCP
Mapping pages.
Defining Aggregate Policers Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the Aggregate Policer pages.
The following is an example of the CLI commands:
Table 22-14. Aggregate Policer CLI Commands
CLI Command Description
qos aggregate-policer
aggregate-policer-name
committed-rate-kbps excessburst-byte[exceed-action
{drop|policed-dscp-transmit}]
no qos aggregate-policer
aggregate-policer-name
Defines the policer parameters that can
be applied to multiple traffic classes
within the same policy map.
Use the no form of this command to
remove an existing aggregate policer.
console(config)# qos aggregate-policer policer1 124000
9600 exceed-action dropDell PowerConnect 55xx Systems User Guide 689
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Single Policers
Defining Aggregate Policers Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the Aggregate Policer pages.
The following is an example of the CLI commands:
Single policers are created by:
1 Create a policy in the Police Table pages
2 Configure the policy in the Policy Class Maps pages. Here the policy class
can be designated as containing a single policer, or it can be designated as
containing Aggregate policers.
Policy Table
A policy can consist of one of the following:
• One or more class maps of ACLs that define the traffic flows in the policy.
• One or more aggregate policers that apply the QoS to the traffic flows in
the policy.
Table 22-15. Aggregate Policer CLI Commands
CLI Command Description
qos aggregate-policer
aggregate-policer-name
committed-rate-kbps excessburst-byte[exceed-action
{drop|policed-dscp-transmit}]
no qos aggregate-policer
aggregate-policer-name
Defines the policer parameters that can
be applied to multiple traffic classes
within the same policy map.
Use the no form of this command to
remove an existing aggregate policer.
console(config)# qos aggregate-policer policer1 124000
9600 exceed-action drop690 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Only those policies that are bound to an interface are active (see the Policy
Binding pages).
After a policy has been added, class maps can be added in the Policy Table
pages.
To create a QoS policy:
1 Click Quality of Service > QoS Advanced Mode > Policy Table to
display the Policy Table: Summary page.
Figure 22-14. Policy Table: Summary
The previously-defined policies are displayed.
2 To create a policy, click Add.
3 Enter the name of the new policy in the Policy Name field.
4 Add class maps to the new policy in the Policy Class Maps page.Dell PowerConnect 55xx Systems User Guide 691
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Defining Policies Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the Policy Table page.
The following is an example of the CLI commands:
Table 22-16. Policy Table CLI Commands
CLI Command Description
policy-map policy-map-name
no policy-map policy-mapname
Creates a policy map and enters the Policymap Configuration mode.
Use the no form of this command to
delete a policy map.
console(config)# policy-map policy1692 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Policy Class Maps
One or more class maps can be added to a policy. A class map defines the type
of packets that are considered to belong to the same traffic flow.
To add a class map to a policy:
1 Click Quality of Service > QoS Advanced Mode > Policy Class Maps to
display the Policy Class Maps: Summary page.
Figure 22-15. Policy Class Maps: Summary
2 Select a policy in the Policy Name field. The class maps in that policy are
displayed.
3 To add a class map, click Add.
4 Enter the parameters.
– Policy Name — Select the policy to which the class map is being
added.Dell PowerConnect 55xx Systems User Guide 693
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Class Map Name — Select an existing class map to be associated with
the policy. Class maps are created in the Class Mapping pages.
– Action Type — Select the action regarding the ingress CoS and/or
DSCP value of all the matching packets.
• None — Ignore the ingress CoS and/or DSCP value. The
matching packets are sent as best effort.
• Trust CoS, DSCP — If this option is selected, the switch will
trust the CoS or DSCP value of the matching packet. If a packet
is an IP packet, the switch will put the packet in the egress queue,
based on its DSCP value and the DSCP to Queue mapping.
Otherwise, the egress queue of the packet is based on the packet's
CoS value and the CoS to Queue mapping.
• Set — See the description of this field below.
– Set — If this option is selected, enter a New Value, which determines
the egress queue of the matching packets:
• DSCP — If DSCP is selected, the new DSCP value and the
DSCP to Queue mapping determines the egress queue of the
matching packets.
• Queue — If Queue is selected, the new value is the egress queue
number for all matching packets.
• CoS — If CoS is selected, the CoS priority value and the CoS to
Queue mapping determines the egress queue of the matching
packets.
– Police Type — Available in Layer 2 Mode only. Select the policer type
for the policy. The possible options are:
• None — No policy is used.
• Single — The policer for the policy is a single policer.
• Aggregate — The policer for the policy is an aggregate policer.
– Aggregate Policer — Available in Layer 2 Mode only. If Police Type is
Aggregate, select a previously-defined aggregate policer.
If Police Type is Single, enter the following QoS parameters:
– Ingress Committed Information Rate (CIR) (Range: 100 - 1000000)
— Enter the CIR in Kbps. See its description in the Bandwidth pages.694 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Ingress Committed Burst Size (CBS) (Range: 3000 - 16769020) —
Enter the CBS in bytes. See its description in the Bandwidth pages.
– Exceed Action — Select the action assigned to incoming packets
exceeding the CIR. The possible options are:
• None — No action.
• Drop — Packets exceeding the defined CIR value are dropped.
• Out-of-Profile DSCP — Packets, exceeding the defined CIR, are
forwarded with a new DSCP, derived from the DSCP Mapping
pages.
Defining Policy Class Maps Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the Policy Class Maps pages.
Table 22-17. Policy Class Maps CLI Commands
CLI Command Description
class class-map-name [accessgroup acl-name]
no class class-map-name
Defines a traffic classification and
enters the Policy-map Class
Configuration mode.
Use the no form of this command to
detach a class map from the policy
map.
trust [cos-dscp]
no trust
Configures the trust state, which
selects the value that QoS uses as the
source of the internal DSCP value.
Use the no form of this command to
return to the default trust state.
set {dscp new-dscp|queue queueid|cos new-cos}
no set
Sets new values in the IP packet.
Use the no form of this command to
return to the default values.
police committed-rate-kbps
committed-burst-byte [exceedaction {drop|policed-dscptransmit}]
no police
Defines the policer for classified traffic.
Use the no form of this command to
remove a policer.Dell PowerConnect 55xx Systems User Guide 695
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
The following is an example of the CLI commands:
qos aggregate-policer
aggregate-policer-name
committed-rate-kbps excessburst-byte [exceed-action
{drop|policed-dscp-transmit}]
no qos aggregate-policer
aggregate-policer-name
Defines the policer parameters that
can be applied to multiple traffic
classes.
Use the no form of this command to
remove an existing aggregate policer.
show policy-map [policy-mapname]
Displays all policy maps or a specific
policy map.
console(config)# policy-map policy1
console(config-pmap)# class class1 access-group enterprise
console(config-pmap)# trust cos-dscp
console(config-pmap)# set dscp 56
console(config-pmap)# class class1
console(config-pmap-c)# police 124000 9600 exceed-action
drop
console(config)# qos aggregate-policer policer1 124000
9600 exceed-action drop
Table 22-17. Policy Class Maps CLI Commands (Continued)
CLI Command Description696 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Policy Binding
After policies are created, they must be bound to interfaces (ports or
LAGs).When a policy is bound to a specific interface, it becomes active on it
(subject to time range restrictions). Only one policy can be active on a single
interface, but a single policy can be bound to more than one interface.
When a policy is bound to an interface, it filters and applies QoS to ingress
traffic that belongs to the flows defined in the policy. The policy does not
apply to traffic egress to the same port.
To edit a policy, it must first be removed (unbound) from all those ports to
which it is bound.
To define policy binding:
1 Click Quality of Service > QoS Advanced Mode > Policy Binding to
display the Policy Binding: Summary page.
Figure 22-16. Policy Binding: SummaryDell PowerConnect 55xx Systems User Guide 697
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Previously-defined policy bindings are displayed.
2 To bind a policy to an interface, click Add.
3 Select the interface assigned to the policy.
4 Select the Policy Name to be activated on the interface.
Defining Policy Binding Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the Policy Binding pages.
The following is an example of the CLI commands:
Table 22-18. Policy Binding CLI Commands
CLI Command Description
service-policy input
policy-map-name
no service-policy
input
Applies a policy map to the input of a particular
interface.
Use the no form of this command to detach a
policy map from an interface.
console(config-if)# service-policy input policy1698 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
QoS Statistics
This section describes how to view and manage QoS statistics.
It contains the following topics:
• Policer Statistics
• Aggregated Policer
• Queues StatisticsDell PowerConnect 55xx Systems User Guide 699
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Policer Statistics
A Single Policer is bound to a class map from a single policy. An Aggregate
Policer is bound to one or more class maps from one or more policies.
Use the Policer Statistics pages to view the number of in-profile and out-ofprofile packets received from an interface that meet the conditions defined in
the class map of a policy.
To view policer statistics:
1 Click Quality of Service QoS Statistics Policer Statistics to display the
Policer Statistics: Summary page.
Figure 22-17. Policer Statistics: Summary
The following statistics for the previously-defined counters are displayed:
– Interface — Statistics are displayed for this interface.
– Policy— Statistics are displayed for this policy.700 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
– Class Map — Statistics are displayed for this class map.
– In-Profile Bytes — Number of in-profile bytes received.
– Out-of-Profile Bytes — Number of out-of-profile bytes received.
2 Click Add to add a new counter that applies to another policy-class map.
3 Enter the fields:
– Interface — Select the interface for which the counter is defined.
– Policy - Class Map Name — Select a policy class map pair.
Defining Policer Statistics Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the Policer Statistics pages.
The following is an example of the CLI commands:
Table 22-19. Policer Statistics CLI Commands
CLI Command Description
qos statistics policer policymap-name class-map-name
no qos statistics policer
policy-map-name class-map-name
Enables counting in-profile and out-ofprofile bytes vis-a-vis a policer.
Use the no form of this command to
disable counting.
clear qos statistics Clears the statistics
show qos statistics Displays the statistics
console(config-if)# qos statistics policer policy1 class1 Dell PowerConnect 55xx Systems User Guide 701
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Aggregated Policer
To view aggregated policer statistics:
1 Click Quality of Service QoS Statistics Aggregate Policer to display
the Aggregate Policer: Summary page.
Figure 22-18. Aggregate Policer: Summary
The following statistics for the previously-defined counters are displayed:
– Aggregate Policer Name — Policer on which statistics are based.
– In-Profile Bytes — Number of in-profile packets that were received.
– Out-of-Profile Bytes — Number of out-of-profile packets that were
received.
2 To add a new counter that applies to another aggregate policer, click Add. 702 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
3 Select an aggregate policer in the Aggregate Policer Name field.
Defining Aggregate Policer Statistics Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the Aggregate Policer Statistics pages.
The following is an example of the CLI commands:
Queues Statistics
Queue statistics include statistics of forwarded and dropped packets, based
on interface, queue, and drop precedence. Lowest drop precedence has the
lowest probability of being dropped.
Table 22-20. Aggregate Policer Statistics CLI Commands
CLI Command Description
qos statistics aggregate-policer
aggregate-policer-name
no qos statistics aggregatepolicer aggregate-policer-name
Enables counting in-profile and
out-of-profile bytes vis-a-vis an
aggregate policer.
Use the no form of this command
to disable counting.
clear qos statistics Clears the statistics
show qos statistics Displays the statistics
console (config)# qos statistics aggregate-policer policer1 Dell PowerConnect 55xx Systems User Guide 703
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
To view Queue Statistics:
1 Click Quality of Service QoS Statistics Queues Statistics to display
the Queues Statistics: Summary.
Figure 22-19. Queues Statistics: Summary
The statistics for previously-defined counters are displayed.
– Counter Set —Number of counter.
– Port —Number of port.
– Queue —Number of queue.
– Total Packets —Number of packets forwarded or tail dropped.
– Tail Drop Packets —Percentage of packets that were tail dropped.704 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGQoS.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
2 To add a new counter, click Add, and enter the fields:
– Counter Set—Select the counter set. The possible options are:
• Set 1 — Displays the statistics that contains all interfaces and
queues with a high DP (Drop Precedence).
• Set 2 — Displays the statistics that contains all interfaces and
queues with a low DP.
– Interface — Select the unit/interface for which Queue statistics are
displayed.
– Queue — Select the queue on which packets were forwarded or tail
dropped.
Defining QoS Statistics Using CLI Commands
The following table summarizes the CLI commands for setting the fields in
the QoS Statistics pages.
The following is an example of the CLI commands:
Table 22-21. QoS Statistics CLI Commands
CLI Command Description
qos statistics queues set-number
{queue|all} {dp|all}
{[gigabitethernet|tengigabitethe
rnet]port-number|all}
no qos statistics queues setnumber
Enables QoS statistics for output
queues.
Use the no form of this command to
disable QoS statistics for output
queues.
clear qos statistics Clears the statistics
show qos statistics Displays the statistics
console(config)# qos statistics queues 1 all all allDell PowerConnect 55xx Systems User Guide 705
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Glossary
Figure 23-20. This glossary contains key technical words of interest.
A
Access Mode
Specifies the method by which user access is granted to the system.
Access Profiles
Allows network managers to define profiles and rules for accessing the switch
module. Access to management functions can be limited to user groups,
which are defined by the following criteria:
• Ingress interfaces
• Source IP address or Source IP subnets
ACL
Access Control List. Allow network managers to define classification actions
and rules for specific ingress ports.
Aggregated VLAN
Groups several VLANs into a single aggregated VLAN. Aggregating VLANs
enables routers to respond to ARP requests for nodes located on different subVLANs belonging to the same Super VLAN. Routers respond with their MAC
address.
ARP
Address Resolution Protocol. A protocol that converts IP addresses into
physical addresses.
ASIC
Application Specific Integrated Circuit. A custom chip designed for a specific
application.
Asset Tag
Specifies the user-defined switch module reference.
A BCDE F GHI L MNOP Q
RSTUVW706 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Authentication Profiles
Sets of rules which that enables login to and authentication of users and
applications.
Auto-negotiation
Allows 10/100 Mpbs or 10/100/1000 Mbps Ethernet ports to establish for the
following features:
• Duplex/Half Duplex mode
• Flow Control
• Speed
B
Back Pressure
A mechanism used with Half Duplex mode that enables a port not to receive
a message.
Backplane
The main BUS that carries information in the switch module.
Backup Configuration Files
Contains a backup copy of the switch module configuration. The Backup file
changes when the Running Configuration file or the Startup Configuration
file is copied to the Backup file.
Bandwidth
Bandwidth specifies the amount of data that can be transmitted in a fixed
amount of time. For digital switch modules, bandwidth is defined in Bits per
Second (bps) or Bytes per Second.
Bandwidth Assignments
The amount of bandwidth assigned to a specific application, user, or
interface.
Baud
The number of signaling elements transmitted each second.
Best Effort
Traffic is assigned to the lowest priority queue, and packet delivery is not
guaranteed.Dell PowerConnect 55xx Systems User Guide 707
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Boot Version
The boot version.
BootP
Bootstrap Protocol. Enables a workstation to discover its IP address, an IP
address of a BootP server on a network, or a configuration file loaded into the
boot of a switch module.
BPDU
Bridge Protocol Data Unit. Provide bridging information in a message format.
BPDUs are sent across switch module information with in Spanning Tree
configuration. BPDU packets contain information on ports, addresses,
priorities, and forwarding costs.
Bridge
A device that connect two networks. Bridges are hardware specific, however
they are protocol independent. Bridges operate at Layer 1 and Layer 2 levels.
Broadcast Domain
device sets that receive Broadcast frames originating from any device within a
designated set. Routers bind Broadcast domains, because routers do not
forward Broadcast frames.
Broadcasting
A method of transmitting packets to all ports on a network.
Broadcast Storm
An excessive amount of Broadcast messages simultaneously transmitted
across a network by a single port. Forwarded message responses are heaped
onto the network, overloading network resources or causing the network to
time out.
For more information about Broadcast storms, see "LACP Parameters" on
page 511.
C
CDB
Configuration Data Base. A file containing a device’s configuration
information.708 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Class of Service
Class of Service (CoS). Class of Service is the 802.1p priority scheme. CoS
provides a method for tagging packets with priority information. A CoS value
between 0-7 is added to the Layer II header of packets, where zero is the
lowest priority and seven is the highest.
A overlapping transmission of two or more packets that collide. The data
transmitted cannot be used, and the session is restarted.
CLI
Command Line Interface. A set of line commands used to configure the
system. For more information on using the CLI, see Using the CLI.
Communities
Specifies a group of users which retains the same system access rights.
CPU
Central Processing Unit. The part of a computer that processes information.
CPUs are composed of a control unit and an ALU.
D
DHCP Client
A device using DHCP to obtain configuration parameters, such as a network
address.
DHCP Snooping
DHCP Snooping expands network security by providing firewall security
between untrusted interfaces and DHCP servers.
DSCP
DiffServe Code Point (DSCP). DSCP provides a method of tagging IP
packets with QoS priority information.
Domain
A group of computers and devices on a network that are grouped with
common rules and procedures.
Duplex Mode
Permits simultaneous transmissions and reception of data. There are two
different types of duplex mode:Dell PowerConnect 55xx Systems User Guide 709
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
• Full Duplex Mode — Permits for bisynchronous communication, for
example, a telephone. Two parties can transmit information at the same
time.
• Half Duplex Mode — Permits asynchronous communication, for
example, a walkie-talkie. Only one party can transmit information at a
time.
Dynamic VLAN Assignment (DVA)
• Allows automatic assignment of users to VLANs during the RADIUS
server authentication. When a user is authenticated by the RADIUS
server, the user is automatically joined to the VLAN configured on the
RADIUS server.
E
Egress Ports
Ports from which network traffic is transmitted.
End System
An end user device on a network.
Ethernet
Ethernet is standardized as per IEEE 802.3. Ethernet is the most common
implemented LAN standard. Supports data transfer rates of Mpbs, where 10,
100 or 1000 Mbps is supported.
EWS
Embedded Web Server. Provides device management via a standard web
browser. Embedded Web Servers are used in addition to or in place of a CLI
or NMS.
F
FFT
Fast Forward Table. Provides information about forwarding routes. If a packet
arrives to a device with a known route, the packet is forwarded via a route
listed in the FFT. If there is not a known route, the CPU forwards the packet
and updates the FFT.710 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
FIFO
First In First Out. A queuing process where the first packet in the queue is the
first packet out of the queue.
Flapping
Flapping occurs when an interfaces state is constantly changing. For example,
an STP port constantly changes from listening to learning to forwarding. This
may cause traffic loss.
Flow Control
Enables lower speed devices to communicate with higher speed devices, that
is, that the higher speed device refrains from sending packets.
Fragment
Ethernet packets smaller than 576 bits.
Frame
Packets containing the header and trailer information required by the physical
medium.
G
GARP
General Attributes Registration Protocol. Registers client stations into a
Multicast domain.
Gigabit Ethernet
Gigabit Ethernet transmits at 1000 Mbps, and is compatible with existing
10/100 Mbps Ethernet standards.
GVRP
GARP VLAN Registration Protocol. Registers client stations into a VLANs.
H
HOL
Head of Line. Packets are queued. Packets at the head of the queue are
forwarded before packets at the end of the line.Dell PowerConnect 55xx Systems User Guide 711
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Host
A computer that acts as a source of information or services to other
computers.
HTTP
HyperText Transport Protocol. Transmits HTML documents between servers
and clients on the internet.
I
IC
Integrated Circuit. Integrated Circuits are small electronic devices composed
from semiconductor material.
ICMP
Internet Control Message Protocol. Allows gateway or destination host to
communicate with a source host, for example, to report a processing error.
IEEE
Institute of Electrical and Electronics Engineers. An Engineering
organization that develops communications and networking standards.
IEEE 802.1d
Used in the Spanning Tree Protocol, IEEE 802.1d supports MAC bridging to
avoid network loops.
IEEE 802.1p
Prioritizes network traffic at the data-link/MAC sublayer.
IEEE 802.1Q
Defines the operation of VLAN Bridges that permit the definition, operation,
and administration of VLANs within Bridged LAN infrastructures.
IGMP Snooping
IGMP Snooping examines IGMP frame contents, when they are forwarded by
the device from work stations to an upstream Multicast router. From the
frame, the device identifies work stations configured for Multicast sessions,
and which Multicast routers are sending Multicast frames.712 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Image File
System images are saved in two Flash sectors called images (Image 1 and
Image 2). The active image stores the active copy; while the other image
stores a second copy.
Ingress Port
Ports on which network traffic is received.
IP
Internet Protocol. Specifies the format of packets and there addressing
method. IP addresses packets and forwards the packets to the correct port.
IP Address
Internet Protocol Address. A unique address assigned to a network device
with two or more interconnected LANs or WANs.
IP Version 6 (IPv6)
A version of IP addressing with longer addresses than the traditional IPv4.
IPv6 addresses are 128 bits long, whereas IPv4 addresses are 32 bits; allowing a
much larger address space.
ISATAP
Intra-Site Automatic Tunnel Addressing Protocol .
ISATAP is an automatic overlay tunneling mechanism that uses the
underlying IPv4 network as a non-Broadcast/multicast access link layer for
IPv6. ISATAP is designed for transporting IPv6 packets within a site where a
native IPv6 infrastructure is not yet available.
L
LAG
Link Aggregated Group. Aggregates ports or VLANs into a single virtual port
or VLAN.
For more information on LAGs, see Defining LAG Membership.
LAN
Local Area Networks. A network contained within a single room, building,
campus or other limited geographical area.Dell PowerConnect 55xx Systems User Guide 713
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Layer 2
Data Link Layer or MAC Layer. Contains the physical address of a client or
server station. Layer 2 processing is faster than Layer 3 processing because
there is less information to process.
Layer 3
Establishes a connections and ensures that all data arrives to their
destination. Packets inspected at the Layer 3 level are analyzed and
forwarding decisions, based on their applications.
LLDP-MED
Link Layer Discovery Protocol - Media Endpoint Discovery. LLDP allows
network managers to troubleshoot and enhance network management by
discovering and maintaining network topologies over multi-vendor
environments. MED increases network flexibility by allowing different IP
systems to co-exist on a single network LLDP.
Load Balancing
Enables the even distribution of data or processing packets across available
network resources. For example, load balancing may distribute the incoming
packets evenly to all servers, or redirect the packets to the next available
server.
M
MAC Address
Media Access Control Address. The MAC Address is a hardware specific
address that identifies each network node.
MAC Address Learning
MAC Address Learning characterizes a learning bridge, in which the packet’s
source MAC address is recorded. Packets destined for that address are
forwarded only to the bridge interface on which that address is located.
Packets addressed to unknown addresses are forwarded to every bridge
interface. MAC Address Learning minimizes traffic on the attached LANs.
MAC Layer
A sub-layer of the Data Link Control (DTL) layer.714 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Mask
A filter that includes or excludes certain values, for example parts of an IP
address.
For example, Unit 2 is inserted in the first minute of a ten-minute cycle, and
Unit 1 is inserted in fifth minute of the same cycle, the units are considered
the same age.
MD5
Message Digest 5. An algorithm that produces a 128-bit hash. MD5 is a
variation of MD4, and increases MD4 security. MD5 verifies the integrity of
the communication, authenticates the origin of the communication.
MDI
Media Dependent Interface. A cable used for end stations.
MDIX
Media Dependent Interface with Crossover (MDIX). A cable used for hubs
and switches.
MIB
Management Information Base. MIBs contain information describing specific
aspects of network components.
Multicast
Transmits copies of a single packet to multiple ports.
N
NA
Neighbor Advertisement.
ND
Neighbor Discovery.
NS
Neighbor Solicitation.
NMS
Network Management System. An interface that provides a method of
managing a system.Dell PowerConnect 55xx Systems User Guide 715
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Node
A network connection endpoint or a common junction for multiple network
lines. Nodes include:
• Processors
• Controllers
• Workstations
O
OID
Organizationally Unique Identifiers. Identifiers associated with a Voice
VLAN.
OUI
Object Identifier. Used by SNMP to identify managed objects. In the SNMP
Manager/Agent network management paradigm, each managed object must
have an OID to identify it.
P
Packets
Blocks of information for transmission in packet switched systems.
PDU
Protocol Data Unit. A data unit specified in a layer protocol consisting of
protocol control information and layer user data.
PING
Packet Internet Groper. Verifies if a specific IP address is available. A packet is
sent to another IP address and waits for a reply.
Port
Physical ports provide connecting components that allow microprocessors to
communicate with peripheral equipment.
Port Mirroring
Monitors and mirrors network traffic by forwarding copies of incoming and
outgoing packets from one port to a monitoring port.
For more information on port mirroring, see Defining Port Mirroring Sessions.716 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Protocol
A set of rules that governs how devices exchange information across networks.
PVE
Protocol VLAN Edge. A port can be defined as a Private VLAN Edge (PVE)
port of an uplink port, so that it will be isolated from other ports within the
same VLAN.
Q
QoS
Quality of Service. QoS allows network managers to decide how and what
network traffic is forwarded according to priorities, application types, and
source and destination addresses.
Query
Extracts information from a database and presents the information for use.
R
RA
RADIUS Advertisement.
RD
RADIUS Discovery.
RS
Router Solicitation.
RADIUS
Remote Authentication Dial-In User Service. A method for authenticating
system users, and tracking connection time.
RMON
Remote Monitoring. Provides network information to be collected from a
single workstation.
RouterDell PowerConnect 55xx Systems User Guide 717
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
A device that connects to separate networks. Routers forward packets
between two or more networks. Routers operate at a Layer 3 level.
RSTP
Rapid Spanning Tree Protocol. Detects and uses network topologies that
allow a faster convergence of the spanning tree, without creating forwarding
loops.
Running Configuration File
Contains all startup configuration file commands, as well as all commands
entered during the current session. After the switch module is powered down
or rebooted, all commands stored in the Running Configuration file are lost.
S
Segmentation
Divides LANs into separate LAN segments for bridging. Segmentation
eliminates LAN bandwidth limitations.
Server
A central computer that provides services to other computers on a network.
Services may include file storage and access to applications.
SNMP
Simple Network Management Protocol. Manages LANs. SNMP based
software communicates with network devices with embedded SNMP agents.
SNMP agents gather network activity and device status information, and send
the information back to a workstation.
SNTP
Simple Network Time Protocol. SNTP assures accurate network switch clock
time synchronization up to the millisecond.
SoC
System on a Chip. An ASIC that contains an entire system. For example, a
telecom SoC application can contain a microprocessor, digital signal
processor, RAM, and ROM.718 Dell PowerConnect 55xx Systems User Guide
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Spanning Tree Protocol
Prevents loops in network traffic. The Spanning Tree Protocol (STP) provides
tree topography for any arrangement of bridges. STP provides one path
between end stations on a network, eliminating loops.
SSH
Secure Shell. Permits logging to another computer over a network, execute
commands on a remote machine, and move files from one machine to
another. Secure Shell provides strong authentication and secure
communications methods over insecure channels.
Startup Configuration
Retains the exact switch module configuration when the switch module is
powered down or rebooted.
Subnet
Sub-network. Subnets are portions of a network that share a common address
component. On TCP/IP networks, devices that share a prefix are part of the
same subnet. For example, all devices with a prefix of 157.100.100.100 are
part of the same subnet.
Subnet Mask
Used to mask all or part of an IP address used in a subnet address.
Switch
Filters and forwards packets between LAN segments. Switches support any
packet protocol type.
T
TCP/IP
Transmissions Control Protocol. Enables two hosts to communicate and
exchange data streams. TCP guarantees packet delivery, and guarantees
packets are transmitted and received in the order their sent.
Telnet
Terminal Emulation Protocol. Enables system users to log in and use
resources on remote networks. Dell PowerConnect 55xx Systems User Guide 719
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\CxUGGlossary.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
TFTP
Trivial File Transfer Protocol. Uses User Data Protocol (UDP) without
security features to transfer files.
Trap
A message sent by the SNMP that indicates that system event has occurred.
Trunking
Link Aggregation. Optimizes port usage by linking a group of ports together
to form a single trunk (aggregated groups).
U
UDP
User Data Protocol. Transmits packets but does not guarantee their delivery.
Unicast
A form of routing that transmits one packet to one user.
V
VLAN
Virtual Local Area Networks. Logical subgroups with a Local Area Network
(LAN) created via software rather than defining a hardware solution.
VoIP
Voice over IP.
W
WAN
Wide Area Networks. Networks that cover a large geographical area.
Wildcard Mask
Specifies which IP address bits are used, and which bits are ignored. A wild
switch module mask of 255.255.255.255 indicates that no bit is important. A
wildcard of 0.0.0.0 indicates that all the bits are important. 720
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Index
Numerics
24/48 G Ports 37
802.1ab (LLDP-MED) 28
802.1d 22
802.1Q 476, 482
A
AC unit 44
Acceptable Frame Type 471
Access Control Lists 31
Access mode 329
Access ports 469
Access Profile Rules (ACEs) 262
Access profiles 261, 272
Accessing the device through the
CLI 71
ACE, IPv4 110
ACL binding 123
ACL, IPv4 109
ACL, IPv6 118
ACLs 31, 103
Active users 275
Address pool 301
Address Resolution Protocol 249,
706
Address Tables 422
Administrator Buttons 91
Advanced QoS 25
Advanced Switch Configuration 67
Aggregate Policer 686, 701
Aggregated VLAN 706
Alarms 638
Anycast 178, 183
Apply&Save 91
ARP 249, 251, 706
ARP inspection 31
ARP, dynamic inspection 560
ARP, dynamic inspection list 564
ARP, dynamic inspection list
entries 566
ARP, global settings 562
ARP, trusted interfaces 570
ARP, VLAN settings 568
Asset 156
Assignment to hardware queues
651
Authentication methods 134
Authentication profiles 269721
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Auto update, configuration/image
file 338
Automatic aging for MAC
addresses 19
Auto-Negotiation 18
B
Back panel 39, 44
Back Pressure 17, 386
Bandwidth 664
Boot Image Download 85
Booting the Switch 60
BootP 24, 708
BootP and DHCP Clients 24
BPDU 438, 456, 708
BPDU Guard 23
BPDU Handling 438
Bridge Multicast Forward All 525
Bridge Multicast Groups 521
Bridge Protocol Data Unit 708
Broadcast 179, 183
Broadcast Storm Control 20
Buttons 38
C
Cables testing 256
CBC 315
Cipher Block-Chaining 315
Class Mapping 682
Class of Service 709
Classic lock 98
Classic STP 435
CLI 27, 68, 71, 261
CLI macro 31
Clock Source 181
Command Line Interface 27
Command Mode Overview 68
Configuration file 354
Configuration file download 352
Configuration using the Setup
Wizard 61
Configuration Work Flow 58
Configuring Login Banners 78
Configuring the Stack 61
Configuring the Switch 57
Connecting the Switch to the
Terminal 59
Console 269, 272
Console access 291
Copying files 361
CoS 709
CoS 802.1p support 24
CoS to Queue 660
Counter Summary 612
CPU Utilization 648722
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
D
Daylight Savings Times 170
Default domain names 245
Default Gateway, IPv6 226
Defining device information 156
Denied ACEs Counters 608
Device representation 89
Device structure 36
DHCP 572
DHCP client 24, 297
DHCP limitations 575
DHCP Relay 586
DHCP Relay, global settings 589
DHCP Relay, limitations 587
DHCP Relay, Option 82 Overview
587
DHCP server 32, 297, 299
DHCP server properties 298
DHCP server, retreiving an IP
address 72
DHCP Snooping 31, 573
DHCP, global parameters 575
DHCP, trusted interfaces 581
DHCP, VLAN settings 579
DiffServe Code Point 709
DNS 28, 242
Domain 709
Domain Name System 28, 242
Dot1x 29
Dot1x Authentication 132
Download, boot image 85
Download, system image 83
Download, TFTP 353
Download, USB/HTTP 351
Downloading software 80, 337
DSCP 709
DSCP Mapping 680
DSCP Rewrite 671
DST Times 170
Duplex mode 709
DVA 134, 710
Dynamic ACL
Assignment/Dynamic Policy
Assignment (DACL/DPA) 31
Dynamic Addresses 427
Dynamic addresses 428
Dynamic Policy/ACL Assignment
134
Dynamic VLAN Assignment 141
Dynamic VLAN Assignment
(DVA) 134, 710
E
E-911 541
EAP 29, 132
EAP Statistics 622723
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Egress ports 710
Egress Shaping Rates 664
Emergency Call Service 541
Enable 282
Enable passwords 281
End System 710
Erase FLASH File 81
Etherlike Statistics 616
Ethernet 710
Events 634
Events log 637
EWS 710
Excluded addresses 306
Excluding addresses 307
Extensible Authentication
Protocol 29, 132
F
Fans 160
Fast Forward Table 710
Fast link 23, 442, 447
FFT 710
FIFO 711
File information 365
Filtering 477, 483, 517
Filtering L2 Multicast Packets 517
Firmware download 352
First In First Out 711
Flapping 711
Flow Control 386, 711
Flow Control Support (IEEE
802.3X) 17
Flow Monitoring (sflow) 26
Forwarding L2 Multicast Packets
517
Fragment 711
Frame 711
Frame Flow 468
Front Panel 37
Full 802.1Q VLAN Tagging
Compliance 21
G
GARP 430, 433, 711
GARP timers 432
GARP VLAN Registration Protocol
21, 711
General Ports 470
General Switch Information 156
Generic Attributes Registration
Protocol 711
Giga Port LEDs 42
Gigabit Ethernet 711
Global Configuration Mode 69
Green Ethernet 17724
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Green Ethernet Configuration 390
Guest VLAN 22
GVRP 620, 711
GVRP parameters 490
GVRP statistics 619
GVRP Support 21
H
Hardware description 35
Hardware version 370
Hash 181
HDMI port LEDs 43
HDMI ports 37
Head of Line Blocking Prevention
17
Help 91
HMAC-SHA-96 326
HOL 17, 711
Host 712
Host name mapping 247
HTTP 261, 269, 286, 712
HTTP password, configuring 77
HTTPS 261, 264, 269, 286
HyperText Transport Protocol 712
I
IC 712
ICMP 712
Icons 91
Identifying a switch via LED 33
IEEE 712
IEEE 802.1d 712
IEEE 802.1p 712
IEEE 802.1Q 21, 712
IEEE 802.1s Multiple Spanning
Tree 23
IEEE 802.1w Rapid Spanning Tree
23
IGMP 518
IGMP Snooping 20, 527, 712
Image file 713
Image files, active 360
Information Buttons 91
Ingress port 713
Ingress Rate Limit 664
Interface Configuration Mode 70
Interface Statistics 614
IP 713
IP address from a BOOTP Server
73
IP Addressing 209
IP Version 6 (IPv6) Support 16
IPv4 Interfaces 210
IPv6 Default Gateway 226
IPv6 Interfaces 221725
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
IPv6 Neighbors 235
IPv6 Routes Table 239
IPv6-based ACL 117
ISATAP 229
iSCSI 595
iSCSI Sessions 603, 605
iSCSI Targets 601
iSCSI, global parameters 598
iSCSI, limitations 596
iSCSI, optimization 32, 594
J
Jumbo Frames 388
L
LACP parameters 511
LAG configuration 409
LAG membership 514
LAG statistics 645
LAGs 24, 508, 525, 713
LAGs Settings 481
LAN 713
Layer 2 714
Layer 2 Features 20
Layer 2 Switching 517
Layer 3 714
LED Definitions 40
LEDs 38, 42
LEDs on Front Panel 38
Light Emitting Diodes 40
Limited dynamic lock 98
Line passwords 279
Link Aggregated Group 713
Link aggregation 24, 508, 510
Link Aggregation and LACP 24
Link Control Protocol (LCP)
packets 399, 451
Link Layer Discovery Protocol -
Media Endpoint Discovery 714
Link/Duplex/Activity LEDs 42
LLDP 540
LLDP MED Port Settings 552
LLDP Media Endpoint Discovery
541
LLDP Port Settings 546
LLDP properties 542
LLDP-MED 28, 541, 714
Load Balancing 714
Loading Software into Stack
Members 54
Local User Database 277
Location LED 373
Locked ports 29, 100, 105, 108,
110, 115, 118, 121, 124, 126,
130, 580, 582, 584726
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Log file in Flash 202
Logging Global Parameters 196
Logging Severity Level - Alert 196
Logging Severity Level - Critical
196
Logging Severity Level - Debug
196
Logging Severity Level -
Emergency 196
Logging Severity Level - Error 196
Logging Severity Level -
Informational 196
Logging Severity Level - Notice
196
Logging Severity Level - Warning
196
Login Banners 78
Login History 203
Logs 195
Loops 435
M
MAC Address Capacity Support 18
MAC address learning 714
MAC addresses 98, 714
MAC addresses, supported
features 18
MAC Layer 714
MAC Multicast Support 19
Mac-based ACE 106
Mac-based ACL 104
Management Access Lists 262
Management Access Methods 272
Management Information Base
314, 715
Management IP Address Conflict
Notification 26
Management methods 264
Management security 261
Managing configuration files on
the stack 54
Manual Time Setting 169
Mask 715
MD5 181, 715
MDI 406, 715
MDI/MDIX 18, 385
MDIX 406, 715
MED Network Policy 549
Media Endpoint Discovery 549
Message Digest 5 181, 715
MIB 314, 715
Monitoring users 146
MPS 44
MST Properties 456
MSTP 23, 455
MSTP Instance Settings 460
MSTP Interface Settings 462727
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Multicast 516, 525
Multicast TV VLAN 22
Multicast TV VLAN Mapping 537
Multicast TV VLAN Membership
535
Multiple STP (MSTP) 435
N
ND 715
Neighbor Advertisement 715
Neighbor Discovery. 715
Neighbor Solicitation 715
Neighbors 557
Neighbors, IPv6 235
Network Control Protocols 399,
451
Network Management System 715
Network pool 303
NMS 715
NS 715
O
Object ID 315
OID 315
Optical transciever diagnostics 258
Option 82 587
OUI 504
P
Packets 716
Password configuration 75
Password management 30, 286
Password recovery 82
Passwords 88, 282
Path Cost 438
PDU 716
PING 716
PoE 16, 162
Policer Statistics 699
Policers 685
Policy Binding 696
Policy Table 689
Port 716
Port Configuration 403
Port default settings 386
Port LEDs 40, 42
Port mirroring 20, 417, 716
Port modes 469
Port profile 31
Port representation 89
Port security 98
Port settings 475
Port-based Authentication 132
Port-based Authentication
(Dot1x) 29728
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Port-based Virtual LANs (VLANs)
21
Ports 37, 89, 384, 645
Ports, statistics 643
Power over Ethernet 16
Power supplies 44
Print 91
Private VLAN 22, 494
Privileged EXEC Mode 68
Proprietary Protocol Filtering 32,
125
Protected Port Configuration 395
Protected ports 32, 394
Protected ports, restrictions 394
Protocol 717
Protocol Group 484, 485
Protocol Ports 488
Protocol VLAN Edge 717
PVE 717
PVID 475, 482
Q
QinQ 469
QoS 24, 656, 717
QoS Advanced mode 676
QoS Basic mode 670
QoS Modes 653
QoS Properties 655
QoS, Advanced Mode, Workflow
679
QoS, Aggregate Policer 686
QoS, assignment to hardware
queues 651
QoS, Bandwidth 664
QoS, Basic mode 669
QoS, Basic Mode, Workflow 669
QoS, Class Mapping 682
QoS, DSCP Mapping 680
QoS, DSCP Rewrite 671
QoS, DSCP to Queue 662
QoS, Mapping to Queue 659
QoS, Policer Statistics 699
QoS, Policers 684
QoS, Policy Binding 696
QoS, Policy Class Maps 692
QoS, Policy Table 689
QoS, Queues 656
QoS, Single Policer 686
QoS, Statistics 697
QoS, Traffic Classification 651
QoS, Trust Mode 674
Quality of Service 650, 653, 717
R
RA 717
RADIUS 271, 291, 717729
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
RADIUS Advertisement 717
RADIUS client 29
RADIUS discovery 717
RADIUS server 291
RAM Log 200
Rapid Spanning Tree 450
Rapid Spanning Tree Protocol 450,
718
Rapid STP 435, 452, 464
RD 717
Rebooting the Stack 54
Refresh 92
Registered Multicast Group 517
Remote Authentication Dial-In
User Service 29, 717
Remote Authorization Dial-In
User Service 291
Remote Log Server 206
Remote Monitoring 27, 717
Reset button 38
Retrieving an IP Address 72
RMON 625, 628, 629, 717
RMON Statistics 625, 626
Router Solicitation 717
Routes Table, IPv6 239
RS 717
RS-232 Console Port 37
RSTP 23, 450, 718
Rules 262
Running Configuration File 337,
718
S
Secure Shell 291
Secure Telnet (SSH) 261, 272
Security Features 29
Security Management 75
Segmentation 718
Selecting the Master and Master
Backup Units 51
Self-Learning MAC Addresses 19
Server 718
Set Terminal Baud-Rate 82
Setup Wizard 61
sFlow 375
sFlow interface 380
sFlow receiver 377
sFlow statistics 382
SFP 44
SFP LEDs 44
Simple Network Management
Protocol 718
Simple Network Time Protocol 28,
178
Single Policer 686
SMMP groups 322730
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
SNMP 261, 264, 286, 314, 718
SNMP access rights 315
SNMP communities 327
SNMP global parameters 316
SNMP logs 25
SNMP Model OIDs 316
SNMP notification filters 330
SNMP notification recipients 333
SNMP users 324
SNMP Versions 1, 2, and 3 26
SNMP views 319
SNTP 28, 178
SNTP Authentication 184
SNTP Global Settings 183
SNTP Servers 187
Software Download 83
Software version 370
Spanning Tree Protocol 22, 435,
719
SPF LEDs 40, 42
SSH 30, 264, 269, 286, 719
SSH password, configuring 77
SSL 29
Stack ID LED 44
Stack management 46, 367
Stack Menu 82
Stack Support 16
Stacking 46
Stacking failover topology 49
Stacking, adding a unit to the stack
50
Stacking, assigning unit IDs 50
Stacking, automatic assignment of
unit IDs 50
Starting the Application 88
Startup Configuration 337, 719
Startup file 337
Startup Menu 80
Static addresses 424, 425
Static hosts 308, 310
Statistics 606
Statistics, alarms 638
Statistics, Counter Summary 612
Statistics, CPU Utilization 648
Statistics, Denied ACEs Counters
608
Statistics, EAP 622
Statistics, Etherlike 616
Statistics, events control 634
Statistics, events log 637
Statistics, GVRP 619
Statistics, history control 629
Statistics, history table 631
Statistics, Interface Statistics 614
Statistics, LAGs 645
Statistics, ports 643731
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
Statistics, QoS 698
Statistics, Utilization Summary
610
Storm control 414
STP 22, 444
STP BPDU Guard 23
STP mode 437
STP port settings 442
STP, bridge settings 438
STP, classic 437
STP, designated roots 439
STP, LAG settings 447
Subnet 719
Subnet Mask 719
Switch 719
Switching from the Master to the
Backup Master 53
SYSLOG 195
System Image Download 83
System LEDs 40
T
Table Views 607
TACACS+ 30, 271, 282
TCP Congestion Avoidance 25,
666
TCP/IP 719
TDR technology 256
Telnet 261, 264, 269, 272, 280, 286,
291, 719
Telnet Connection 71
Telnet password, configuring 76
Terminal Access Controller Access
Control System 282
Terminal Connection 72
TFTP 27, 720
Time Domain Reflectometry 256
Time range 127
Time range, absolute 128
Time range, recurring 129
Time synchronization 169
Traffic Classification 651
Traffic limitation methods 656
Traffic limitation, combination of
WRR and Strict Priority 657
Traffic limitation, Strict Priority
656
Traffic limitation, Weighted
Round Robin (WRR) 656
Trap 720
Tree view 88
Trivial File Transfer Protocol 720
Trunk Ports 469
Trunking 720
Tunnel, ISATAP 229732
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
U
UDP 720
UDP relay 253
Unauthenticated VLAN and Guest
VLANs 135
Understanding the interface 88
Unicast 178, 183
Unit ID 367
Unit identification 373
Unregistered Multicast Group 517
Uploading files 355
Uploading files, TFTP 357
Uploading files, USB/HTTP 356
USB File Transfer Protocol 27
USB port 38
User Data Protocol 720
User Security Model 314
Using Dell OpenManage Switch
Administrator 87
Using the CLI 68
USM 314
Utilization Summary 610
V
Ventilation System 40
Versions, hardware/software 370
Virtual Local Area Networks 720
VLAN 21, 466, 472, 473, 525, 720
VLAN frame flow 468
VLAN membership 472
VLAN settings, DHCP 579
VLAN Support 21
VLAN to MSTP Instance 458
VLAN, ARP settings 568
VLAN, LAG settings 481
VLAN, port settings 475
VLAN, private 494
VLAN, special cases 468
VLAN, voice 498
VLAN-aware MAC-based
Switching 19
Voice VLAN 21, 498
Voice VLAN OUI 504
VoIP 720
W
Warm standby 52
Web access 291
Web management system icons 91
Web-Based Management 26
Weighted Round Robin (WRR)
656733
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
X
XG Ports 37734
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Maintenance Projects\Dell
Contax\sources\Dell_ContaxUG_PrintIX.fm
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLYDell PowerConnect 55xx Systems User Guide 735
DELL CONFIDENTIAL – PRELIMINARY 3/11/13 - FOR PROOF ONLY
25
Revision History
Rev Date Description
A7 Mar. 11, 2013 Made the following corrections:
• Added comment that GVRP is only operational on ports
in general mode.
A6 Sept. 3, 2012 Made the following corrections:
• Added Power Limit field in "Power over Ethernet" on
page 162
• Corrected number of ports that can be mirrored to 4
• Corrected number of OUIs from 128 to 16.
• Corrected parameters to show power inline command.
• Added description of when traps are generated in "Power
over Ethernet" on page 162.
A5 May 1, 2012 Added "Auto-Update/Configuration Feature" on page 338
A4 April 4, 2012 Made the following corrections:
• Put a the note (of the recommendation of using HDMI
cable version to 1.4 for stacking) more clearly.
• Fixed RDP description
A4 April 2, 2012 Following corrections made:
• Add description regarding the Egress ACL feature
• Enter comments regarding the PVLAN feature.
• Fixed RDP abbreviation to Reliable Data Protocol in
ACL section.
• Add the recommendation of using HDMI cable version
to 1.4 for stacking
A3 Jan 31, 2012 Corrected command in private VLAN CLI command.
A2 Sept 21, 2011 Entered comment that enabling iSCSI also enables flow
control on all interfaces.www.dell.com|support.dell.com
Printed in the U.S.A.
Dell PowerConnect
5500 Series
Getting Started Guide
Regulatory Models: PowerConnect 5524, 5524P, 5548, 5548P
ContaxGS.book Page 1 Friday, August 20, 2010 1:53 PMNotes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you
make better use of your system.
CAUTION: A CAUTION indicates potential damage to
hardware or loss of data if instructions are not followed.
WARNING: A WARNING indicates a potential for property
damage, personal injury, or death.
____________________
Information in this document is subject to change without notice.
© 2010 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written
permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell, the DELL logo, Inspiron, Dell Precision,
Dimension, OptiPlex, Latitude, PowerEdge, PowerVault, PowerApp, Dell
OpenManage and the YOURS IS HERE logo are trademarks of Dell Inc.; Intel,
Pentium, and Celeron are registered trademarks of Intel Corporation in the U.S.
and other countries; Microsoft, Windows, Windows Server, MS-DOS and
Windows Vista are either trademarks or registered trademarks of Microsoft
Corporation in the United States and/or other countries.
Other trademarks and trade names may be used in this document to refer to either
the entities claiming the marks and names or their products. Dell Inc. disclaims
any proprietary interest in trademarks and trade names other than its own.
Regulatory Models: PowerConnect 5524, 5524P, 5548, 5548P
September 2010 P/N JN2W1 A01
ContaxGS.book Page 2 Friday, August 20, 2010 1:53 PMContents 3
Contents
1 Installation . . . . . . . . . . . . . . . . . . . . . . . . 5
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . 5
Site Preparation . . . . . . . . . . . . . . . . . . . . . . 5
Unpacking . . . . . . . . . . . . . . . . . . . . . . . . . 6
Package Contents . . . . . . . . . . . . . . . . . . 6
Unpacking the Switch . . . . . . . . . . . . . . . . 6
Installing the Switch. . . . . . . . . . . . . . . . . . . . 7
Installing in a Rack . . . . . . . . . . . . . . . . . . 7
Installing on a Flat Surface . . . . . . . . . . . . . . 8
Connecting the Switch to Power Supplies . . . . . . . . 8
2 Stacking. . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . 9
Stacking Switches. . . . . . . . . . . . . . . . . . . . . 9
Unit ID Assignment . . . . . . . . . . . . . . . . . . . 11
Automatic Assignment . . . . . . . . . . . . . . . 11
Manual Assignment . . . . . . . . . . . . . . . . 12
ContaxGS.book Page 3 Friday, August 20, 2010 1:53 PM4 Contents
3 Configuring the Switch . . . . . . . . . . . . . 13
Configuration Work Flow . . . . . . . . . . . . . . . . 13
Connecting the Switch to the Terminal . . . . . . . . . 14
Booting the Switch. . . . . . . . . . . . . . . . . . . . 15
Configuring the Stack . . . . . . . . . . . . . . . . . . 16
Configuration Using the Setup Wizard . . . . . . . . . 16
ContaxGS.book Page 4 Friday, August 20, 2010 1:53 PMGetting Started Guide 5
Installation
Overview
This guide describes how to install and run the PowerConnect 5500 series
switches. For more information, see the Dell PowerConnect 5500 Series User
Guide, available on your Documentation CD, or check the Dell Support
website at support.dell.com/manuals for the latest updates on documentation
and software.
In this document, the word "switch" refers to either a single switch or a group
of stacked switches.
For a complete description of the PowerConnect 5500 series switch, see the
Dell PowerConnect 5500 Series User Guide, available on your Documentation
CD.
NOTE: Even though the graphics in this guide show the Dell PowerConnect 5524P
device, the instructions are the same for all models.
Site Preparation
PowerConnect 5500 series switches can be mounted in a standard 48.26-cm
(19-inch) equipment rack or placed on a tabletop. Before installing the unit,
verify that the chosen location for installation meets the following site
requirements:
• Power —
– The unit is installed near an easily accessible 100-240 VAC, 50-60 Hz
outlet.
– If a Redundant Power Supply (RPS) or a Modular Power Supply
(MPS) is being used, check that it is easily accessible.
• Clearance — There is adequate frontal clearance for operator access.
Allow clearance for cabling, power connections, and ventilation.
ContaxGS.book Page 5 Friday, August 20, 2010 1:53 PM6 Installation
• Cabling — The cabling is routed to avoid sources of electrical noise, such
as radio transmitters, broadcast amplifiers, power lines, and fluorescent
lighting fixtures.
• Ambient Requirements — The ambient unit operating temperature range
is 0 to 45ºC (32 to 113ºF) at a relative humidity of 10% to 90%, noncondensing.
Unpacking
Package Contents
While unpacking the switch, ensure that the following items are included:
• Switch
• AC power cable
• RS-232 cable with a male 8-pin RJ-45 connector
• Self-adhesive rubber pads
• Rack-mount kit for rack installation
• Documentation CD
Unpacking the Switch
NOTE: Before unpacking the switch, inspect the package and immediately report
any evidence of damage.
To unpack the switch:
1 Place the box on a clean flat surface.
2 Open the box or remove the box top.
3 Carefully remove the switch from the box and place it on a secure and
clean surface.
4 Remove all packing material.
5 Inspect the switch and accessories for damage. Report any damage
immediately to the dealer.
ContaxGS.book Page 6 Friday, August 20, 2010 1:53 PMInstallation 7
Installing the Switch
The PowerConnect 5500 Series switches can be:
• Installed on a rack
• Placed on a flat surface
Installing in a Rack
CAUTION: Disconnect all cables from the unit before mounting the switch in a
rack or cabinet.
CAUTION: When mounting multiple switches into a rack, mount the switches
from the bottom up.
To install the switch in a rack:
1 Place the supplied rack-mounting bracket on one side of the switch,
ensuring that the mounting holes on the switch line up to the mounting
holes on the rack-mounting bracket.
Figure 1-1 illustrates where to mount the brackets.
Figure 1-1. Bracket Installation for Rack Mounting
2 Insert the supplied screws into the rack-mounting holes and tighten with a
screwdriver.
ContaxGS.book Page 7 Friday, August 20, 2010 1:53 PM8 Installation
3 Repeat the process for the rack-mounting bracket on the other side of the
switch.
4 Insert the unit into the 48.26-cm (19-inch) rack, ensuring that the
rack-mounting holes on the switch line up to the mounting holes on the
rack.
5 Secure the unit to the rack with the rack screws (not provided). Fasten the
lower pair of screws before the upper pair of screws. Ensure that the
ventilation holes are not obstructed.
Installing on a Flat Surface
Install the switch on a flat surface if it is not installed on a rack. The surface
must be able to support the weight of the switch and the switch cables.
To install the switch on a flat surface:
1 Attach the self-adhesive rubber pads on each marked location on the
bottom of the chassis.
2 Set the switch on a flat surface, leaving 5.08 cm (2 inches) on each side
and 12.7 cm (5 inches) at the back.
3 Ensure that the switch has proper ventilation.
Connecting the Switch to Power Supplies
Each switch in the stack must be connected to an AC power supply.
The power connectors are positioned on the back panel. Connecting a
Redundant Power Supply (RPS) or Modular Power Supply (MPS) is optional,
but recommended. The RPS or MPS connector is on the back panel of the
switch. The RPS is used for non-PoE switches and MPS is used for PoE
switches.
Figure 1-2. Back-Panel Power Connector
RPS or MPS A/C Power Supply
ContaxGS.book Page 8 Friday, August 20, 2010 1:53 PMGetting Started Guide 9
Stacking
Overview
Each switch is a member in a stack, although the stack may consist of only a
single switch. Up to eight switches are supported per stack.
All stacks must have a Master unit, and may have a Master Backup unit. All
other switches are connected to the stack as members (slaves).
Stacking Switches
PowerConnect 5500 series switches use two HDMI 10G ports for stacking.
To connect the switches in the stack:
1 Insert one end of an HDMI cable into the left-hand HDMI port on the
switch at the top of the stack and the other end into the right-hand HDMI
port of the switch immediately below it.
2 Repeat this process until all switches are connected.
3 (Optional) Connect the left-hand HDMI port of the switch at the bottom
of the stack to the right-hand HDMI port of the switch at the top of the
stack. This step provides increased bandwidth and redundancy.
ContaxGS.book Page 9 Friday, August 20, 2010 1:53 PM10 Stacking
Figure 2-1 shows this process.
Figure 2-1. Stacking Cable Diagram
HDMI Ports
Front Panel
HDMI Ports
Front Panel
HDMI Ports
Front Panel
Front Panel
HDMI Ports
ContaxGS.book Page 10 Friday, August 20, 2010 1:53 PMStacking 11
Unit ID Assignment
Each switch in the stack has a unique unit ID that defines the unit’s position
and function in the stack.
Figure 2-2 describes the stacking LEDs on the front panel of the switch.
Figure 2-2. Stacking LEDs on Front Panel
The Unit ID of each switch can be either automatically assigned or manually
assigned, as described below.
Automatic Assignment
When you power-up the stack, each switch is assigned a unique Unit ID. This
is displayed on the front panel of the switch, as shown in Figure 2-2.
The switch that is assigned Unit ID 1 is the Master unit, by default. The
switch that is assigned Unit ID 2 is the Master Backup unit.
Unit ID Master
ContaxGS.book Page 11 Friday, August 20, 2010 1:53 PM12 Stacking
Manual Assignment
To assign unit IDs to the switches in the stack, do the following for each
switch in the stack:
1 Connect the switch to the terminal, as described in "Connecting the
Switch to the Terminal".
2 Turn on the switch to begin auto boot and press Return or Esc to abort and
enter the Start Up menu.
3 Select Stack menu to open the Stack Menu.
4 Select Set unit stack id. Enter either a Unit ID or 0. 0 indicates that the
unit ID will be assigned automatically.
NOTE: The entire stack should be installed, as shown in Figure 2-1, before powering
up the switches.
For more information on stacking, see the Dell PowerConnect 5500 Series User
Guide on the Documentation CD.
Startup Menu
[1]Download Software
[2]Erase Flash File
[3]Password Recovery Procedure
[4]Set Terminal Baud-Rate
[5]Stack menu
[6]Back
[1]Show unit stack id
[2]Set unit stack id
[3]Back
ContaxGS.book Page 12 Friday, August 20, 2010 1:53 PMGetting Started Guide 13
Configuring the Switch
This section describes the configuration that must be performed after the
switch is installed and connected to power supplies. Additional advanced
functions are described in the Dell PowerConnect 5500 Series User Guide on
the Documentation CD.
NOTE: Before proceeding further, read the release notes for this product. You can
download the release notes from the Dell Support website at support.dell.com.
NOTE: We recommend that you obtain the most recent revision of the user
documentation from the Dell Support website at support.dell.com.
Configuration Work Flow
To configure the switches:
1 For each switch in the stack:
a Connect it to a terminal, as described in the "Connecting the Switch
to the Terminal".
b Boot the switch, as described in the "Booting the Switch".
c Assign a unit ID to the switch, as described in "Unit ID Assignment".
2 Connect the units in the stack to each other, as described in "Configuring
the Stack".
3 Connect the Master unit to the terminal, reboot the unit and the Setup
Wizard is run automatically, as described in "Configuration Using the
Setup Wizard".
4 Respond to the Setup Wizard prompts.
5 Continue managing the switch, either through the console or Telnet, using
the CLI or the web GUI, as described in the Dell PowerConnect 5500 Series
User Guide.
ContaxGS.book Page 13 Friday, August 20, 2010 1:53 PM14 Configuring the Switch
Connecting the Switch to the Terminal
The switch is configured and monitored through a terminal desktop system
that runs terminal emulation software. The switch connects to the terminal
through the console port.
To connect the switch to a terminal:
1 Connect an RS-232 cable to a VT100-compatible terminal or the serial
connector of a desktop system running terminal emulation software.
2 Connect the RS-232 cable to the switch console port on the front panel of
the switch (see Figure 3-1) using an 8-pin RJ-45 male connector.
Figure 3-1. Front-Panel Console Port
3 Set the terminal emulation software as follows:
a Select the appropriate serial port to connect to the switch.
b Set the data rate to 9600 baud.
c Set the data format to 8 data bits, 1 stop bit, and no parity.
d Set Flow Control to none.
e Select VT100 for Emulation mode within your communication
software.
f Select Terminal keys for Function, Arrow, and Ctrl keys. Ensure that
the setting is for Terminal keys (not Windows keys).
NOTE: You can connect a console to the console port on any unit in the stack, but
stack management is performed only from the stack master (Unit ID 1 or 2).
Console Port
ContaxGS.book Page 14 Friday, August 20, 2010 1:53 PMConfiguring the Switch 15
Booting the Switch
After the local terminal is connected, turn on power. The switch then goes
through power-on self-test (POST). POST runs every time the switch is
started and checks hardware components, to determine if the switch is
operational before completely booting. If the system detects a critical
problem, the boot process stops. If POST passes successfully, a valid
executable image is loaded into RAM. POST messages are displayed on the
terminal and indicate test success or failure.
The boot process runs for approximately 40-45seconds.
When the boot process completes, the following LEDs are lit, as shown in
Figure 3-2:
• Power
• Status
• Fan (should be green)
• RPS (if it is being used)
Figure 3-2. Initial LEDs
Power Status
Fan
RPS
ContaxGS.book Page 15 Friday, August 20, 2010 1:53 PM16 Configuring the Switch
Configuring the Stack
The switch is always considered to be a stack of switches even if the stack only
contains a single switch. If there is more than one switch in the stack, each
switch must be configured individually. See "Unit ID Assignment" for
instructions on how to configure the stack.
Configuration Using the Setup Wizard
The Setup Wizard guides you through the initial switch configuration to get
the system up and running as quickly as possible. Note that you can skip the
Setup Wizard and configure the switch manually through the CLI.
The Setup Wizard configures the following fields:
• SNMP Community String and SNMP Management System IP address
(optional)
• Username and password
• Management switch IP address
• IP subnet mask
• Default gateway IP address
NOTE: The Setup Wizard assumes the following:
• The PowerConnect switch was never configured before and is in the same
state as when you received it.
• The PowerConnect switch booted successfully.
• The console connection is established and the console prompt is displayed on
the screen of a VT100 terminal switch.
Connect the Master unit to a terminal. You can identify the Master unit by
the illuminated Master LED on the front panel of the switch (see Figure 2-2).
To configure the system using the Setup Wizard:
1 Obtain the following information from the network administrator:
• SNMP Community String and SNMP Management System IP
address (optional)
• Username and password
ContaxGS.book Page 16 Friday, August 20, 2010 1:53 PMConfiguring the Switch 17
• The IP address to be assigned to the VLAN 1 interface through which
the switch is to be managed (by default, every external and internal
port is a member of the VLAN 1)
• The IP subnet mask for the network
• The default gateway (next hop router) IP address for configuring the
default route
2 Boot the Master unit. The system automatically prompts you to use the
Setup Wizard.
The Setup Wizard displays the following information:
Welcome to Dell Easy Setup Wizard
The Setup Wizard guides you through the initial
switch configuration and gets you up and running
easily and quickly. You can skip the Setup Wizard
and enter CLI mode to manually configure the
switch. The system will prompt you with a default
answer; by pressing Enter, you accept the default
value.
You must respond to the next question to run the
Setup Wizard within 60 seconds, otherwise the
system will continue with normal operation using
the default system configuration.
Would you like to enter the Setup Wizard (you must
answer this question within 60 seconds)? (Y/N)
3 Enter [Y] to run the wizard. If you enter [N] or if you do not respond
within 60 seconds, the Setup Wizard automatically exits and the CLI
console prompt appears.
If you enter [Y] the wizard provides interactive guidance through the
initial switch configuration.
The following information is displayed:
You can exit the Setup Wizard at any time by
entering [ctrl+Z].
The system is not set up for SNMP management by
default.
ContaxGS.book Page 17 Friday, August 20, 2010 1:53 PM18 Configuring the Switch
To manage the switch using SNMP (required for Dell
Network Manager) you can:
• Setup the initial SNMP version 2 account now.
• Return later and set up the SNMP version account.
For more information on setting up a SNMP version
2 account, see the user documentation.
Would you like to set up the SNMP management
interface now? [Y/N]
4 Enter [N] to skip to Step 7 or enter [Y] to continue the Setup Wizard. If
you enter [Y] the following information is displayed:
To set up the SNMP management account you must
specify the management system IP address and the
"community string" or password that the particular
management system uses to access the switch. The
wizard automatically assigns the highest access
level [Privilege Level 15] to this account.
You can use Dell Network Manager or other
management interfaces to change this setting later
and to add additional management system later. For
more information on adding management systems, see
the user documentation.
To add a management station:
Please enter the SNMP community string to be used:
5 Enter the SNMP community string. You can use the default name "public"
Please enter the IP address of the Management
System (A.B.C.D) or wildcard (0.0.0.0) to manage
from any Management Station:[0.0.0.0].
6 Enter the SNMP Management System IP.
ContaxGS.book Page 18 Friday, August 20, 2010 1:53 PMConfiguring the Switch 19
7 Set up user account privilege level, as follows:
The following information is displayed:
Now we need to set up your initial privilege
(Level 15) user account. This account is used to
login to the CLI and Web interface. You may set up
other accounts and change privilege levels later.
For more information on setting up user accounts
and changing privilege levels, see the user
documentation.
To set up a user account:
Enter the user name:
Please enter the user password:
Please reenter the user password:
8 Enter the following:
• User name, for example "admin"
• Password and password confirmation.
9 Press Enter.
The following information is displayed:
Next, an IP address is setup. The IP address is
defined on the default VLAN (VLAN #1). This is the
IP address you use to access the Telnet, Web
interface, or SNMP interface for the switch.
To set up an IP address:
Please enter the IP address of the device
(A.B.C.D):
Please enter the IP subnet mask (A.B.C.D or nn):
10 Enter the management IP address and IP subnet mask, for example
192.168.2.100 as the IP address and 255.255.255.0 as the IP subnet mask.
ContaxGS.book Page 19 Friday, August 20, 2010 1:53 PM20 Configuring the Switch
11 Press Enter.
The following information is displayed:
Finally, set up the default gateway.
Please enter the IP address of the gateway from
which this network is reachable
(e.g. 192.168.2.1).Default gateway
(A.B.C.D):[0.0.0.0]
12 Enter the default gateway.
13 Press Enter. The following is displayed (example):
This is the configuration information that has
been collected:
SNMP Interface = "Dell Network
Manager"@192.168.2.10
User Account setup = admin
Password = **********
Management IP address = 192.168.2.100
255.255.255.0
Default Gateway = 192.168.2.1
The following information is displayed:
If the information is correct, please select (Y)
to save the configuration and copy to the start-up
configuration file. If the information is
incorrect, select (N) to discard configuration and
restart the wizard: [Y/N]
ContaxGS.book Page 20 Friday, August 20, 2010 1:53 PM
www.dell.com | support.dell.com
Dell™ Inspiron™ 640M/ E1405
Manuel du propriétaire
Modèle PP19LRemarques, avis et précautions
REMARQUE : Une REMARQUE fournit des informations importantes qui vous aident à mieux utiliser votre ordinateur.
AVIS : Un AVIS vous avertit d’un risque de dommage matériel ou de perte de données et vous indique comment éviter le
problème.
PRÉCAUTION : Une PRÉCAUTION indique un risque potentiel d'endommagement du matériel, de blessure corporelle
ou de mort.
Abréviations et sigles
Pour la liste complète des abréviations et des sigles, reportez-vous à la section « Glossaire » à la page 171.
Si vous avez acheté un ordinateur Dell™ Série n, les références du présent document concernant les systèmes
d'application Microsoft® Windows® ne sont pas applicables.
____________________
Les informations de ce document sont sujettes à modification sans préavis.
© 2006–2007 Dell Inc. Tous droits réservés.
La reproduction de ce document, de quelque manière que ce soit, sans l'autorisation écrite de Dell Inc. est strictement interdite.
Marques utilisées dans ce document : Dell, le logo DELL, Inspiron, Dell Precision, Dimension, OptiPlex, Latitude, PowerEdge, PowerConnect,
PowerVault, PowerApp, Dell TravelLite, ExpressCharge, Dell Media Experience et Strike Zone sont des marques de Dell Inc. ; Intel et Pentium
sont des marques déposées d'Intel Corporation ; Microsoft, Outlook et Windows sont des marques déposées de Microsoft Corporation ; Bluetooth
est une marque déposée appartenant à Bluetooth SIG, Inc. et est utilisée par Dell sous licence ; IBM est une marque déposée d'International
Business Machines Corporation ; EMC est une marque déposée d'EMC Corporation ; ENERGY STAR est une marque déposée de l'agence
américaine de protection de l'environnement (U.S. Environmental Protection Agency).
D'autres marques et noms commerciaux peuvent être utilisés dans ce document pour faire référence aux entités se réclamant de ces marques
et de ces noms ou à leurs produits. Dell Inc. rejette tout intérêt propriétaire dans les marques et les noms commerciaux autres que les siens.
Modèle PP19L
Mars 2007 Réf. XF808 Rév. A02Table des matières 3
Table des matières
Recherche d'informations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1 Présentation de votre ordinateur. . . . . . . . . . . . . . . . . . . 15
Vue frontale . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Vue du côté gauche . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Vue du côté droit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Vue arrière . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Vue de dessous. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2 Configuration de votre ordinateur . . . . . . . . . . . . . . . . . . 25
Connexion à Internet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Configuration de votre connexion Internet. . . . . . . . . . . . . . . . . 25
Transfert d'informations vers un nouvel ordinateur. . . . . . . . . . . . . . . 26
Exécution de l'Assistant Transfert de fichiers et de paramètres avec
le CD Operating System. . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Exécution de l'Assistant Transfert de fichiers et de paramètres sans le
CD Operating System . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Configuration d'une imprimante. . . . . . . . . . . . . . . . . . . . . . . . . 28
Câble de l'imprimante. . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Connexion d'une imprimante USB . . . . . . . . . . . . . . . . . . . . . 29
Périphériques de protection contre les surtensions électriques. . . . . . . . 30
Parasurtenseurs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Filtres de ligne . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Onduleurs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3 Utilisation de l'écran . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Réglage de la luminosité . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Basculement de l'image vidéo . . . . . . . . . . . . . . . . . . . . . . . . . 31
Réglage de la résolution d'affichage et du taux de rafraîchissement . . . . . 314 Table des matières
4 Utilisation du clavier et de la tablette tactile. . . . . . . . . . . 33
Pavé numérique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Combinaisons de touches . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Fonctions système . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Batterie . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Plateau du lecteur de CD ou DVD . . . . . . . . . . . . . . . . . . . . . 34
Fonctions d'affichage. . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Radios (notamment le réseau sans fil et une carte interne dotée de la
technologie sans fil Bluetooth®) . . . . . . . . . . . . . . . . . . . . . . 34
Gestion de l'alimentation . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Fonctions des haut-parleurs . . . . . . . . . . . . . . . . . . . . . . . . 35
Fonctions de la touche du logo Microsoft® Windows® . . . . . . . . . . 35
Tablette tactile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Personnalisation de la tablette tactile . . . . . . . . . . . . . . . . . . . 36
5 Utilisation d'une batterie . . . . . . . . . . . . . . . . . . . . . . . . 37
Performances de la batterie . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Vérification de la charge de la batterie . . . . . . . . . . . . . . . . . . . . . 38
Jauge de batterie Dell™ QuickSet . . . . . . . . . . . . . . . . . . . . . 38
Microsoft® Windows® Jauge . . . . . . . . . . . . . . . . . . . . . . . 38
Indicateur de charge . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Alerte de batterie faible. . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Préservation de l'alimentation par batterie. . . . . . . . . . . . . . . . . . . 39
Modes d'économie d'énergie . . . . . . . . . . . . . . . . . . . . . . . 40
Configuration des paramètres de gestion de l'alimentation . . . . . . . . 41
Chargement de la batterie . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Remplacement de la batterie . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Stockage de la batterie . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
6 Utilisation de CD, de DVD et d'autres supports
multimédias . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Lecture CD ou DVD. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43Table des matières 5
Réglage du volume. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Réglage de l'image. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Microsoft® Windows® XP . . . . . . . . . . . . . . . . . . . . . . . . . 46
Utilisation de Dell Media Experience™ et de Dell MediaDirect™. . . . . . . 46
Si l'ordinateur est allumé ou en mode Veille . . . . . . . . . . . . . . . . 46
Si l'ordinateur est éteint ou en mode Mise en veille prolongée . . . . . . 46
Aide de Dell MediaDirect et Dell Media Experience. . . . . . . . . . . . 47
Utilisation du CD Repair Utility (Utilitaire de réparation) de Dell
MediaDirect™ ou du CD Reinstallation (Réinstallation) de Dell
MediaDirect. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Réparation de Dell MediaDirect . . . . . . . . . . . . . . . . . . . . . . 48
Réinstallation de Dell MediaDirect . . . . . . . . . . . . . . . . . . . . . 48
Connexion de votre ordinateur à un périphérique téléviseur ou audio . . . . 50
S-vidéo et audio standard . . . . . . . . . . . . . . . . . . . . . . . . . 51
S-vidéo et audio numérique S/PDIF . . . . . . . . . . . . . . . . . . . . 53
Vidéo composite et audio standard. . . . . . . . . . . . . . . . . . . . . 55
Vidéo composite et audio numérique S/PDIF. . . . . . . . . . . . . . . . 56
Vidéo composante et audio standard . . . . . . . . . . . . . . . . . . . 58
Vidéo composante et audio numérique S/PDIF . . . . . . . . . . . . . . 60
Configuration de la lecture de DVD via le casque . . . . . . . . . . . . . 62
Activation des paramètres d'écran d'un téléviseur . . . . . . . . . . . . 63
7 Utilisation de cartes ExpressCard . . . . . . . . . . . . . . . . . . 65
Types de carte ExpressCard . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Caches pour carte ExpressCard . . . . . . . . . . . . . . . . . . . . . . . . . 65
Installation d'une carte ExpressCard . . . . . . . . . . . . . . . . . . . . . . 65
Retrait d'une carte ExpressCard ou d'un cache. . . . . . . . . . . . . . . . . 67
Types de carte mémoire multimédia. . . . . . . . . . . . . . . . . . . . . . . 68
Caches de carte mémoire multimédia. . . . . . . . . . . . . . . . . . . . . . 68
Installation d'une carte mémoire multimédia. . . . . . . . . . . . . . . . . . 69
Retrait d'une carte mémoire multimédia ou d'un cache . . . . . . . . . . . . 706 Table des matières
8 Configuration d'un réseau . . . . . . . . . . . . . . . . . . . . . . . 71
Connexion physique à un réseau ou à un modem large bande . . . . . . . . . 71
Assistant Configuration réseau . . . . . . . . . . . . . . . . . . . . . . . . . 71
Réseau local sans fil (WLAN) . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Éléments requis pour établir une connexion WLAN . . . . . . . . . . . . 72
Contrôle de votre carte réseau sans fil. . . . . . . . . . . . . . . . . . . 72
Configuration d'un nouveau WLAN. . . . . . . . . . . . . . . . . . . . . 73
Connexion à un réseau local sans fil . . . . . . . . . . . . . . . . . . . . 74
Activation/désactivation de la carte réseau sans fil . . . . . . . . . . . . 75
Surveillance de l'état des connexions réseau sans fil via
Dell™ QuickSet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Réseau étendu large bande mobile ou sans fil (WWAN) . . . . . . . . . . . . 76
Éléments requis pour établir une connexion avec un réseau large
bande mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Connexion à un réseau large bande mobile . . . . . . . . . . . . . . . . 77
Réseau Bluetooth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Configuration de votre connexion Bluetooth. . . . . . . . . . . . . . . . 77
Connexion à un réseau Bluetooth . . . . . . . . . . . . . . . . . . . . . 77
9 Sécurisation de votre ordinateur. . . . . . . . . . . . . . . . . . . 79
Verrou du câble de sécurité . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Mots de passe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Logiciel de suivi informatique. . . . . . . . . . . . . . . . . . . . . . . . . . 80
En cas de perte ou de vol de votre ordinateur. . . . . . . . . . . . . . . . . . 80
10 Dépannage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Service Dell Technical Update . . . . . . . . . . . . . . . . . . . . . . . . . 81
Dell Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Quand utiliser Dell Diagnostics. . . . . . . . . . . . . . . . . . . . . . . 81
Démarrage de Dell Diagnostics à partir du disque dur. . . . . . . . . . . 81
Démarrage de Dell Diagnostics à partir du CD Drivers and Utilities . . . . 82
Menu principal de Dell Diagnostics . . . . . . . . . . . . . . . . . . . . 83Table des matières 7
Utilitaire de support de Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Accès à l'utilitaire de support de Dell . . . . . . . . . . . . . . . . . . . 84
Clic sur l'icône de support de Dell . . . . . . . . . . . . . . . . . . . . . 84
Double-clic sur l'icône de support de Dell . . . . . . . . . . . . . . . . . 84
Problèmes de lecteur . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Problèmes de lecteur de CD et de DVD . . . . . . . . . . . . . . . . . . 85
Si vous ne parvenez pas à éjecter le plateau du lecteur de CD, de
CD-RW, de DVD ou de DVD+RW . . . . . . . . . . . . . . . . . . . . . . 85
Si vous entendez un bruit grinçant ou un raclement inhabituel . . . . . . 86
Problèmes liés au disque dur. . . . . . . . . . . . . . . . . . . . . . . . 86
Problèmes liés à la messagerie électronique, au modem ou à Internet . . . . 86
Messages d'erreur. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Problèmes liés à la carte ExpressCard . . . . . . . . . . . . . . . . . . . . . 92
Problèmes liés au périphérique IEEE 1394 . . . . . . . . . . . . . . . . . . . 92
Problèmes liés au clavier . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Problèmes liés au clavier externe . . . . . . . . . . . . . . . . . . . . . 93
Caractères imprévus . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Blocages et problèmes logiciels . . . . . . . . . . . . . . . . . . . . . . . . 94
L'ordinateur ne démarre pas . . . . . . . . . . . . . . . . . . . . . . . . 94
L'ordinateur ne répond plus . . . . . . . . . . . . . . . . . . . . . . . . 94
Un programme ne répond plus ou se bloque régulièrement. . . . . . . . 94
Un programme est conçu pour un système d'exploitation
Microsoft® Windows® antérieur. . . . . . . . . . . . . . . . . . . . . . 94
Un écran bleu uni apparaît . . . . . . . . . . . . . . . . . . . . . . . . . 94
Problèmes Dell MediaDirect . . . . . . . . . . . . . . . . . . . . . . . . 95
Autres problèmes logiciels . . . . . . . . . . . . . . . . . . . . . . . . . 95
Problèmes liés à la mémoire . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Problèmes liés au réseau . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Problèmes d'alimentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Problèmes d'imprimante. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Problèmes liés au scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Problèmes de son et de haut-parleurs. . . . . . . . . . . . . . . . . . . . . . 99
Aucun son ne sort des haut-parleurs intégrés . . . . . . . . . . . . . . . 99
Aucun son ne sort des haut-parleurs externes . . . . . . . . . . . . . . 99
Aucun son émis par le casque . . . . . . . . . . . . . . . . . . . . . . 1008 Table des matières
Problèmes liés à la tablette tactile ou à la souris . . . . . . . . . . . . . . 100
Problèmes vidéo et d'affichage . . . . . . . . . . . . . . . . . . . . . . . . 100
Si l'écran est vide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Si l'écran est difficile à lire . . . . . . . . . . . . . . . . . . . . . . . . 101
Si seule une partie de l'écran est lisible . . . . . . . . . . . . . . . . . 101
Pilotes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Qu'est-ce qu'un pilote ? . . . . . . . . . . . . . . . . . . . . . . . . . 102
Identification des pilotes . . . . . . . . . . . . . . . . . . . . . . . . . 102
Réinstallation des pilotes et utilitaires . . . . . . . . . . . . . . . . . . 102
Résolution des incompatibilités logicielles et matérielles. . . . . . . . . . 104
Restauration du système d'exploitation. . . . . . . . . . . . . . . . . . . . 105
Utilisation de la fonction Restauration du système de Microsoft
Windows XP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Utilisation de Dell PC Restore de Symantec . . . . . . . . . . . . . . . 107
Utilisation du CD Operating system. . . . . . . . . . . . . . . . . . . . 108
11 Ajout et remplacement de pièces . . . . . . . . . . . . . . . . . 111
Avant de commencer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Outils recommandés . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Mise hors tension de l'ordinateur . . . . . . . . . . . . . . . . . . . . 111
Avant d'intervenir à l'intérieur de votre ordinateur . . . . . . . . . . . 112
Disque dur . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Retour de votre disque dur à Dell. . . . . . . . . . . . . . . . . . . . . 115
Lecteurs optiques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
À propos de la vis de fixation de périphérique . . . . . . . . . . . . . . 116
Retrait et installation des lecteurs optiques . . . . . . . . . . . . . . . 116
Mémoire . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Installation d'un module de mémoire dans le connecteur DIMM B . . . 118
Installation d'un module de mémoire dans le connecteur DIMM A . . . 120
Modem (en option). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Carte Mini . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Cache de la charnière . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Retrait du cache de la charnière . . . . . . . . . . . . . . . . . . . . . 127
Remise en place du cache de la charnière. . . . . . . . . . . . . . . . 129Table des matières 9
Clavier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Retrait du clavier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Remise en place du clavier. . . . . . . . . . . . . . . . . . . . . . . . 130
Carte interne dotée de la technologie sans fil Bluetooth® . . . . . . . . . . 130
Pile bouton . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Retrait de la pile bouton . . . . . . . . . . . . . . . . . . . . . . . . . 132
Remise en place de la pile bouton . . . . . . . . . . . . . . . . . . . . 132
12 Fonctions Dell™ QuickSet . . . . . . . . . . . . . . . . . . . . . . 133
13 Voyager avec votre ordinateur . . . . . . . . . . . . . . . . . . . 135
Identification de l'ordinateur . . . . . . . . . . . . . . . . . . . . . . . . . 135
Emballage de l'ordinateur . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
Conseils de voyage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Transport aérien . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
14 Contacter Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
15 Caractéristiques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
16 Annexe. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Utilisation du programme de configuration du système . . . . . . . . . . . 165
Affichage de l'écran de configuration du système. . . . . . . . . . . . 165
Programme de configuration du système . . . . . . . . . . . . . . . . 165
Options fréquemment utilisées . . . . . . . . . . . . . . . . . . . . . . 166
Nettoyage de votre ordinateur. . . . . . . . . . . . . . . . . . . . . . . . . 167
Ordinateur, clavier et écran. . . . . . . . . . . . . . . . . . . . . . . . 167
Tablette tactile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Lecteur de disquette . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
CD et DVD. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16810 Table des matières
Règle de support technique de Dell (États-Unis uniquement) . . . . . . . . 168
Définition des logiciels et des périphériques installés par Dell . . . . . 169
Définition des logiciels et des périphériques tiers . . . . . . . . . . . . 169
Réglementation FCC (États-Unis uniquement) . . . . . . . . . . . . . . . . 169
Classe B de la FCC . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Caractéristiques Macrovision. . . . . . . . . . . . . . . . . . . . . . . . . 170
Glossaire . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183Recherche d'informations 11
Recherche d'informations
REMARQUE : Il se peut que certaines fonctionnalités et certains supports soient en option et ne soient pas livrés
avec votre ordinateur. Certaines fonctionnalités ne sont pas nécessairement disponibles dans tous les pays.
REMARQUE : Il est possible que des informations supplémentaires soient fournies avec votre ordinateur.
Que recherchez-vous ? Cherchez ici
• Programme de diagnostic pour mon ordinateur
• Pilotes pour mon ordinateur
• La documentation concernant mon appareil
• NSS (Notebook System Software)
CD Drivers and Utilities (également appelé ResourceCD)
REMARQUE : Il se peut que le CD Drivers and Utilities soit
en option et qu'il ne soit pas livré avec tous les ordinateurs.
La documentation et les pilotes sont déjà installés sur
l'ordinateur. Vous pouvez utiliser le CD pour réinstaller les
pilotes (reportez-vous à la section « Réinstallation des
pilotes et utilitaires » à la page 102) ou pour exécuter Dell
Diagnostics (reportez-vous à la section « Dell Diagnostics »
à la page 81).
Des fichiers « Lisez-moi »
peuvent être inclus sur
votre CD ; ces fichiers
fournissent des
informations sur les
modifications techniques
de dernière minute
apportées à votre système
ou des informations de
référence destinées aux
techniciens ou aux
utilisateurs expérimentés.
REMARQUE : Les dernières mises à jour des pilotes et de la
documentation se trouvent à l'adresse support.dell.com.
• Informations sur les garanties
• Termes et Conditions (États-Unis uniquement)
• Consignes de sécurité
• Informations sur les réglementations
• Informations relatives à l'ergonomie
• Contrat de licence pour utilisateur final
Guide d'information sur le produit Dell™12 Recherche d'informations
• Comment configurer mon ordinateur Schéma de configuration
• Numéro de service et code de service express
• Étiquette de licence Microsoft Windows
Numéro de service et licence Microsoft® Windows®
Ces étiquettes sont situées sur la base de votre ordinateur.
• Utilisez le numéro de service pour identifier votre
ordinateur lorsque vous accédez au site Web
support.dell.com ou lorsque vous appelez le service de
support technique.
• Entrez le code de
service express pour
orienter votre appel
lorsque vous contactez
le service de support
technique.
Que recherchez-vous ? Cherchez iciRecherche d'informations 13
• Solutions — Conseils et astuces de dépannage, articles
de techniciens, cours en ligne et questions fréquemment
posées
• Forum clients — Discussion en ligne avec d'autres
clients Dell
• Mises à niveau — Informations sur les mises à niveau
des composants, comme la mémoire, l'unité de disque
dur et le système d'exploitation
• Service clientèle — Coordonnées, appels de service et
état des commandes, garantie et informations sur les
réparations
• Service et support — État des appels de service et
historique du support, contrat de service, discussions en
ligne avec le support technique
• Référence — Documentation de l'ordinateur, détails sur
la configuration de l'ordinateur, caractéristiques de
produit et livres blancs
• Téléchargements — Pilotes, correctifs et mises à jour
logicielles agréés
• Notebook Logiciel système (NSS)— Si vous réinstallez
le système d'exploitation de l'ordinateur, vous devez
également réinstaller l'utilitaire NSS. NSS fournit des
mises à jour essentielles pour le système d'exploitation et
la prise en charge des lecteurs de disquette USB Dell™
de 3,5 pouces, des processeurs Intel® Pentium® M, des
lecteurs optiques et des périphériques USB. NSS est
requis pour le bon fonctionnement de votre ordinateur
Dell. Ce logiciel détecte automatiquement votre
ordinateur et son système d'exploitation, et installe les
mises à jour appropriées à votre configuration.
Site Web de support de Dell — support.dell.com
REMARQUE : Sélectionnez votre région pour afficher le site
de support approprié.
REMARQUE : Les représentants des grandes entreprises,
du gouvernement et du domaine de l'éducation peuvent
également utiliser le site Web de support personnalisé
Premier de Dell à l'adresse premier.support.dell.com.
Pour télécharger NSS (Notebook System Software) :
1 Allez à l'adresse support.dell.com et cliquez sur
Téléchargements.
2 Saisissez votre numéro de service ou le modèle de
l'appareil.
3 Dans le menu déroulant Télécharger une catégorie,
cliquez sur All (Toutes).
4 Sélectionnez le système d'exploitation et la langue du
système d'exploitation de votre ordinateur, puis cliquez
sur Soumettre.
5 Sous Select a Device (Sélectionner un périphérique),
rendez-vous à System and Configuration Utilities
(Utilitaires de système et de configuration), puis cliquez
sur Dell NSS(Notebook System Software).
• Mises à niveau logicielles et astuces de dépannage —
Questions fréquemment posées, sujets d'actualité et
état général de votre environnement informatique
Utilitaire de support de Dell
L'utilitaire de support de Dell est un système de mise à
niveau et de notification automatique installé sur votre
ordinateur. Il permet de réaliser des balayages en temps réel
de l'état de votre environnement informatique et des mises
à jour logicielles et fournit des informations de support
automatique appropriées. Accédez à l'utilitaire de support
de Dell à l'aide de l'icône située dans la barre des
tâches. Pour plus d'informations, reportez-vous à la section
« Utilitaire de support de Dell » à la page 84.
Que recherchez-vous ? Cherchez ici14 Recherche d'informations
• Comment utiliser Windows XP
• Comment utiliser des programmes et des fichiers
• Comment personnaliser mon bureau
Centre d'aide et de support de Windows
1 Cliquez sur le bouton Démarrer, puis sur Aide et support.
2Tapez un mot ou une expression qui décrit votre
problème, puis cliquez sur l'icône en forme de flèche.
3 Cliquez sur la rubrique qui décrit votre problème.
4 Suivez les instructions qui s'affichent à l'écran.
• Informations sur l'activité réseau, l'Assistant Gestion de
l'alimentation, les touches de raccourci et les éléments
contrôlés par Dell QuickSet
Aide Dell QuickSet
Pour afficher l'aide Dell QuickSet, cliquez avec le bouton
droit de la souris sur l'icône , dans la barre des tâches
de Microsoft® Windows®.
Pour plus d'informations sur Dell QuickSet, reportez-vous
à la section « Fonctions Dell™ QuickSet » à la page 133.
• Comment réinstaller mon système d'exploitation CD Operating System
REMARQUE : Il se peut que le CD Operating System soit en
option et qu'il ne soit pas livré avec certains ordinateurs.
Le système d'exploitation
est déjà installé sur votre
ordinateur. Pour réinstaller
le système d'exploitation,
utilisez le CD Operating
System. Reportez-vous à la
section « Utilisation du
CD Operating system » à
la page 108. Une fois le
système d'exploitation
réinstallé, utilisez le CD
Drivers and Utilities (ResourceCD) pour réinstaller les
pilotes des périphériques accompagnant votre ordinateur.
REMARQUE : La couleur de votre CD dépend du système
d'exploitation que vous avez commandé.
Que recherchez-vous ? Cherchez iciPrésentation de votre ordinateur 15
Présentation de votre ordinateur
Vue frontale
1 loquet de fermeture de l'écran 2 écran 3 bouton d'alimentation
4 voyants d'état de l'appareil 5 tablette tactile 6 boutons de commande
multimédia
7 haut-parleurs 8 boutons de la tablette tactile 9 clavier
10 voyants d'état du clavier et du
sans fil
11 loquets de l'écran (2)
1
9
2
5
8
3
7
10 4
6
1116 Présentation de votre ordinateur
LOQUET D E FERMETURE D E L'ÉCRAN — Faites glisser et maintenez ce loquet pour déverrouiller les dispositifs de
fermeture et ouvrir l'écran.
ÉCRAN — Pour plus d'informations sur l'écran, reportez-vous à la section « Utilisation de l'écran » à la page 31.
BOUTON D'ALIMENTATION — Appuyez sur le bouton d'alimentation pour mettre l'ordinateur sous tension ou
quitter le mode d'économie d'énergie.
AVIS : Afin d'éviter de perdre des données, éteignez l'ordinateur à l'aide du menu Démarrer plutôt qu'en appuyant
sur le bouton d'alimentation.
VOYANTS D'ÉTAT D E L'APPAREIL
Si l'ordinateur est branché à une prise secteur, le voyant fonctionne comme suit :
• Vert fixe : la batterie est en cours de charge.
• Vert clignotant : la batterie est presque complètement chargée.
Si l'ordinateur fonctionne sur batterie, le voyant fonctionne comme suit :
• Éteint : la batterie est suffisamment chargée (ou l'ordinateur est éteint).
• Orange clignotant : le niveau de charge de la batterie est faible.
• Orange fixe : le niveau de charge de la batterie est critique.
S'allume lorsque vous mettez l'ordinateur sous tension et clignote lorsque l'ordinateur est en
mode d'économie d'énergie.
S'allume lorsque l'ordinateur lit ou écrit des données.
AVIS : Pour éviter de perdre des données, n'éteignez jamais l'ordinateur lorsque le voyant
clignote.
Reste allumé ou clignote pour indiquer l'état de charge de la batterie.Présentation de votre ordinateur 17
TABLETTE TACTILE — Assure les mêmes fonctions que la souris.
BOUTONS D E COMMANDE MULTIMÉDIA — Contrôlent la lecture des CD, DVD et lecteurs multimédia.
HAUT-PARLEURS — Pour régler le volume des haut-parleurs intégrés, appuyez sur les boutons de commande
multimédia ou les raccourcis clavier du volume des haut-parleurs. Pour plus d'informations, reportez-vous à la
section « Fonctions des haut-parleurs » à la page 35.
BOUTONS D E L A TABLETTE TACTILE — La tablette tactile et ses boutons offrent les mêmes fonctionnalités que la
souris.
CLAVIER — Le clavier comporte un pavé numérique et la touche du logo Microsoft Windows. Pour plus
d'informations sur les raccourcis clavier pris en charge, reportez-vous à la section « Combinaisons de touches » à la
page 34.
Met le son en sourdine.
Diminue le son.
Augmente le son.
Lecture ou pause.
Revient à la plage précédente.
Passe à la plage suivante.
Arrêt.
Lancement de Dell MediaDirect ou Microsoft® Windows® Media Center
Edition. Reportez-vous à la section « Utilisation de Dell Media Experience™ et de
Dell MediaDirect™ » à la page 46.18 Présentation de votre ordinateur
VOYANTS D'ÉTAT D U CLAVIER E T D U SANS FIL
Les voyants verts situés au-dessus du clavier indiquent ce qui suit :
LOQUETS D E L'ÉCRAN — Permettent de maintenir l'écran fermé.
S'allume lorsque le pavé numérique est activé.
S'allume lorsque la fonction Majuscules est activée.
S'allume lorsque la fonction Arrêt défil est activée.
S'allume lorsque le réseau sans fil est activé. Pour activer ou
désactiver le réseau sans fil, appuyez sur .
S'allume lorsqu'une carte dotée de la technologie sans fil
Bluetooth® est activée.
REMARQUE : La carte dotée de la technologie sans fil
Bluetooth est une fonctionnalité optionnelle, le voyant ne
s'allume donc que lorsque vous avez commandé la carte avec
votre ordinateur. Pour des informations supplémentaires,
reportez-vous à la documentation livrée avec votre carte.
Pour désactiver uniquement la fonctionnalité de
technologie sans fil Bluetooth, cliquez avec le bouton droit
de la souris sur l'icône de la zone de notification et
sélectionnez Désactiver radio Bluetooth.
Pour activer ou désactiver rapidement tous les périphériques
sans fil, appuyez sur .
9
APrésentation de votre ordinateur 19
Vue du côté gauche
PRÉCAUTION : Ne bloquez pas les entrées d'air de l'ordinateur et n'insérez pas d'objets dedans ; évitez
également toute accumulation de poussière. Ne placez pas l'ordinateur dans un environnement peu aéré, tel
qu'une mallette fermée, lorsque celui-ci fonctionne. Le manque de ventilation risquerait de causer un incendie
ou d'endommager l'ordinateur.
AVIS : Avant d'acheter un dispositif antivol, assurez-vous qu'il correspond au type d'emplacement pour câble de
sécurité de votre ordinateur.
EMPLACEMENT POUR CÂBLE D E SÉCURITÉ — Permet de rattacher à l'ordinateur un dispositif antivol disponible
dans le commerce. Pour plus d'informations, reportez-vous aux instructions fournies avec l'appareil.
ENTRÉE D'AIR — L'ordinateur utilise des ventilateurs pour garantir la circulation de l'air à travers les entrées d'air et
éviter tout risque de surchauffe.
1 emplacement pour câble
de sécurité
2 entrée d'air 3 connecteur de sortie TV S-vidéo
4 connecteur IEEE 1394 5 connecteur microphone 6 connecteur de casque
7 lecteur de carte mémoire
multimédia 5 en 1
8 logement de carte ExpressCard
1 2 6 3 45 7 820 Présentation de votre ordinateur
CONNECTEUR D E SORTIE TV S-VIDÉO
CONNECTEUR IEEE 1394 — Permet de relier des périphériques qui prennent en charge des vitesses de transfert
ultra rapides IEEE 1394, par exemple des caméras vidéo numériques.
CONNECTEURS AUDIO
LECTEUR D E CARTE MÉMOIRE MULTIMÉDIA 5 EN 1— Moyen pratique et rapide de visualiser et de partager des
photos numériques, de la musique et des vidéos stockées sur une carte mémoire. Le lecteur de carte mémoire
multimédia 5 en 1 lit les cartes mémoire multimédia numériques suivantes :
• Carte Secure Digital (SD)/SDIO
• MultiMediaCard (MMC)
• Memory Stick
• Memory Stick PRO
• Carte xD-Picture
LOGEMENT D E CARTE EXPRESSCARD — Prend en charge une carte ExpressCard. Votre ordinateur est livré avec un
cache en plastique dans le logement. Pour plus d'informations, reportez-vous à la section « Utilisation de cartes
ExpressCard » à la page 65.
REMARQUE : Le logement de carte ExpressCard ne prend PAS en charge les cartes PC.
Permet de relier l'ordinateur à un téléviseur. Permet également de relier des
périphériques audio numériques à l'aide d'un câble d'adaptateur audio
numérique/TV.
Raccordez un microphone au connecteur .
Raccordez un casque ou des haut-parleurs au
connecteur .Présentation de votre ordinateur 21
Vue du côté droit
BAIE D E LECTEUR OPTIQUE — Vous pouvez installer des périphériques, tels qu'un lecteur de DVD ou un autre
lecteur optique dans la baie de lecteur optique. Pour plus d'informations, reportez-vous à la section « Lecteurs
optiques » à la page 116.
BOUTON D'ÉJECTION D U PLATEAU D U LECTEUR OPTIQUE — Appuyez sur ce bouton pour éjecter un CD ou un
DVD du lecteur optique.
CONNECTEURS USB
CONNECTEUR MODEM (RJ-11)
AVIS : Le connecteur réseau est légèrement plus grand que le connecteur modem. Pour éviter d'endommager
l'ordinateur, ne connectez pas de ligne téléphonique au connecteur réseau.
1 baie de lecteur optique 2 bouton d'éjection du plateau
du lecteur optique
3 connecteurs USB (2)
4 connecteur modem (RJ-11) 5 connecteur réseau (RJ-45) 6 connecteur vidéo
Permettent de connecter des périphériques USB, tels qu'une souris, un clavier ou
une imprimante. Vous pouvez également relier le lecteur de disquette optionnel
directement à un connecteur USB à l'aide du câble pour lecteur de disquette
optionnel.
Pour utiliser le modem interne, connectez la ligne téléphonique au connecteur
modem.
Pour plus d'informations sur l'utilisation du modem, reportez-vous à la
documentation en ligne correspondante fournie avec votre ordinateur.
1 2 6 3 4522 Présentation de votre ordinateur
CONNECTEUR RÉSEAU (RJ-45)
CONNECTEUR VIDÉO
Vue arrière
CONNECTEURS USB
CONNECTEUR D'ADAPTATEUR SECTEUR — Sert à relier l'adaptateur secteur à l'ordinateur. Cet adaptateur convertit
l'alimentation CA en alimentation CC qui est celle requise par l'ordinateur. Vous pouvez connecter
l'adaptateur secteur à votre ordinateur, que ce dernier soit allumé ou éteint.
Permet de relier l'ordinateur à un réseau. Les voyants vert et jaune situés près du
connecteur indiquent l'activité de communication filaire.
Pour plus d'informations sur l'utilisation de la carte réseau, consultez la
documentation en ligne de la carte réseau fournie avec votre ordinateur.
Permet de relier un moniteur externe compatible VGA.
1 connecteurs USB (2) 2 connecteur d'adaptateur secteur
Permettent de connecter des périphériques USB, tels qu'une souris, un clavier ou
une imprimante. Vous pouvez également relier le lecteur de disquette optionnel
directement à un connecteur USB à l'aide du câble pour lecteur de disquette
optionnel.
1 2Présentation de votre ordinateur 23
PRÉCAUTION : L'adaptateur secteur fonctionne avec les tensions secteur disponibles dans le monde entier.
Cependant, les connecteurs et les rampes d'alimentation varient selon les pays. L'utilisation d'un câble non
compatible ou le branchement incorrect du câble sur la rampe d'alimentation ou la prise secteur peut provoquer
un incendie ou endommager l'équipement.
AVIS : Lorsque vous déconnectez l'adaptateur secteur de l'ordinateur, tenez le connecteur du câble de
l'adaptateur, pas le câble lui-même, et tirez dessus fermement mais sans forcer, afin d'éviter de l'endommager.
Vue de dessous
BATTERIE — Quand une batterie est installée, vous pouvez utiliser l'ordinateur sans le brancher au secteur. Pour
plus d'informations, reportez-vous à la section « Utilisation d'une batterie » à la page 37.
CACHE D U MODULE D E MÉMOIRE — Recouvre le compartiment des modules de mémoire. Pour de plus amples
informations, reportez-vous à la page 117.
LOQUET D E FERMETURE D E L A BAIE D E BATTERIE — Permet de retirer la batterie de la baie de batterie. Reportezvous à la section « Remplacement de la batterie » à la page 41.
1 batterie 2 cache du module de
mémoire
3 loquet de fermeture de la baie de
batterie
4 aération du ventilateur 5 cache du processeur et du
module thermique
6 cache du modem/de la carte/
du dispositif sans fil
7 vis de verrouillage du
lecteur optique
8 unité de disque dur 9 indicateur de charge de la batterie
6
5
7
1 3 2 4
8
924 Présentation de votre ordinateur
VENTILATEUR — L'ordinateur utilise un ventilateur pour garantir la circulation de l'air à travers les entrées d'air et
éviter tout risque de surchauffe.
CACHE D U PROCESSEUR E T D U MODULE THERMIQUE — Masque le processeur et le module thermique.
CACHE D U MODEM/D E LA CARTE MINI/D U DISPOSITIF SANS FIL — Recouvre le compartiment qui contient le
modem, la carte Mini et la carte interne dotée de la technologie sans fil Bluetooth. Pour de plus amples informations,
reportez-vous à la page 123.
VIS D E VERROUILLAGE D U LECTEUR OPTIQUE — Sert à fixer le lecteur optique dans la baie du lecteur optique. Pour
plus d'informations, reportez-vous à la section « Lecteurs optiques » à la page 116.
DISQUE DUR — Stocke les logiciels et les données. Pour plus d'informations, reportez-vous aux sections « Disque
dur » à la page 113 et « Problèmes liés au disque dur » à la page 86. La taille de votre disque dur affichée dans
l'Explorateur Windows est la capacité du lecteur avant l'installation de tout système d'exploitation ou tous
programmes.
INDICATEUR D E CHARGE D E L A BATTERIE — Donne des informations sur le niveau de charge de la batterie.
Reportez-vous à la section « Vérification de la charge de la batterie » à la page 38.Configuration de votre ordinateur 25
Configuration de votre ordinateur
Connexion à Internet
REMARQUE : Les fournisseurs d'accès Internet (FAI) et leurs offres varient selon les pays.
Pour vous connecter à Internet, vous devez disposer d'un modem ou d'une connexion réseau et d'un
fournisseur d'accès Internet (FAI). Votre fournisseur d'accès Internet vous proposera une ou
plusieurs des options de connexion Internet suivantes :
• Connexions d'accès à distance qui offrent un accès à Internet par l'intermédiaire d'une ligne
téléphonique. Ces connexions sont beaucoup plus lentes que les connexions DSL ou modem par
câble.
• Connexions DSL qui offrent un accès à Internet à haute vitesse par l'intermédiaire d'une ligne
téléphonique existante. Avec une connexion DSL, vous pouvez accéder à Internet et utiliser votre
téléphone sur la même ligne simultanément.
• Connexions modem par câble qui offrent un accès à Internet à haute vitesse par l'intermédiaire de
la ligne TV câblée locale.
Si vous utilisez une connexion d'accès à distance, connectez une ligne téléphonique au connecteur
du modem sur votre ordinateur et à la prise téléphonique murale avant de configurer la connexion
Internet. Si vous utilisez une connexion DSL ou modem par câble, contactez votre fournisseur
d'accès Internet pour obtenir les instructions de configuration.
Configuration de votre connexion Internet
Pour configurer une connexion Internet à l'aide du raccourci de bureau d'un fournisseur d'accès
Internet fourni :
1 Enregistrez et fermez tous les fichiers et quittez tous les programmes.
2 Double-cliquez sur l'icône d'un fournisseur d'accès Internet sur le bureau Microsoft® Windows®.
3 Pour effectuer la configuration, suivez les instructions qui s'affichent à l'écran.
Si aucune icône de fournisseur d'accès Internet n'apparaît sur votre bureau ou si vous souhaitez
configurer une connexion Internet avec un autre fournisseur d'accès Internet :
1 Enregistrez et fermez tous les fichiers et quittez tous les programmes.
2 Cliquez sur le bouton Démarrer, puis sur Internet Explorer.
L'Assistant Nouvelle connexion s'affiche.
3 Cliquez sur Connecter à Internet.
4 Dans la fenêtre suivante, cliquez sur l'option appropriée :
• Si vous ne disposez pas de fournisseur d'accès Internet et souhaitez en sélectionner un,
cliquez sur Choisir dans une liste de fournisseurs de services Internet.26 Configuration de votre ordinateur
• Si vous avez déjà reçu les informations de configuration de votre fournisseur de services Internet,
mais pas le CD de configuration, cliquez sur Configurer ma connexion manuellement.
• Si vous disposez d'un CD, cliquez sur Utiliser le CD fourni par mon fournisseur de services
Internet.
5 Cliquez sur Suivant.
Si vous sélectionnez Configurer ma connexion manuellement, passez à l'étape 6. Sinon, suivez les
instructions qui s'affichent à l'écran pour terminer la configuration.
REMARQUE : Si vous ne savez pas quel type de connexion sélectionner, contactez votre fournisseur d'accès
Internet.
6 Cliquez sur l'option appropriée sous Comment souhaitez-vous vous connecter à Internet ?, puis
cliquez sur Suivant.
7 Utilisez les informations fournies par votre fournisseur d'accès Internet pour terminer la configuration.
Si vous rencontrez des problèmes de connexion à Internet, reportez-vous à la section « Problèmes liés à la
messagerie électronique, au modem ou à Internet » à la page 86. Si vous ne pouvez pas vous connecter à
Internet alors que vous l'avez déjà fait auparavant, il est possible que le fournisseur d'accès Internet
subisse une interruption de services. Contactez-le pour vérifier l'état des services ou essayez de vous
connecter ultérieurement.
Transfert d'informations vers un nouvel ordinateur
Le système d'exploitation Microsoft® Windows® XP inclut un Assistant Transfert de fichiers et de
paramètres qui permet de déplacer des données d'un ordinateur à un autre. Vous pouvez transférer des
données telles que :
• Messages e-mail
• Paramètres de la barre d'outils
• Tailles de fenêtre
• Signets Internet
Vous pouvez transférer les données vers le nouvel ordinateur en utilisant une connexion réseau, ou les
stocker sur un support amovible, comme un CD inscriptible ou une disquette.
REMARQUE : Pour des instructions sur la configuration d'une connexion à câble directe entre deux ordinateurs,
reportez-vous à la base de connaissances de Microsoft Article nº 305621, intitulé How to Set Up a Direct Cable
Connection Between Two Computers in Windows XP (Comment configurer une connexion à câble directe entre
deux ordinateurs sous Windows XP). Ces informations peuvent ne pas être disponibles dans certains pays.
Pour transférer des informations vers un nouvel ordinateur, vous devez lancer l'Assistant Transfert de
fichiers et de paramètres. Pour ce faire, utilisez le CD Operating System en option ou créez un disque
Assistant à l'aide de l'utilitaire Assistant Transfert de fichiers et de paramètres.
Exécution de l'Assistant Transfert de fichiers et de paramètres avec le CD Operating System
REMARQUE : Le CD Operating system est requis. Toutefois, ce CD est en option et n'est pas obligatoirement
expédié avec tous les ordinateurs.Configuration de votre ordinateur 27
Pour ouvrir l'Assistant Transfert de fichiers et de paramètres :
1 Cliquez sur le bouton Démarrer, pointez sur Tous les programmes→ Accessoires→ Outils système,
puis cliquez sur Assistant Transfert de fichiers et de paramètres.
2 Lorsque l'écran de bienvenue de l'Assistant Transfert de fichiers et de paramètres s'affiche, cliquez sur
Suivant.
3 Dans l'écran De quel ordinateur s'agit-il ?, cliquez sur Nouvel ordinateur, puis sur Suivant.
4 Dans l'écran Avez-vous un CD-ROM de Windows XP ?, cliquez sur J'utiliserai l'Assistant du
CD-ROM de Windows XP, puis sur Suivant.
5 Lorsque l'écran Allez maintenant à votre ancien ordinateur s'affiche, allez à l'ancien ordinateur ou
ordinateur source. Ne cliquez pas sur Suivant à ce moment.
Pour copier les données à partir de l'ancien ordinateur :
1 Sur l'ancien ordinateur, insérez le CD Operating System de Windows XP.
2 Dans l'écran Bienvenue dans Microsoft Windows XP, cliquez sur Effectuer des tâches supplémentaires.
3 Sous Que voulez-vous faire ?, cliquez sur Transférer des fichiers et des paramètres.
4 Dans l'écran de bienvenue de l'Assistant Transfert de fichiers et de paramètres, cliquez sur Suivant.
5 Dans l'écran De quel ordinateur s'agit-il ?, cliquez sur Ancien ordinateur, puis sur Suivant.
6 Dans l'écran Sélectionnez une méthode de transfert, cliquez sur la méthode de transfert de votre choix.
7 Dans l'écran Que voulez-vous transférer ?, sélectionnez les éléments à transférer, puis cliquez sur
Suivant.
Une fois les informations copiées, l'écran Fin de la phase de collecte des données apparaît.
8 Cliquez sur Terminer.
Pour transférer les données vers le nouvel ordinateur :
1 Dans l'écran Allez maintenant à votre ancien ordinateur sur le nouvel ordinateur, cliquez sur Suivant.
2 Dans l'écran Où sont les fichiers et les paramètres ?, sélectionnez la méthode de transfert de vos
paramètres et fichiers, puis cliquez sur Suivant.
L'Assistant lit les paramètres et fichiers recueillis, puis les applique à votre nouvel ordinateur.
Lorsque tous les paramètres et fichiers ont été appliqués, l'écran Terminé s'affiche.
3 Cliquez sur Terminé et redémarrez le nouvel ordinateur.
Exécution de l'Assistant Transfert de fichiers et de paramètres sans le CD Operating System
Pour exécuter l'Assistant Transfert de fichiers et de paramètres sans le CD Operating system en option,
vous devez créer un disque Assistant qui va permettre la création d'un fichier d'image de sauvegarde pour
supports amovibles.
Pour créer un disque Assistant, servez-vous de votre nouvel ordinateur doté de Windows XP et suivez les
étapes suivantes :
1 Cliquez sur le bouton Démarrer, pointez sur Tous les programmes→ Accessoires→ Outils système,
puis cliquez sur Assistant Transfert de fichiers et de paramètres.
2 Lorsque l'écran de bienvenue de l'Assistant Transfert de fichiers et de paramètres s'affiche, cliquez sur
Suivant.
3 Dans l'écran De quel ordinateur s'agit-il ?, cliquez sur Nouvel ordinateur, puis sur Suivant.28 Configuration de votre ordinateur
4 Dans l'écran Avez-vous un CD-ROM de Windows XP ?, cliquez sur Je souhaite créer un disque
Assistant dans le lecteur suivant : , puis cliquez sur Suivant.
5 Insérez le support amovible, tel qu'une disquette ou un CD, puis cliquez sur OK.
6 Lorsque la création du disque est terminée et que le message Allez maintenant à votre ancien
ordinateur apparaît, ne cliquez pas sur Suivant.
7 Allez à votre ancien ordinateur.
Pour copier les données à partir de l'ancien ordinateur :
1 Insérez le disque Assistant sur l'ancien ordinateur.
2 Cliquez sur le bouton Démarrer, puis sur Exécuter.
3 Dans le champ Ouvrir de la fenêtre Exécuter, recherchez le chemin fastwiz (pour le support amovible
approprié) et cliquez sur OK.
4 Dans l'écran de bienvenue de l'Assistant Transfert de fichiers et de paramètres, cliquez sur Suivant.
5 Dans l'écran De quel ordinateur s'agit-il ?, cliquez sur Ancien ordinateur, puis sur Suivant.
6 Dans l'écran Sélectionnez une méthode de transfert, cliquez sur la méthode de transfert de votre choix.
7 Dans l'écran Que voulez-vous transférer ?, sélectionnez les éléments à transférer, puis cliquez sur
Suivant.
Une fois les informations copiées, l'écran Fin de la phase de collecte des données apparaît.
8 Cliquez sur Terminer.
Pour transférer les données vers le nouvel ordinateur :
1 Dans l'écran Allez maintenant à votre ancien ordinateur sur le nouvel ordinateur, cliquez sur Suivant.
2 Dans l'écran Où sont les fichiers et les paramètres ?, sélectionnez la méthode de transfert de vos
paramètres et fichiers, puis cliquez sur Suivant. Suivez les instructions qui s'affichent à l'écran.
L'Assistant lit les paramètres et fichiers recueillis, puis les applique à votre nouvel ordinateur.
Lorsque tous les paramètres et fichiers ont été appliqués, l'écran Terminé s'affiche.
3 Cliquez sur Terminé et redémarrez le nouvel ordinateur.
REMARQUE : Pour plus d'informations sur cette procédure, rendez-vous sur le site Web dell.support.com pour
accéder au document nº PA1089586 (How Do I Transfer Files From My Old Computer to My New Dell Computer
Using the Microsoft® Windows® XP Operating System CD? [Comment transférer des fichiers à partir de mon
ancien ordinateur vers mon nouvel ordinateur Dell™ à l'aide du CD Operating System Microsoft® Windows®XP]).
REMARQUE : Certains pays peuvent ne pas avoir accès au document de la base de connaissances Dell.
Configuration d'une imprimante
AVIS : Effectuez la configuration du système d'exploitation avant de connecter une imprimante à l'ordinateur.
Reportez-vous à la documentation fournie avec l'imprimante pour obtenir des informations sur la
configuration, notamment :
• Obtenir et installer les pilotes mis à jour.
• Connecter l'imprimante à l'ordinateur.
• Charger le papier et installer la cartouche de toner ou d'encre.Configuration de votre ordinateur 29
Consultez le Manuel du propriétaire de l'imprimante pour obtenir une assistance technique ou
contactez le fabricant de l'imprimante.
Câble de l'imprimante
L'imprimante se connecte à l'ordinateur avec un câble USB ou un câble parallèle. Il est possible que
l'imprimante soit livrée sans câble. Par conséquent, si vous achetez un câble séparément, assurez-vous
qu'il est compatible avec votre imprimante et votre ordinateur. Si vous avez acheté un câble
d'imprimante en même temps que l'ordinateur, il est possible qu'il vous soit livré avec ce dernier.
Connexion d'une imprimante USB
REMARQUE : Vous pouvez connecter des périphériques USB pendant que l'ordinateur est sous tension.
1 Effectuez la configuration du système d'exploitation, si vous ne l'avez pas déjà fait.
2 Raccordez le câble USB de l'imprimante aux connecteurs USB de l'ordinateur et de l'imprimante. Les
connecteurs USB ne s'insèrent que dans un seul sens.
3 Allumez l'imprimante, puis l'ordinateur. Si la fenêtre Assistant Ajout de matériel apparaît, cliquez sur
Annuler.
4 Le cas échéant, installez le pilote d'imprimante. Consultez la documentation de l'imprimante.
1 connecteur USB de l'ordinateur 2 câble USB de l'imprimante 3 connecteur sur l'imprimante
2
1
330 Configuration de votre ordinateur
Périphériques de protection contre les surtensions électriques
Plusieurs périphériques peuvent vous protéger contre les fluctuations de la tension et les pannes
d'alimentation :
• Parasurtenseurs
• Filtres de ligne
• Onduleurs
Parasurtenseurs
Les parasurtenseurs et les rampes d'alimentation équipées d'une protection contre la surtension
réduisent les risques d'endommagement de votre ordinateur provoqués par les pointes de tension
pouvant survenir au cours d'un orage électrique ou suite à une coupure de courant. Certains fabricants
offrent également une garantie contre certains types de dégâts. Lisez attentivement la garantie du
parasurtenseur que vous achetez. Un protecteur doté d'une valeur nominale en joules plus élevée offre
une meilleure protection. Comparez les valeurs nominales, en joules, afin de déterminer l'efficacité
relative des différents dispositifs.
AVIS : La plupart des parasurtenseurs ne protègent pas contre les fluctuations de tension ou les coupures de
courant. Lorsqu'un orage est proche, débranchez la ligne téléphonique de la prise murale et déconnectez votre
ordinateur de la prise de courant.
De nombreux parasurtenseurs sont équipés d'une prise téléphonique pour assurer la protection du
modem. Consultez la documentation du parasurtenseur pour obtenir des instructions sur la connexion
du modem.
AVIS : Certains parasurtenseurs n'offrent pas de protection pour les cartes réseau. Déconnectez le câble de
réseau de la prise réseau murale pendant les orages.
Filtres de ligne
AVIS : Les filtres de ligne n'offrent pas de protection contre les coupures de courant.
Ils sont conçus pour maintenir la tension CA à un niveau relativement constant.
Onduleurs
AVIS : Une baisse de tension pendant l'enregistrement des données sur le disque dur peut provoquer une perte de
données ou la corruption du fichier.
REMARQUE : Pour optimiser le temps de fonctionnement de la batterie, connectez uniquement votre ordinateur à
un onduleur. Connectez les autres périphériques, tels que l'imprimante, à une rampe d'alimentation différente
équipée d'un parasurtenseur.
Les onduleurs protègent contre les fluctuations de tension et les coupures de courant. Ils incluent une
batterie qui alimente temporairement les périphériques connectés lorsque l'alimentation secteur est
coupée. La batterie se charge lorsque l'alimentation secteur est disponible. Consultez la documentation
fournie par le fabricant de l'onduleur afin d'obtenir des informations sur la durée de fonctionnement de
la batterie et vous assurer que le dispositif est approuvé par Underwriters Laboratories (UL).Utilisation de l'écran 31
Utilisation de l'écran
Réglage de la luminosité
Lorsque l'ordinateur Dell™ fonctionne avec une batterie, vous pouvez économiser de l'énergie en
réglant le paramètre de luminosité au minimum acceptable à l'aide de et la flèche haut ou
bas du clavier.
REMARQUE : Les combinaisons de touches pour la luminosité n'ont des répercussions que sur l'affichage
de l'ordinateur portable ; elles n'ont aucune répercussion sur les moniteurs ou les projecteurs que vous
connectez au portable ou à la station d'accueil. Si l'ordinateur est connecté à un moniteur externe et que vous
essayez de modifier le niveau de luminosité, il se peut que l'indicateur de luminosité s'affiche, mais le niveau
de luminosité du périphérique externe ne change pas dans tous les cas.
Appuyez sur les touches suivantes pour régler la luminosité de l'écran :
• Appuyez sur et sur la flèche haut pour augmenter la luminosité de l'écran intégré
uniquement (pas sur un moniteur externe).
• Appuyez sur et sur la flèche bas pour réduire la luminosité sur l'écran intégré uniquement
(pas sur un moniteur externe).
Basculement de l'image vidéo
Lorsque vous démarrez un ordinateur auquel un périphérique externe (tel qu'un moniteur externe
ou un projecteur) est connecté et que ce périphérique est sous tension, l'image peut s'afficher sur
l'écran intégré ou sur le périphérique externe.
Appuyez sur pour basculer entre les options d'affichage suivantes pour l'image vidéo :
écran seul, périphérique externe seul ou écran et périphérique externe simultanément.
Réglage de la résolution d'affichage et du taux de
rafraîchissement
Pour qu'un programme s'affiche à une résolution spécifique, le contrôleur vidéo et l'écran doivent
prendre tous deux en charge le programme sélectionné et les pilotes vidéo requis doivent être
installés.
Avant de modifier un paramètre d'affichage par défaut, prenez note du paramètre d'origine et
gardez-le pour référence ultérieure.32 Utilisation de l'écran
Si vous sélectionnez une résolution ou une palette de couleurs plus élevée que celle prise en charge par
l'écran, les paramètres se règlent automatiquement sur la configuration prise en charge la plus proche.
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Sous Choisissez une catégorie, cliquez sur Apparence et thèmes.
3 Sous Choisissez une tâche…, cliquez sur la zone à modifier, ou sous ou une icône du Panneau de
configuration, cliquez sur Affichage.
4 Essayez différents paramètres de Qualité couleur et Résolution d'écran.
REMARQUE : Lorsque vous augmentez la résolution de l'écran, les icônes et le texte apparaissent plus petits.Utilisation du clavier et de la tablette tactile 33
Utilisation du clavier et de la tablette tactile
Pavé numérique
Le pavé numérique fonctionne comme celui d'un clavier externe. Chaque touche du pavé
numérique a plusieurs fonctions. Les chiffres et les symboles du pavé numérique figurent en bleu à
droite de ces touches. Pour taper un chiffre ou un symbole, appuyez sur et sur la touche
désirée après activation du pavé.
• Pour activer le pavé numérique, appuyez sur . Le voyant indique que le pavé
numérique est activé.
• Pour désactiver le pavé numérique, appuyez de nouveau sur .
1 pavé numérique
1
934 Utilisation du clavier et de la tablette tactile
Combinaisons de touches
Fonctions système
Batterie
Plateau du lecteur de CD ou DVD
Fonctions d'affichage
Radios (notamment le réseau sans fil et une carte interne dotée de la technologie sans
fil Bluetooth®)
Ouvre la fenêtre Gestionnaire des tâches.
Affiche la jauge de batterie Dell™ QuickSet. Cette
fonctionnalité n'est pas prise en charge par Dell
MediaDirect. Pour plus d'informations, reportez-vous à la
section « Jauge de batterie Dell™ QuickSet » à la
page 38.
Éjecte le plateau du lecteur (si Dell QuickSet est
installé). Cette fonctionnalité n'est pas prise en charge
par Dell MediaDirect. Pour plus d'informations sur
QuickSet, reportez-vous à la section « Fonctions Dell™
QuickSet » à la page 133.
Bascule l'image vidéo vers l'option d'affichage suivante.
Les options comprennent l'écran intégré, un moniteur
externe et les deux écrans simultanément.
et la touche flèche
haut
Augmente la luminosité sur l'écran intégré uniquement
(non pas sur un moniteur externe).
et la touche flèche
bas
Diminue la luminosité sur l'écran intégré uniquement
(non pas sur un moniteur externe).
Active et désactive les radios, notamment le réseau sans
fil et la carte dotée de la technologie sans fil Bluetooth.Utilisation du clavier et de la tablette tactile 35
Gestion de l'alimentation
Fonctions des haut-parleurs
Fonctions de la touche du logo Microsoft® Windows®
Pour régler les options du clavier, telles que la vitesse de répétition des caractères, ouvrez le panneau de
configuration, cliquez sur Imprimantes et autres périphériques, puis sur Clavier. Pour plus
d'informations sur le panneau de configuration, contactez le Centre d'aide et de support de Windows.
Pour accéder au Centre d'aide et de support, reportez-vous à la page 14.
Active un mode d'économie d'énergie. Vous pouvez
reprogrammer ce raccourci clavier pour activer un autre
mode d'économie d'énergie sous l'onglet Avancé de la
fenêtre Propriétés des options d'alimentation. Reportezvous à la section « Modes d'économie d'énergie » à la
page 40.
Augmente le volume des haut-parleurs intégrés et des hautparleurs externes, si des haut-parleurs externes sont branchés.
Diminue le volume des haut-parleurs intégrés et des hautparleurs externes, si des haut-parleurs externes sont branchés.
Active et désactive les haut-parleurs intégrés et les hautparleurs externes, si des haut-parleurs externes sont branchés.
Touche du logo Windows et Réduit toutes les fenêtres ouvertes.
Touche du logo Windows et
Agrandit toutes les fenêtres.
Touche du logo Windows et Exécute l'Explorateur Windows. Cela ouvre la même
fenêtre que lorsque vous double-cliquez sur Poste de
travail sur le bureau.
Touche du logo Windows et Ouvre la boîte de dialogue Exécuter.
Touche du logo Windows et Ouvre la boîte de dialogue Search Results (Résultats
de la recherche).
Touche du logo Windows et
Ouvre la boîte de dialogue Search Results-Computer
(Résultats de la recherche - Ordinateur)
(si l'ordinateur est connecté à un réseau).
Touche du logo Windows et
Ouvre la boîte de dialogue System Properties
(Propriétés système).36 Utilisation du clavier et de la tablette tactile
Tablette tactile
La tablette tactile détecte la pression et le mouvement de vos doigts pour vous permettre de déplacer le
curseur à l'écran. Utilisez la tablette tactile et ses boutons de la même façon que vous utilisez la souris.
• Posez et déplacez votre doigt sur la surface de la tablette tactile pour déplacer le curseur.
• Pour sélectionner un objet, appuyez délicatement une fois sur la surface de la tablette tactile ou
appuyez avec le pouce sur le bouton gauche de la tablette tactile.
• Pour sélectionner et déplacer (ou faire glisser) un objet, placez le curseur sur l'objet et tapez deux fois
sur la tablette. Laissez votre doigt sur la tablette tactile la deuxième fois et déplacez l'objet sélectionné
en faisant glisser votre doigt sur la surface.
• Pour double-cliquer sur un objet, placez le curseur sur l'objet et appuyez doucement deux fois sur la
tablette tactile ou appuyez deux fois sur le bouton gauche à l'aide de votre pouce.
Personnalisation de la tablette tactile
Vous pouvez désactiver la tablette tactile ou régler ses paramètres à l'aide de la fenêtre de propriétés
Mouse Properties (Souris).
1 Ouvrez le Panneau de configuration, cliquez sur Imprimantes et autres périphériques, puis cliquez sur
Souris. Pour plus d'informations sur le panneau de configuration, contactez le Centre d'aide et de
support de Windows. Pour accéder au Centre d'aide et de support, reportez-vous à la page 14.
2 Dans la fenêtre de propriétés Mouse Properties (Souris), cliquez sur l'onglet Tablette tactile pour
régler les paramètres de la tablette tactile.
3 Cliquez sur OK pour enregistrer les paramètres et fermer la fenêtre.
1 tablette tactile
1Utilisation d'une batterie 37
Utilisation d'une batterie
Performances de la batterie
REMARQUE : Pour obtenir des informations sur la garantie Dell de votre ordinateur, reportez-vous au Guide
d'information sur le produit ou au document de garantie livré avec votre ordinateur.
Pour un fonctionnement optimal et afin de préserver les paramètres du BIOS, laissez la batterie
principale installée en permanence dans votre ordinateur portable Dell™. Votre ordinateur est livré
avec une batterie, installée dans la baie.
REMARQUE : Lors de la première utilisation de votre ordinateur, la batterie n'étant pas obligatoirement
complètement chargée, utilisez l'adaptateur secteur pour raccorder votre nouvel ordinateur à une prise
secteur. Pour de meilleurs résultats, utilisez l'adaptateur secteur tant que la batterie n'est pas complètement
chargée. Pour afficher le niveau de charge de la batterie, accédez au Panneau de configuration, cliquez sur
Options d'alimentation, puis cliquez sur l'onglet Jauge d'alimentation.
REMARQUE : L'autonomie de la batterie (la période durant laquelle la batterie reste chargée) diminue avec
le temps. Selon la fréquence d'utilisation et les conditions de fonctionnement de la batterie, il est possible que
vous deviez en acheter une autre au cours de la durée de vie de votre ordinateur.
L'autonomie de la batterie varie en fonction des conditions de fonctionnement. Cette durée est
considérablement réduite par l'exécution de certaines opérations, notamment, sans que cela soit
limitatif :
• Utilisation des lecteurs optiques
• Utilisation de périphériques de communications sans fil, de cartes ExpressCard, de cartes
mémoire multimédia ou de périphériques USB
• Utilisation de paramètres élevés d'affichage et de luminosité, d'économiseurs d'écran en 3D ou
d'autres programmes gourmands en ressources, tels que des jeux en 3D
• Fonctionnement de l'ordinateur en mode de performances optimales (reportez-vous à la section
« Configuration des paramètres de gestion de l'alimentation » à la page 41).
REMARQUE : Il est recommandé de connecter l'ordinateur à une prise électrique lorsque vous gravez un CD
ou DVD.
Vous pouvez vérifier le niveau de charge de la batterie (reportez-vous à la section « Vérification de la
charge de la batterie » à la page 38) avant d'insérer la batterie dans l'ordinateur. Vous pouvez
également définir des options de gestion de l'alimentation afin que l'ordinateur vous alerte lorsque le
niveau de charge de la batterie est faible. Pour des informations sur l'accès à Quickset ou à la fenêtre
Propriétés des options d'alimentation, reportez-vous à la section « Configuration des paramètres de
gestion de l'alimentation » à la page 41.38 Utilisation d'une batterie
PRÉCAUTION : L'utilisation d'une batterie non compatible peut accroître le risque d'incendie ou d'explosion.
Ne remplacez la batterie que par une batterie compatible achetée auprès de Dell. La batterie est conçue pour
fonctionner avec votre ordinateur Dell. N'utilisez pas la batterie d'un autre ordinateur.
PRÉCAUTION : Ne jetez pas les batteries avec les ordures ménagères. Lorsque votre batterie ne tient plus sa
charge, contactez votre service municipal de traitement des déchets pour savoir comment vous en débarrasser.
Reportez-vous à la section « Mise au rebut de la batterie » du Guide d'information sur le produit.
PRÉCAUTION : Une utilisation inadéquate de la batterie peut augmenter le risque d'incendie ou de brûlure
chimique. Prenez soin de ne pas la percer, l'incinérer, la démonter ou l'exposer à une température supérieure à
65 °C (149 °F). Conservez la batterie hors de portée des enfants. Manipulez les batteries endommagées ou percées
avec d'extrêmes précautions. Les batteries endommagées peuvent fuir et causer des dommages personnels ou
matériels.
Vérification de la charge de la batterie
La jauge de batterie Dell QuickSet, la fenêtre de jauge de Microsoft® Windows®, l'icône , la jauge
de charge et la jauge d'état de la batterie, ainsi que l'alerte de batterie faible fournissent des informations
sur le niveau de charge de la batterie.
Jauge de batterie Dell™ QuickSet
Si Dell QuickSet est installé, appuyez sur pour afficher la jauge de batterie QuickSet. La
fenêtre Jauge de batterie affiche l'état, le niveau de charge et la durée nécessaire pour le chargement
complet de la batterie de votre ordinateur. Pour des informations sur QuickSet, cliquez avec le bouton
droit de la souris sur l'icône de la barre des tâches, puis cliquez sur Aide.
Microsoft® Windows® Jauge
La jauge de Windows indique la charge de batterie restante. Pour consulter la jauge, double-cliquez sur
l'icône de la barre des tâches. Pour plus d'informations sur la jauge d'alimentation, reportez-vous à la
section « Configuration des paramètres de gestion de l'alimentation » à la page 41.
Si l'ordinateur est relié à une prise secteur, l'icône apparaît.
Indicateur de charge
En appuyant une fois sur le bouton d'état de l'indicateur de charge de la batterie ou en appuyant et en
maintenant enfoncé ce bouton, vous pouvez vérifier les éléments suivants :
• Le niveau de charge de la batterie (appuyez et relâchez le bouton d'état)
• L'état de fonctionnement de la batterie (appuyez et maintenez enfoncé le bouton d'état)
L'autonomie de la batterie est déterminée en grande partie par le nombre de charges qu'elle reçoit. Après
des centaines de cycles de charge et de décharge, la capacité de charge des batteries diminue et l'état des
batteries se dégrade. C'est pourquoi, une batterie peut afficher l'état « chargé » tout en maintenant un
niveau de charge réduit (état). Utilisation d'une batterie 39
Vérification du niveau de charge de la batterie
Pour vérifier le niveau de charge de la batterie, appuyez sur le bouton d'état, situé sur l'indicateur de
charge de la batterie, et relâchez-le pour allumer les voyants de niveau de charge. Chaque voyant
représente environ 20 pour cent de la charge totale de la batterie. S'il reste, par exemple, 80 pour cent de
la charge de la batterie, quatre des voyants sont allumés. Si aucun voyant n'est allumé, la batterie est
complètement déchargée.
Vérification de l'état de fonctionnement de la batterie
REMARQUE : Vous pouvez vérifier l'état de fonctionnement de la batterie de l'une des deux manières suivantes :
en utilisant l'indicateur de charge de la batterie comme décrit ci-dessous ou en utilisant la jauge de batterie de Dell
QuickSet. Pour des informations sur QuickSet, cliquez avec le bouton droit de la souris sur l'icône de la barre
des tâches, puis cliquez sur Aide.
Pour vérifier l'état de fonctionnement de la batterie à l'aide de l'indicateur de charge, appuyez sur le
bouton d'état de l'indicateur de charge de la batterie et maintenez-le enfoncé pendant au moins
3 secondes. Si aucun voyant ne s'allume, la batterie est en bon état et elle dispose encore de plus de
80 pour cent de sa capacité de charge d'origine. Chaque voyant représente une dégradation
incrémentielle. Si cinq voyants s'allument, la batterie dispose de moins de 60 pour cent de sa capacité de
charge et vous devez envisager son remplacement. Pour plus d'informations sur l'autonomie de la
batterie, reportez-vous à la section « Caractéristiques » à la page 157.
Alerte de batterie faible
AVIS : Pour éviter de perdre ou de corrompre des données, enregistrez votre travail juste après l'apparition de
l'alerte de batterie faible, puis branchez l'ordinateur sur une prise murale. Si la batterie est complètement
déchargée, l'ordinateur passe automatiquement en mode Mise en veille prolongée.
Par défaut, une fenêtre contextuelle vous avertit lorsque la batterie est déchargée à environ 90 pour cent.
Vous pouvez modifier les paramètres des alertes relatives à la batterie. Pour des informations sur l'accès à
Quickset ou à la fenêtre Propriétés des options d'alimentation, reportez-vous à la section
« Configuration des paramètres de gestion de l'alimentation » à la page 41.
Préservation de l'alimentation par batterie
Procédez comme suit pour économiser l'alimentation de la batterie :
• Connectez l'ordinateur à une prise secteur aussi souvent que possible car la durée de vie de la batterie
est largement déterminée par le nombre d'utilisations et de recharges.
• Mettez l'ordinateur en mode Veille ou en mode Mise en veille prolongée lorsque vous le laissez allumé
sans l'utiliser pendant de longs laps de temps. Pour plus d'informations sur les modes Veille et Mise en
veille prolongée, reportez-vous à la section « Modes d'économie d'énergie » à la page 40.
• Vous pouvez sélectionner des options à l'aide de l'Assistant Gestion de l'alimentation afin d'optimiser
l'utilisation de l'énergie de votre ordinateur. Vous pouvez également configurer ces options pour changer
lorsque vous appuyez sur le bouton d'alimentation, fermez l'écran ou appuyez sur <Échap>.
Reportez-vous à la section « Configuration des paramètres de gestion de l'alimentation » à la page 41
pour plus d'informations sur l'utilisation de l'Assistant Gestion de l'alimentation.
REMARQUE : Reportez-vous à la section « Performances de la batterie » à la page 37 pour plus d'informations sur
la préservation de l'alimentation par batterie.40 Utilisation d'une batterie
Modes d'économie d'énergie
Mode Veille
Le mode Veille permet d'économiser l'énergie en désactivant l'affichage et le disque dur au terme d'une
période d'inactivité prédéterminée (délai d'attente). Lorsque l'ordinateur quitte le mode Veille, il
retourne à son état précédent.
AVIS : Si l'alimentation secteur ou sur batterie est coupée alors que l'ordinateur est en mode Veille, vous risquez
de perdre des données.
Pour passer en mode Veille :
• Cliquez sur le bouton Démarrer, sur Arrêter l'ordinateur, puis sur Veille.
ou
• Selon les options de gestion de l'alimentation configurées sous l'onglet Avancé (reportez-vous à la
section « Configuration des paramètres de gestion de l'alimentation » à la page 41) de la fenêtre
Propriétés des Options d'alimentation, utilisez l'une des méthodes suivantes :
– Appuyez sur le bouton d'alimentation.
– Fermez l'écran.
– Appuyez sur <Échap>.
En fonction de la configuration des options de l'onglet Avancé, appuyez sur le bouton d'alimentation
électrique ou ouvrez l'écran pour quitter le mode Veille. Vous ne pouvez pas quitter le mode Veille au
moyen d'une touche ou de la tablette tactile.
Mode Mise en veille prolongée
Le mode Mise en veille prolongée économise l'énergie en copiant les données système dans une zone
réservée du disque dur avant d'éteindre complètement l'ordinateur. Lorsque l'ordinateur quitte le mode
Mise en veille prolongée, il retourne à son état précédent.
AVIS : Vous ne pouvez ni retirer des périphériques ni déconnecter votre ordinateur de la station d'accueil lorsqu'il
est en mode Mise en veille prolongée.
Votre ordinateur passe en mode Mise en veille prolongée quand le niveau de charge de la batterie devient
insuffisant.
Pour passer en mode Mise en veille prolongée manuellement :
• Cliquez sur le bouton Démarrer, puis sur Arrêter l'ordinateur, appuyez sur et maintenez la
touche enfoncée, puis cliquez sur Mise en veille prolongée.
ou
• Selon les options de gestion de l'alimentation configurées dans l'onglet Avancé de la fenêtre Propriétés
des options d'alimentation, utilisez l'une des méthodes suivantes pour passer en mode Mise en veille
prolongée :
– Appuyez sur le bouton d'alimentation.
– Fermez l'écran.
– Appuyez sur .Utilisation d'une batterie 41
REMARQUE : Certaines cartes ExpressCard peuvent ne pas fonctionner correctement lorsque l'ordinateur sort du
mode Mise en veille prolongée. Retirez et réinsérez la carte (reportez-vous à la section « Retrait d'une carte
ExpressCard ou d'un cache » à la page 67) ou redémarrez tout simplement l'ordinateur.
Pour quitter le mode Mise en veille prolongée, appuyez sur le bouton d'alimentation. L'ordinateur peut
mettre quelques instants à quitter le mode Mise en veille prolongée. Vous ne pouvez pas quitter le mode
Mise en veille prolongée au moyen d'une touche ou de la tablette tactile. Pour plus d'informations sur le
mode Mise en veille prolongée, consultez la documentation livrée avec votre système d'exploitation.
Configuration des paramètres de gestion de l'alimentation
Vous pouvez utiliser l'Assistant Gestion de l'alimentation de QuickSet ou les propriétés des options
d'alimentation de Windows pour configurer les paramètres de gestion de l'alimentation sur votre
ordinateur.
• Pour accéder à l'Assistant Gestion de l'alimentation QuickSet, double-cliquez sur l'icône dans la
barre des tâches. Pour plus d'informations sur QuickSet, cliquez sur le bouton Aide dans l'Assistant
Gestion de l'alimentation.
• Pour accéder à la fenêtre Propriétés des options d'alimentation, cliquez sur le bouton Démarrer→
Panneau de configuration→ Performances et maintenance→ Options d'alimentation. Pour des
informations sur les champs de la fenêtre Propriétés des options d'alimentation, cliquez sur l'icône
Point d'interrogation dans la barre de titre, puis sur la zone sur laquelle vous souhaitez obtenir des
informations.
Chargement de la batterie
REMARQUE : Avec Dell™ ExpressCharge™, l'adaptateur secteur charge une batterie complètement déchargée
en 1 heure si l'ordinateur est éteint. La durée de chargement est plus longue lorsque l'ordinateur est sous tension.
Vous pouvez laisser la batterie dans l'ordinateur aussi longtemps que vous le souhaitez. Les circuits internes de la
batterie préviennent toute surcharge.
Lorsque vous branchez l'ordinateur sur une prise secteur ou que vous installez une batterie pendant que
l'ordinateur est branché sur une prise secteur, l'ordinateur vérifie le niveau de charge et la température de
la batterie. Au besoin, l'adaptateur secteur charge alors la batterie et maintient le niveau de charge.
Si la batterie est chaude parce qu'elle se trouvait dans l'ordinateur ou en raison de la température
extérieure, il est probable qu'elle ne se charge pas lorsque vous branchez l'ordinateur sur une prise
secteur.
Si le voyant clignote alternativement vert et orange, la batterie est trop chaude pour être chargée.
Débranchez l'ordinateur de la prise secteur et laissez refroidir l'ordinateur et la batterie jusqu'à ce qu'ils
atteignent la température ambiante. Branchez alors l'ordinateur sur une prise secteur et continuez à
charger la batterie.
Pour plus d'informations sur la résolution des problèmes liés à la batterie, reportez-vous à la section
« Problèmes d'alimentation » à la page 97.
Remplacement de la batterie
PRÉCAUTION : Avant d'exécuter ces procédures, éteignez votre ordinateur, débranchez l'adaptateur secteur de
la prise secteur et de l'ordinateur, débranchez le modem de la prise murale et de l'ordinateur et retirez les autres
câbles externes de l'ordinateur.42 Utilisation d'une batterie
AVIS : Vous devez retirer tous les câbles externes de l'ordinateur pour éviter d'endommager les connecteurs.
PRÉCAUTION : L'utilisation d'une batterie non compatible peut accroître le risque d'incendie ou d'explosion.
Ne remplacez la batterie que par une batterie compatible achetée auprès de Dell. La batterie est conçue pour
fonctionner avec votre ordinateur Dell™, n'utilisez pas la batterie d'un autre ordinateur.
AVIS : Si vous décidez de remplacer la batterie alors que l'ordinateur est en veille, vous disposez d'une minute
pour effectuer cette opération. Passé ce délai, l'ordinateur s'éteint et toutes les données non enregistrées sont
définitivement perdues.
Pour retirer la batterie :
1 Si l'ordinateur est connecté à une station d'accueil, déconnectez-le. Pour obtenir des instructions,
consultez la documentation qui accompagne la station d'accueil.
2 Assurez-vous que l'ordinateur est éteint ou en mode de gestion de l'alimentation.
3 Faites glisser en le maintenant le loquet de fermeture de la baie de la batterie, situé sous l'ordinateur,
puis retirez la batterie de la baie.
Pour remettre en place la batterie, suivez la procédure de retrait dans l'ordre inverse.
Stockage de la batterie
Retirez la batterie de l'ordinateur lorsque vous rangez ce dernier pendant une période prolongée. Sinon,
la batterie finira par se décharger. Après une longue période de stockage, rechargez complètement la
batterie avant de l'utiliser (reportez-vous à la section « Chargement de la batterie » à la page 41).
1 batterie 2 loquet de fermeture de la baie de batterie
2
1Utilisation de CD, de DVD et d'autres supports multimédias 43
Utilisation de CD, de DVD et d'autres supports
multimédias
Lecture CD ou DVD
AVIS : N'exercez pas de pression vers le bas sur le plateau du lecteur de CD ou de DVD lorsque vous l'ouvrez
ou le fermez. Laissez le plateau fermé lorsque vous n'utilisez pas le lecteur.
AVIS : Ne déplacez pas l'ordinateur lors de la lecture de CD ou de DVD.
1 Appuyez sur le bouton d'éjection qui se trouve sur le devant du lecteur.
2 Tirez sur le plateau.
3 Placez le disque, étiquette vers le haut, au centre du plateau et enclenchez-le sur l'axe.
REMARQUE : Si vous utilisez un module expédié avec un autre ordinateur, installez les pilotes et les logiciels
nécessaires à la lecture de DVD ou à l'écriture de données. Pour plus d'informations, reportez-vous au CD
Drivers and Utilities (le CD Drivers and Utilities est en option et n'est pas obligatoirement disponible pour votre
ordinateur ou dans certains pays).
4 Poussez le plateau du lecteur pour le refermer.44 Utilisation de CD, de DVD et d'autres supports multimédias
Pour formater les CD afin de stocker des données, créer des CD de musique ou copier des CD, reportezvous au logiciel du CD livré avec votre ordinateur.
REMARQUE : Assurez-vous d'être en règle avec les lois relatives aux droits d'auteur lorsque vous créez des CD.
Les lecteurs de CD sont dotés des boutons essentiels suivants :
Les lecteurs de DVD sont dotés des boutons essentiels suivants :
Pour plus d'informations sur la lecture de CD ou DVD, cliquez sur Aide sur le lecteur de CD ou DVD (si
disponible).
Lecture.
Marche arrière dans la plage en cours.
Pause.
Marche avant dans la plage en cours.
Arrêt.
Revenir à la plage précédente.
Éjecter.
Passer à la plage suivante.
Arrêt.
Redémarrer le chapitre en cours.
Lecture.
Avance rapide.
Pause.
Retour rapide.
Avancer d'une trame en mode Pause.
Passer au titre ou au chapitre suivant.
Lecture continue du titre ou du chapitre en cours.
Revenir au titre ou au chapitre précédent.
Éjecter.Utilisation de CD, de DVD et d'autres supports multimédias 45
Réglage du volume
REMARQUE : Lorsque les haut-parleurs sont mis en sourdine, vous ne pouvez pas entendre le son du CD ou
du DVD.
1 Cliquez sur le bouton Démarrer, pointez sur Tous les programmes (ou Programmes)→ Accessoires→
Divertissement (ou Multimédia), puis cliquez sur Contrôle du volume.
2 Dans la fenêtre Contrôle du volume, cliquez et faites glisser la barre située dans la colonne Contrôle
du volume, puis déplacez-la vers le haut ou le bas pour augmenter ou diminuer le volume.
Pour plus d'informations sur les options de contrôle du volume, cliquez sur Aide dans la fenêtre Contrôle
du volume.
L'indicateur de volume affiche le niveau du volume actuel, même lorsque le son est mis en sourdine, sur
votre ordinateur. Vous pouvez cliquer sur l'icône dans la barre des tâches et sélectionner ou
désélectionner Disable On Screen Volume Meter (Désactiver l'indicateur de volume à l'écran) ou
appuyer sur les boutons de contrôle du volume pour activer ou désactiver l'indicateur de volume à
l'écran.
Lorsque l'indicateur est activé, réglez le volume à l'aide des boutons de contrôle du volume ou en
appuyant sur les touches suivantes :
• Appuyez sur pour augmenter le volume.
• Appuyez sur pour réduire le volume.
• Appuyez sur pour mettre le volume en sourdine.
Pour plus d'informations sur QuickSet, cliquez avec le bouton droit de la souris sur l'icône dans la
barre des tâches, puis cliquez sur Aide.
Réglage de l'image
Si un message d'erreur vous informe que la résolution et la profondeur de couleur en cours utilisent trop
de mémoire et empêchent la lecture du DVD, réglez les propriétés d'affichage.
1 icône du volume 2 indicateur de volume 3 icône de mise en sourdine
1
3
246 Utilisation de CD, de DVD et d'autres supports multimédias
Microsoft® Windows® XP
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Sous Choisissez une catégorie, cliquez sur Apparence et thèmes.
3 Sous Choisir une tâche..., cliquez sur Change the screen resolution (Modifier la résolution de l'écran).
4 Dans la fenêtre Propriétés de l'affichage, cliquez sur la barre de Résolution de l'écran et faites-la glisser
pour définir la résolution à 1024 sur 768 pixels.
5 Cliquez sur le menu déroulant sous Qualité couleur, puis cliquez sur Moyenne 16 bits.
6 Cliquer sur OK.
Utilisation de Dell Media Experience™ et de Dell MediaDirect™
REMARQUE : Dell MediaDirect™ est en option et peut ne pas être fourni avec votre ordinateur.
REMARQUE : Dell QuickSet est requis pour le bon fonctionnement de Dell MediaDirect. La modification ou la
désactivation des paramètres par défaut de QuickSet peuvent limiter les fonctionnalités de Dell MediaDirect. Pour
plus d'informations sur Dell QuickSet, reportez-vous à la section « Fonctions Dell™ QuickSet » à la page 133.
Appuyez sur le bouton Dell MediaDirect, situé à l'avant de l'ordinateur, pour lancer Dell Media
Experience ou Dell MediaDirect.
Si l'ordinateur est allumé ou en mode Veille
Si vous appuyez sur le bouton Dell MediaDirect tandis que l'ordinateur est sous tension ou en mode
Veille, Windows XP Media Center Manager ou Dell Media Experience s'exécute, en fonction de la
configuration de votre système.
Si l'ordinateur est éteint ou en mode Mise en veille prolongée
Lorsque votre ordinateur est hors tension ou en mode Mise en veille prolongée, vous pouvez appuyer sur
le bouton Dell MediaDirect pour le démarrer et lancer automatiquement l'application Dell MediaDirect.
1 bouton Dell MediaDirect
1Utilisation de CD, de DVD et d'autres supports multimédias 47
REMARQUE : Vous ne pouvez pas réinstaller la fonction Dell Media Experience ou Dell MediaDirect si vous
reformatez involontairement le disque dur. Le logiciel d'installation est requis pour réinstaller ces applications
multimédia. Contactez Dell pour obtenir une assistance. Reportez-vous à la section « Contacter Dell » à la
page 137.
Aide de Dell MediaDirect et Dell Media Experience
L'application multimédia de Dell sur votre ordinateur contient des informations d'aide. Lorsque vous
lancez l'application multimédia, cliquez sur l'icône du bureau pour obtenir une aide supplémentaire.
Utilisation du CD Repair Utility (Utilitaire de réparation) de Dell MediaDirect™ ou du CD
Reinstallation (Réinstallation) de Dell MediaDirect
CD Repair Utility (Utilitaire de réparation)
REMARQUE : L'utilitaire de réparation peut être enregistré sur le CD Drivers and Utilities plutôt que sur le CD
Repair Utility, ou bien il peut être téléchargé.
Utilisez le CD Repair Utility pour réparer Dell MediaDirect lorsque :
• Votre ordinateur est encore équipé de son disque dur d'origine, mais que :
– Dell MediaDirect ne fonctionne par correctement.
– Dell MediaDirect ne s'exécute pas lorsque vous appuyez sur le bouton Dell MediaDirect.
– Vous devez réinstaller le système d'exploitation Microsoft® Windows®.
• Vous recevez ce kit avec un nouvel ordinateur et vous souhaitez modifier la façon dont votre disque dur
est partitionné.
AVIS : Ne modifiez la façon dont votre disque dur est partitionné que si vous êtes sûr de ce que vous faites.
Pour plus d'informations sur l'utilitaire de réparation, reportez-vous à la section « Réparation de Dell
MediaDirect ».
1 bouton Dell MediaDirect
148 Utilisation de CD, de DVD et d'autres supports multimédias
CD Reinstallation (Réinstallation)
Utilisez le CD Reinstallation pour réinstaller Dell MediaDirect lorsque vous souhaitez remplacer votre
disque dur existant par un nouveau lecteur à l'aide de ce kit. Pour plus d'informations, reportez-vous à la
section « Réinstallation du logiciel Dell MediaDirect ».
Réparation de Dell MediaDirect
REMARQUE : Reportez-vous à la section « CD Repair Utility (Utilitaire de réparation) » pour savoir si vous devez
plutôt réparer Dell MediaDirect au lieu de le réinstaller. Si vous utilisez le CD Repair Utility alors que vous devriez
réinstaller Dell MediaDirect, il se peut que le processus ne se termine pas correctement.
REMARQUE : L'utilitaire de réparation peut être enregistré sur le CD Drivers and Utilities plutôt que sur le CD
Repair Utility, ou bien il peut être téléchargé.
Pour réparer Dell MediaDirect sur votre disque dur :
1 Insérez le CD Repair Utility (ou le CD Drivers and Utilities, le cas échéant) dans le lecteur optique et
redémarrez votre ordinateur.
2 Appuyez sur la touche dès l'apparition du logo Dell pour entrer dans le menu d'amorçage.
3 Appuyez sur la flèche vers le bas pour mettre en surbrillance le premier CD de la liste.
4 Appuyez sur pour démarrer à partir du CD.
REMARQUE : Si vous utilisez le CD Drivers and Utilities, tapez après avoir démarré à partir du CD.
5 À l'invite, tapez la commande cd \MD2 et appuyez sur .
6 Saisissez Repair (réparer) et appuyez sur .
L'utilitaire de réparation de Dell MediaDirect s'ouvre. Pour lancer l'utilitaire pour réparer Dell
MediaDirect :
1 Utilisez les touches de direction pour sélectionner OK et appuyez sur .
2 Lorsque le message Terminé apparaît, retirez le CD du lecteur et appuyez sur le bouton
d'alimentation pour éteindre l'ordinateur.
Vous pouvez maintenant utiliser le bouton Dell MediaDirect de votre ordinateur pour lancer Dell
MediaDirect.
Réinstallation de Dell MediaDirect
REMARQUE : Reportez-vous à la section « CD Reinstallation (Réinstallation) » pour savoir si vous devez plutôt
réinstaller Dell MediaDirect au lieu de le réparer. Si vous utilisez le CD Reinstallation alors que vous devriez réparer
Dell MediaDirect, il se peut que le processus ne se termine pas correctement.
Pour pouvoir réinstaller le logiciel Dell MediaDirect, vous devez préparer votre disque dur. Après avoir
remplacé le disque, suivez les instructions décrites à la section « Préparation du disque dur pour la
réinstallation de Dell MediaDirect » lorsque vous installez le système d'exploitation Windows XP.
Une fois votre disque dur prêt, vous pouvez réinstaller les pilotes matériels et les logiciels (consultez les
Guides de réinstallation de Dell à l'adresse support.dell.com). Ensuite, suivez les instructions décrites à
la section « Réinstallation du logiciel Dell MediaDirect ».Utilisation de CD, de DVD et d'autres supports multimédias 49
Préparation du disque dur pour la réinstallation de Dell MediaDirect
Lorsque vous installez le système d'exploitation Windows XP, vous devez partitionner le disque dur et
réserver 1308 Mo d'espace non partitionné pour Dell MediaDirect.
REMARQUE : Vous pouvez créer trois partitions maximum, en plus de l'espace non partitionné réservé à Dell
MediaDirect.
Pour créer une partition sur votre disque dur :
1 Appuyez sur la touche pour accepter le contrat de licence lors de l'installation de Windows XP.
2 Sur la fenêtre de configuration des partitions, utilisez les touches de direction pour sélectionner
l'espace non partitionné.
3 Tapez C pour créer une nouvelle partition à l'aide de l'espace non partitionné.
REMARQUE : Pour créer suffisamment d'espace sur votre disque dur pour la partition de Dell MediaDirect, vous
devez calculer la taille de la partition en méga-octets (Mo), en soustrayant 1308 à la quantité d'espace disponible
en Mo sur le disque dur.
4 Entrez la taille désirée en Mo pour la nouvelle partition et appuyez sur .
5 Utilisez les touches de direction pour sélectionner la partition créée et appuyez sur .
6 Sélectionnez Formater la partition en utilisant le système de fichiers NTFS (Rapide) et appuyez sur
.
7 Consultez le guide d'installation de Windows XP pour terminer l'installation de Windows XP. Lorsque
toutes les étapes de l'installation de Windows XP sont passées et que le bureau apparaît, vous pouvez
réinstaller le logiciel Dell MediaDirect.
Réinstallation du logiciel Dell MediaDirect
REMARQUE : Reportez-vous à la section « CD Reinstallation (Réinstallation) » pour savoir si vous devez plutôt
réinstaller Dell MediaDirect au lieu de le réparer.Si vous utilisez le CD Reinstallation alors que vous devriez réparer
Dell MediaDirect, il se peut que le processus ne se termine pas correctement.
REMARQUE : Suivez les instructions décrites à la section « Préparation du disque dur pour la réinstallation de
Dell MediaDirect » avant de réinstaller le logiciel Dell MediaDirect. Si vous ne le faites pas, vous recevrez un
message d'erreur lors de la réinstallation du logiciel. Si vous recevez un message d'erreur, réinstallez Windows XP
ou procurez-vous un utilitaire qui vous permettra de partitionner un disque dur à partition unique avec un système
d'exploitation déjà installé dessus.
Pour réinstaller le logiciel Dell MediaDirect :
1 Insérez le CD Reinstallation dans le lecteur optique.
La fenêtre Dell MediaDirect™ s'ouvre.
2 Appuyez sur pour réinstaller Dell MediaDirect.
Un message indiquant la fin du processus de réinstallation apparaît.
3 Retirez le CD Reinstallation du lecteur optique et appuyez sur pour fermer la fenêtre de
réinstallation.
4 Arrêtez l'ordinateur à l'aide du menu Démarrer.
5 Utilisez le bouton Dell MediaDirect de votre ordinateur pour lancer Dell MediaDirect et terminer le
processus de réinstallation.50 Utilisation de CD, de DVD et d'autres supports multimédias
Connexion de votre ordinateur à un périphérique téléviseur ou
audio
REMARQUE : Votre ordinateur n'est pas livré avec tous les câbles audio et vidéo nécessaires pour le relier à un
téléviseur ou à un autre périphérique audio. Il est possible d'acheter des câbles et des câbles d'adaptateur
TV/audio numérique auprès de Dell.
Votre ordinateur est doté d'un connecteur de sortie TV S-vidéo qui vous permet de raccorder l'ordinateur
à un téléviseur par un câble S-vidéo standard, un câble d'adaptateur vidéo composite ou un câble
d'adaptateur vidéo composante (disponible auprès de Dell).
1 connecteur de sortie TV S-vidéo 2 connecteur S-vidéo
1 connecteur de sortie TV S-vidéo 2 adaptateur vidéo composite 3 connecteur audio numérique
S/PDIF
4 connecteur de sortie vidéo composite 5 connecteur S-vidéo
1 connecteur de sortie TV S-vidéo 2 adaptateur vidéo composante 3 connecteur audio numérique
S/PDIF
4 connecteur de sortie vidéo
composante Pr (rouge)
5 connecteur de sortie vidéo
composante Pb (bleu)
6 connecteur de sortie vidéo
composante Y (vert)
1 2
5
4
3
1 2
5
4
3
1 2
6Utilisation de CD, de DVD et d'autres supports multimédias 51
Votre téléviseur est doté d'un connecteur d'entrée S-vidéo, d'un connecteur d'entrée vidéo composite ou
d'un connecteur d'entrée vidéo composante. En fonction du type de connecteur disponible sur votre
téléviseur, vous pouvez utiliser un câble S-vidéo, vidéo composite ou vidéo composante disponible dans
le commerce pour relier l'ordinateur au téléviseur.
Il est recommandé de connecter les câbles vidéo et audio à l'ordinateur selon l'une des combinaisons
suivantes.
REMARQUE : Reportez-vous aux schémas situés au début de chaque sous-section pour déterminer la méthode
de connexion la plus appropriée.
• S-vidéo et audio standard
• Vidéo composante et audio standard
• Audio standard et sortie vidéo composante
Lorsque vous avez terminé de connecter les câbles vidéo et audio entre l'ordinateur et le téléviseur, vous
devez activer votre ordinateur pour qu'il fonctionne avec le téléviseur. Reportez-vous à la section
« Activation des paramètres d'écran d'un téléviseur » à la page 63 pour vérifier que l'ordinateur reconnaît
le téléviseur et fonctionne correctement avec celui-ci. En outre, si vous utilisez l'audio numérique
S/PDIF, reportez-vous à la section « Activation de l'audio numérique S/PDIF » à la page 62.
S-vidéo et audio standard
1 connecteur audio 2 connecteur de sortie TV S-vidéo
1
252 Utilisation de CD, de DVD et d'autres supports multimédias
1 Éteignez l'ordinateur et le téléviseur et/ou le périphérique audio que vous souhaitez connecter.
REMARQUE : Vous pouvez brancher un câble S-vidéo directement sur le connecteur de sortie TV S-vidéo situé
sur l'ordinateur (sans passer par le câble d'adaptateur audio numérique/TV) si votre téléviseur ou périphérique
audio prend en charge la technologie S-vidéo mais pas l'audio numérique S/PDIF.
2 Branchez une extrémité du câble S-vidéo dans le connecteur de sortie S-vidéo de l'ordinateur.
3 Reliez l'autre extrémité du câble S-vidéo au connecteur d'entrée S-vidéo.
4 Branchez l'extrémité à un seul connecteur du câble audio dans la prise casque de l'ordinateur.
5 Branchez les deux connecteurs RCA situés à l'autre extrémité du câble audio dans les connecteurs
d'entrée audio situés sur le téléviseur ou sur un autre périphérique audio.
6 Allumez le téléviseur et tous les périphériques audio connectés (le cas échéant), puis l'ordinateur.
7 Reportez-vous à la section « Activation des paramètres d'écran d'un téléviseur » à la page 63 pour
vérifier que l'ordinateur reconnaît le téléviseur et fonctionne correctement avec celui-ci.
1 câble S-vidéo standard 2 câble audio standard
1
2Utilisation de CD, de DVD et d'autres supports multimédias 53
S-vidéo et audio numérique S/PDIF
1 Éteignez l'ordinateur et le téléviseur et/ou le périphérique audio que vous souhaitez connecter.
2 Connectez l'adaptateur vidéo composite au connecteur de sortie TV S-vidéo situé sur l'ordinateur.
1 connecteur de sortie TV S-vidéo 2 adaptateur vidéo composite
1 adaptateur vidéo composite 2 câble S-vidéo 3 câble audio numérique S/PDIF
1 2
1
2
354 Utilisation de CD, de DVD et d'autres supports multimédias
3 Branchez une extrémité du câble S-vidéo dans le connecteur de sortie S-vidéo de l'adaptateur vidéo
composite.
4 Reliez l'autre extrémité du câble S-vidéo au connecteur d'entrée S-vidéo situé sur le téléviseur.
5 Reliez une extrémité du câble audio numérique S/PDIF au connecteur audio numérique sur le câble
d'adaptateur vidéo composite.
6 Branchez l'autre extrémité du câble audio numérique S/PDIF sur le connecteur d'entrée audio situé
sur le téléviseur ou le périphérique audio.
7 Allumez le téléviseur et tous les périphériques audio connectés (le cas échéant), puis l'ordinateur.
8 Reportez-vous à la section « Activation des paramètres d'écran d'un téléviseur » à la page 63 pour
vérifier que l'ordinateur reconnaît le téléviseur et fonctionne correctement avec celui-ci.
1 adaptateur vidéo composite 2 câble S-vidéo
1 adaptateur vidéo composite 2 câble audio numérique S/PDIF
1 2
1 2Utilisation de CD, de DVD et d'autres supports multimédias 55
Vidéo composite et audio standard
1 Éteignez l'ordinateur et le téléviseur et/ou le périphérique audio que vous souhaitez connecter.
2 Connectez l'adaptateur vidéo composite au connecteur de sortie TV S-vidéo situé sur l'ordinateur.
3 Branchez une extrémité du câble vidéo composite sur le connecteur de sortie vidéo composite situé sur
l'adaptateur vidéo composite.
1 connecteur d'entrée audio 2 connecteur de sortie TV S-vidéo 3 adaptateur vidéo composite
1 adaptateur vidéo composite 2 câble vidéo composite 3 câble audio standard
2
1
3
1
2
356 Utilisation de CD, de DVD et d'autres supports multimédias
4 Reliez l'autre extrémité du câble vidéo composite au connecteur d'entrée vidéo composite du
téléviseur.
5 Branchez l'extrémité à un seul connecteur du câble audio dans la prise casque de l'ordinateur.
6 Branchez les deux connecteurs RCA situés à l'autre extrémité du câble audio dans les connecteurs
d'entrée audio situés sur le téléviseur ou sur un autre périphérique audio.
7 Allumez le téléviseur et tous les périphériques audio connectés (le cas échéant), puis l'ordinateur.
8 Reportez-vous à la section « Activation des paramètres d'écran d'un téléviseur » à la page 63 pour
vérifier que l'ordinateur reconnaît le téléviseur et fonctionne correctement avec celui-ci.
Vidéo composite et audio numérique S/PDIF
1 adaptateur vidéo composite 2 câble vidéo composite
1 connecteur de sortie TV S-vidéo 2 adaptateur vidéo composite
2
1
1 2Utilisation de CD, de DVD et d'autres supports multimédias 57
1 Éteignez l'ordinateur et le téléviseur et/ou le périphérique audio que vous souhaitez connecter.
2 Connectez l'adaptateur vidéo composite au connecteur de sortie TV S-vidéo situé sur l'ordinateur.
3 Branchez une extrémité du câble vidéo composite dans le connecteur d'entrée vidéo composite situé
sur l'adaptateur vidéo composite.
4 Reliez l'autre extrémité du câble vidéo composite au connecteur d'entrée vidéo composite du
téléviseur.
5 Reliez une extrémité du câble audio numérique S/PDIF au connecteur audio S/PDIF sur l'adaptateur
vidéo composite.
1 adaptateur vidéo composite 2 câble vidéo composite 3 câble audio standard
1 adaptateur vidéo composite 2 câble vidéo composite
1 adaptateur vidéo composite 2 câble audio numérique S/PDIF
1
2
3
2
1
1 258 Utilisation de CD, de DVD et d'autres supports multimédias
6 Branchez l'autre extrémité du câble audio numérique sur le connecteur d'entrée S/PDIF situé sur le
téléviseur ou l'autre périphérique audio.
7 Allumez le téléviseur et tous les périphériques audio connectés (le cas échéant), puis l'ordinateur.
8 Reportez-vous à la section « Activation des paramètres d'écran d'un téléviseur » à la page 63 pour
vérifier que l'ordinateur reconnaît le téléviseur et fonctionne correctement avec celui-ci.
Vidéo composante et audio standard
1 connecteur de sortie TV S-vidéo 2 adaptateur vidéo composante
1 adaptateur vidéo composante 2 câble vidéo composante 3 câble audio standard
1 2
1
2
3Utilisation de CD, de DVD et d'autres supports multimédias 59
1 Éteignez l'ordinateur et le téléviseur et/ou le périphérique audio que vous souhaitez connecter.
2 Connectez l'adaptateur vidéo composante au connecteur de sortie TV S-vidéo situé sur l'ordinateur.
3 Branchez les trois extrémités du câble vidéo composante sur les connecteurs de sortie vidéo
composante situés sur l'adaptateur vidéo composante. Veillez à ce que les couleurs rouge, verte et bleu
du câble correspondent aux ports d'adaptateur appropriés.
4 Branchez les trois connecteurs de l'autre extrémité du câble vidéo composante sur les connecteurs
d'entrée vidéo composante situés sur le téléviseur. Veillez à ce que les couleurs rouge, verte et bleu du
câble correspondent aux connecteurs d'entrée du téléviseur.
5 Branchez l'extrémité à un seul connecteur du câble audio dans la prise casque de l'ordinateur.
6 Branchez les deux connecteurs RCA situés à l'autre extrémité du câble audio dans les connecteurs
d'entrée audio situés sur le téléviseur ou le périphérique audio.
7 Allumez le téléviseur et tous les périphériques audio connectés (le cas échéant), puis l'ordinateur.
8 Reportez-vous à la section « Activation des paramètres d'écran d'un téléviseur » à la page 63 pour
vérifier que l'ordinateur reconnaît le téléviseur et fonctionne correctement avec celui-ci.
1 adaptateur vidéo composante 2 câble vidéo composante
1 260 Utilisation de CD, de DVD et d'autres supports multimédias
Vidéo composante et audio numérique S/PDIF
1 connecteur de sortie TV S-vidéo 2 adaptateur vidéo composante
1 adaptateur vidéo composante 2 câble vidéo composante 3 câble audio standard
1 2
1
2
3Utilisation de CD, de DVD et d'autres supports multimédias 61
1 Éteignez l'ordinateur et le téléviseur et/ou le périphérique audio que vous souhaitez connecter.
2 Connectez l'adaptateur vidéo composante au connecteur de sortie TV S-vidéo situé sur l'ordinateur.
3 Branchez les trois extrémités du câble vidéo composante sur les connecteurs de sortie vidéo
composante situés sur l'adaptateur vidéo composante. Veillez à ce que les couleurs rouge, verte et bleu
du câble correspondent aux ports d'adaptateur appropriés.
4 Branchez les trois connecteurs de l'autre extrémité du câble vidéo composante sur les connecteurs
d'entrée vidéo composante situés sur le téléviseur. Veillez à ce que les couleurs rouge, verte et bleu du
câble correspondent aux connecteurs d'entrée du téléviseur.
5 Reliez une extrémité du câble audio numérique S/PDIF au connecteur audio S/PDIF situé sur
l'adaptateur vidéo composante.
6 Branchez l'autre extrémité du câble audio numérique sur le connecteur d'entrée S/PDIF situé sur le
téléviseur ou l'autre périphérique audio.
7 Allumez le téléviseur et tous les périphériques audio connectés (le cas échéant), puis l'ordinateur.
8 Reportez-vous à la section « Activation des paramètres d'écran d'un téléviseur » à la page 63 pour
vérifier que l'ordinateur reconnaît le téléviseur et fonctionne correctement avec celui-ci.
1 adaptateur vidéo composante 2 connecteurs de sortie vidéo
composante
3 câble vidéo composante
1 adaptateur vidéo composante 2 câble audio numérique S/PDIF
1 3
2
2
162 Utilisation de CD, de DVD et d'autres supports multimédias
Activation de l'audio numérique S/PDIF
REMARQUE : Votre logiciel de DVD peut se présenter différemment. Reportez-vous aux instructions fournies avec
votre logiciel de DVD.
Si votre ordinateur dispose d'un lecteur de DVD, vous pouvez activer le son numérique pour la lecture
des DVD.
1 Cliquez sur Démarrer, pointez sur Tousles programmes, puis sélectionnez l'application de DVD.
2 Insérez un DVD dans le lecteur de DVD.
Si la lecture du DVD démarre, cliquez sur le bouton d'arrêt.
3 Cliquez sur l'option Paramètres.
4 Cliquez sur l'option DVD.
5 Cliquez sur l'icône DVD Audio Setting (Paramétrage audio du DVD).
6 Cliquez sur les flèches en regard du paramètre Configuration des haut-parleurs pour faire défiler les
options et sélectionner l'option SPDIF.
7 Cliquez une première fois sur le bouton Précédent, puis une seconde fois pour revenir à l'écran du
menu principal.
Activation de S/PDIF dans le pilote audio Windows
1 Double-cliquez sur l'icône représentant un haut-parleur dans la zone de notification de Windows.
2 Cliquez sur le menu Options, puis sur Contrôles avancés.
3 Cliquez sur Avancé.
4 Cliquez sur Interface S/PDIF.
5 Cliquez sur Fermer.
6 Cliquer sur OK.
Configuration de la lecture de DVD via le casque
Si votre ordinateur dispose d'un lecteur de DVD, vous pouvez activer le son numérique pour la lecture
des DVD.
REMARQUE : Votre logiciel de DVD peut se présenter différemment. Reportez-vous aux instructions fournies avec
votre logiciel de DVD.
1 Cliquez sur Démarrer, pointez sur Tous les programmes, puis sélectionnez le programme de DVD.
2 Insérez un DVD dans le lecteur de DVD.
Si la lecture du DVD démarre, cliquez sur le bouton d'arrêt.
3 Cliquez sur l'option Paramètres.
4 Cliquez sur l'option DVD.
5 Cliquez sur l'icône DVD Audio Setting (Paramétrage audio du DVD).
6 Cliquez sur les flèches en regard du paramètre Configuration des haut-parleurs pour faire défiler les
options et sélectionner l'option Casque.Utilisation de CD, de DVD et d'autres supports multimédias 63
7 Cliquez sur les flèches en regard du paramètre Audio listening mode (Mode d'écoute audio) pour faire
défiler les options et sélectionner l'option CL Headphone (Casque CL).
8 Cliquez sur les flèches en regard de l'option Dynamic range compression (Compression de la plage
dynamique) pour sélectionner l'option la plus adaptée.
9 Cliquez une première fois sur le bouton Précédent, puis une seconde fois pour revenir à l'écran du
menu principal.
Activation des paramètres d'écran d'un téléviseur
Contrôleur vidéo
REMARQUE : Pour vous assurer que les options d'affichage apparaissent correctement, connectez le téléviseur à
votre ordinateur avant d'activer les paramètres d'affichage.
1 Cliquez sur le bouton Démarrer, pointez sur Paramètres, puis cliquez sur Panneau de configuration.
2 Double-cliquez sur Affichage, puis cliquez sur l'onglet Paramètres.
3 Cliquez sur Avancé.
4 Cliquez sur l'onglet de votre carte vidéo.
REMARQUE : Pour déterminer le type de carte vidéo installée sur votre ordinateur, consultez le Centre d'aide et de
support de Windows. Pour accéder au Centre d'aide et de support, cliquez sur Démarrer→Aide et support. Sous
Choisissez une tâche, cliquez sur Utiliser les outils pour afficher des informations sur votre ordinateur et
diagnostiquer les problèmes. Sous Informations sur le poste de travail, sélectionnez Matériel.
5 Dans la section des périphériques d'affichage, sélectionnez l'option appropriée en fonction de
l'utilisation d'un affichage simple ou multiple tout en vous assurant que les paramètres d'affichage sont
corrects pour votre sélection.64 Utilisation de CD, de DVD et d'autres supports multimédiasUtilisation de cartes ExpressCard 65
Utilisation de cartes ExpressCard
Types de carte ExpressCard
Pour plus d'informations sur les cartes ExpressCard prises en charge, reportez-vous à la section
« Caractéristiques » à la page 157.
REMARQUE : Une carte ExpressCard n'est pas un périphérique amorçable.
Caches pour carte ExpressCard
Votre ordinateur est livré avec un cache en plastique dans le logement de carte ExpressCard. Les
caches protègent les logements non utilisés contre la poussière et les particules en suspens.
Conservez le cache pour l'utiliser lorsqu'il n'y a pas de carte installée dans le logement. Les caches
provenant d'autres ordinateurs ne sont pas adaptés à votre ordinateur. Pour retirer le cache, reportezvous à la section « Retrait d'une carte ExpressCard ou d'un cache » à la page 67.
Installation d'une carte ExpressCard
Vous pouvez installer une carte ExpressCard pendant que l'ordinateur fonctionne. Celui-ci détecte
automatiquement la carte.
Les cartes ExpressCard sont généralement marquées d'un symbole (un triangle ou une flèche, par
exemple) ou portent une étiquette pour indiquer l'extrémité à insérer dans le logement. Les cartes
sont conçues pour éviter une mauvaise insertion. Si l'orientation de la carte n'est pas claire, consultez
la documentation livrée avec la carte.
REMARQUE : Le logement de carte ExpressCard ne prend PAS en charge les cartes PC. Reportez-vous à
l'illustration ci-dessous pour déterminer quelles sont les cartes prises en charge.66 Utilisation de cartes ExpressCard
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
Pour installer une ExpressCard :
1 Tenez la carte face vers le haut. Le loquet devra peut-être être en position ouverte avant l'insertion de
la carte.
2 Faites glisser la carte dans le logement jusqu'à ce qu'elle soit complètement engagée dans le
connecteur.
Si vous sentez une trop grande résistance, ne forcez pas. Vérifiez l'orientation de la carte, puis faites
une nouvelle tentative.
1 types de carte pris en charge (cartes Express) 2 type de carte non pris en charge (PCMCIA)
1 2Utilisation de cartes ExpressCard 67
L'ordinateur reconnaît la plupart des cartes ExpressCard et charge automatiquement le pilote de
périphérique approprié. Si le programme de configuration vous demande de charger les pilotes du
fabricant, utilisez la disquette ou le CD accompagnant la carte ExpressCard.
Retrait d'une carte ExpressCard ou d'un cache
AVIS : Utilisez l'utilitaire de configuration de carte ExpressCard (cliquez sur l'icône de la barre des tâches)
pour sélectionner et désactiver une carte avant de la retirer de l'ordinateur. Si vous ne désactivez pas la carte à
l'aide de l'utilitaire de configuration, vous risquez de perdre des données.
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
Appuyez sur le loquet et retirez la carte ou le cache. Vous devrez appuyer à deux reprises sur certains
loquets : une fois pour faire ressortir le loquet et une deuxième fois pour faire sortir la carte.
Conservez le cache afin de l'utiliser à chaque fois qu'un logement d'ExpressCard est vide. Les caches
protègent les logements non utilisés contre la poussière et les particules en suspens.
1 carte ExpressCard
168 Utilisation de cartes ExpressCard
Types de carte mémoire multimédia
Le lecteur de carte mémoire multimédia 5 en 1 constitue un moyen pratique et rapide de visualiser et de
partager des photos numériques, de la musique et des vidéos stockées sur une carte mémoire.
REMARQUE : Une carte mémoire multimédia n'est pas un périphérique amorçable.
Le lecteur de carte mémoire multimédia 5 en 1 lit les cartes mémoire multimédia suivantes :
• Carte Secure Digital (SD)/SDIO
• MultiMediaCard (MMC)
• Memory Stick
• Memory Stick PRO
• Carte xD-Picture
Caches de carte mémoire multimédia
Votre ordinateur est livré avec un cache en plastique installé dans le logement de la carte mémoire
multimédia 5 en 1. Les caches protègent les logements non utilisés contre la poussière et les particules en
suspens. Conservez le cache pour l'utiliser lorsqu'il n'y a pas de carte installée dans le logement. Les
caches provenant d'autres ordinateurs ne sont pas adaptés à votre ordinateur.
Pour retirer le cache, reportez-vous à la section « Retrait d'une carte ExpressCard ou d'un cache » à la
page 67.
1 bouton d'éjection 2 carte ExpressCard
1
2Utilisation de cartes ExpressCard 69
Installation d'une carte mémoire multimédia
Vous pouvez installer une carte mémoire multimédia dans l'ordinateur alors qu'il fonctionne. Celui-ci
détecte automatiquement la carte.
Les cartes mémoire multimédia sont généralement marquées d'un symbole (un triangle ou une flèche,
par exemple) ou d'une étiquette pour indiquer l'extrémité à insérer dans le logement. Les cartes sont
conçues pour éviter une mauvaise insertion. Si l'orientation de la carte n'est pas claire, consultez la
documentation livrée avec la carte.
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
Pour installer une carte mémoire multimédia :
1 Tenez la carte face vers le haut.
2 Faites glisser la carte dans le logement jusqu'à ce qu'elle soit complètement engagée dans le
connecteur.
Si vous sentez une trop grande résistance, ne forcez pas. Vérifiez l'orientation de la carte, puis faites
une nouvelle tentative.
L'ordinateur reconnaît la carte mémoire multimédia et charge automatiquement le pilote de
périphérique adapté. Si le programme de configuration vous indique de charger les pilotes du fabricant,
utilisez le CD accompagnant la carte mémoire multimédia, le cas échéant.
1 logement de carte mémoire multimédia 5 en 1 2 carte mémoire multimédia
1
270 Utilisation de cartes ExpressCard
Retrait d'une carte mémoire multimédia ou d'un cache
AVIS : Utilisez l'utilitaire de configuration de carte mémoire multimédia (cliquez sur l'icône de la barre des
tâches) pour sélectionner et désactiver une carte avant de la retirer de l'ordinateur. Si vous ne désactivez pas la
carte à l'aide de l'utilitaire de configuration, vous risquez de perdre des données.
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
Appuyez sur la carte pour libérer et retirer la carte ou le cache.
Conservez le cache pour l'utiliser lorsque aucune carte mémoire multimédia n'est installée dans le
logement. Les caches protègent les logements non utilisés contre la poussière et les particules en suspens. Configuration d'un réseau 71
Configuration d'un réseau
Connexion physique à un réseau ou à un modem large bande
Pour connecter l'ordinateur à un réseau sans fil, une carte réseau doit être installée et un câble de
réseau connecté à l'ordinateur.
Pour connecter un câble de réseau :
1 Branchez le câble de réseau au connecteur de la carte réseau, situé sur le côté droit de votre
ordinateur.
REMARQUE : Insérez le connecteur du câble jusqu'à ce qu'il s'enclenche et tirez doucement sur le câble
pour vous assurer qu'il est correctement fixé.
2 Connectez l'autre extrémité du câble de réseau à un périphérique de connexion réseau ou à une
prise murale de réseau.
REMARQUE : Ne connectez pas de câble de réseau à une prise téléphonique murale.
Assistant Configuration réseau
L'Assistant Configuration réseau du système d'exploitation Microsoft® Windows® XP vous guide
dans la procédure de partage des fichiers, des imprimantes ou d'une connexion Internet entre
ordinateurs présents au sein d'un réseau domestique ou d'une petite entreprise.
1 Cliquez sur le bouton Démarrer, pointez sur Programmes→ Accessoires→ Communications, puis
cliquez sur Assistant Configuration réseau.
2 Dans l'écran d'accueil, cliquez sur Suivant.72 Configuration d'un réseau
3 Cliquez sur Liste de vérification pour la création d'un réseau.
REMARQUE : Sélectionner la méthode de connexion Cet ordinateur se connecte directement à l'Internet active le
pare-feu intégré fourni avec le Service Pack 2 (SP2) de Windows XP.
4 Exécutez la liste de vérification.
5 Revenez à l'Assistant Configuration réseau et suivez les instructions qui s'affichent.
Réseau local sans fil (WLAN)
Un WLAN est une série d'ordinateurs interconnectés qui communiquent entre eux par ondes aériennes
plutôt que par le biais d'un câble réseau relié à chaque ordinateur. Dans un WLAN, un périphérique de
radiocommunications appelé point d'accès ou routeur sans fil connecte des ordinateurs réseau et offre un
accès réseau. Le point d'accès ou le routeur sans fil et la carte réseau sans fil située dans l'ordinateur
communiquent en diffusant des données par ondes hertziennes depuis leurs antennes.
Éléments requis pour établir une connexion WLAN
Pour configurer un WLAN, vous avez besoin des éléments suivants :
• L'accès Internet haut débit (large bande) (comme un câble ou une connexion DSL)
• Un modem large bande qui est connecté et en état de marche
• Un routeur sans fil ou un point d'accès
• Une carte réseau sans fil par ordinateur à connecter au WLAN
• Un câble de réseau avec le connecteur (RJ-45) réseau
Contrôle de votre carte réseau sans fil
En fonction de votre sélection lors de l'achat de votre ordinateur, celui-ci a diverses configurations. Pour
confirmer que votre ordinateur est équipé d'une carte réseau sans fil et pour connaître le type de cette
carte, utilisez l'une des méthodes suivantes :
• Bouton Démarrer et option Connexions
• La confirmation de votre commande
Bouton Démarrer et option Connexions
1 Cliquez sur le bouton Démarrer.
2 Pointez sur Connexions, puis cliquez sur Afficher toutes les connexions.
Si Connexion réseau sans fil n'apparaît pas sous Réseau local ou Internet à haute vitesse, il est possible
que vous n'ayez pas de carte réseau sans fil.Configuration d'un réseau 73
Si Connexion réseau sans fil apparaît, vous disposez d'une carte réseau sans fil. Pour afficher des
informations détaillées sur la carte réseau sans fil :
1 Cliquez avec le bouton droit de la souris sur Connexion réseau sans fil.
2 Cliquez sur Propriétés. La fenêtre Propriétés de la connexion réseau sans fil apparaît. Le nom et le
numéro de modèle de la carte réseau sans fil sont répertoriés dans l'onglet Général.
REMARQUE : Si votre ordinateur est configuré sur l'option de menu Démarrer classique, vous pouvez afficher les
connexions réseau en cliquant sur le bouton Démarrer, en pointant sur Paramètres et en sélectionnant Connexions
réseau. Si Connexion réseau sans fil n'apparaît pas, il est possible que vous n'ayez pas de carte réseau sans fil.
Confirmation de commande
La confirmation de commande que vous avez reçue à la commande de votre ordinateur énumère le
matériel et les logiciels fournis avec celui-ci.
Configuration d'un nouveau WLAN
Connexion d'un routeur sans fil et d'un modem large bande
1 Contactez votre fournisseur d'accès Internet (FAI) pour obtenir des informations précises sur les
exigences relatives à la connexion de votre modem large bande.
2 Assurez-vous d'avoir un accès Internet câblé par le biais de votre modem large bande avant d'essayer de
configurer une connexion Internet sans fil. Reportez-vous à la section « Connexion physique à un
réseau ou à un modem large bande » à la page 71.
3 Installez les logiciels requis pour votre routeur sans fil. Un CD d'installation peut vous avoir été fourni
avec votre routeur sans fil. Ce type de CD contient généralement des informations sur l'installation et
le dépannage. Installez le logiciel requis conformément aux instructions du fabricant.
4 Arrêtez votre ordinateur et tout autre ordinateur fonctionnant sans fil à proximité par le biais du menu
Démarrer.
5 Débranchez le câble d'alimentation de votre modem large bande de la prise secteur.
6 Débranchez le câble réseau de l'ordinateur et du modem.
REMARQUE : Patientez au moins 5 minutes, une fois votre modem large bande déconnecté avant de continuer de
configurer le réseau.
7 Débranchez le câble d'adaptateur CA de votre routeur sans fil, afin d'avoir l'assurance que le routeur
n'est plus alimenté.
8 Branchez un câble réseau sur le connecteur réseau (RJ-45) du modem large bande non alimenté.
9 Connectez l'autre extrémité du câble sur le connecteur réseau (RJ-45) Internet du routeur sans fil non
alimenté.
10 Veillez à ce qu'aucun autre câble réseau ou USB (hormis le câble réseau reliant le modem et le routeur
sans fil) n'est relié au modem large bande.
REMARQUE : Redémarrez les périphériques sans fil dans l'ordre décrit ci-dessous pour empêcher toute
défaillance de connexion potentielle.74 Configuration d'un réseau
11 Mettez uniquement le modem large bande sous tension et attendez au moins 2 minutes qu'il se
stabilise. Au bout de 2 minutes, passez à l'étape 12.
12 Mettez le routeur sans fil sous tension et attendez au moins 2 minutes qu'il se stabilise. Au bout de
2 minutes, passez à l'étape 13.
13 Démarrez l'ordinateur et attendez que la procédure d'amorçage soit terminée.
14 Consultez la documentation accompagnant le routeur sans fil pour exécuter les actions suivantes et
configurer le routeur sans fil :
• Établissez la communication entre votre ordinateur et votre routeur sans fil.
• Configurez votre routeur sans fil pour communiquer avec votre routeur large bande.
• Recherchez le nom de diffusion du routeur sans fil. Il est également fait référence à ce nom sous
les termes techniques Identifiant d'ensemble de service (SSID) ou nom du réseau.
15 Au besoin, configurez votre carte réseau sans fil pour la connecter au réseau sans fil. Reportez-vous à la
section « Connexion à un réseau local sans fil » à la page 74.
Connexion à un réseau local sans fil
REMARQUE : Avant de vous connecter à un WLAN, vérifiez que vous avez observé les instructions figurant dans
la section « Réseau local sans fil (WLAN) » à la page 72.
REMARQUE : Les instructions de mise en réseau suivantes ne s'appliquent pas aux cartes internes dotées de la
technologie sans fil Bluetooth® ni aux réseaux large bande mobile.
Cette section présente des procédures générales concernant la connexion via une technologie sans fil.
Les noms spécifiques du réseau et les détails de configuration sont variables. Reportez-vous à la section
« Réseau local sans fil (WLAN) » à la page 72 pour plus d'informations sur la manière de préparer la
connexion d'un ordinateur à un réseau WLAN.
Votre carte réseau sans fil nécessite un logiciel et des pilotes spécifiques pour la connexion à un réseau.
Le logiciel est déjà installé.
REMARQUE : S'il a été supprimé ou endommagé, suivez les instructions fournies dans la documentation
utilisateur de votre carte réseau sans fil. Vérifiez le type de carte réseau sans fil installée sur votre ordinateur, puis
recherchez son nom sur le site Web de support de Dell à l'adresse suivante : support.dell.com. Pour plus
d'informations sur le type de carte réseau sans fil installée sur votre ordinateur, reportez-vous à la section
« Contrôle de votre carte réseau sans fil » à la page 72.
Détermination du Gestionnaire de périphérique réseau sans fil
En fonction du logiciel installé sur votre ordinateur, différents utilitaires de configuration sans fil peuvent
gérer vos périphériques réseau :
• L'utilitaire de configuration de votre carte réseau sans fil
• Le système d'exploitation de Windows XPConfiguration d'un réseau 75
Pour déterminer l'utilitaire de configuration sans fil qui gère votre carte réseau sans fil :
1 Cliquez sur le bouton Démarrer, pointez sur Paramètres, puis cliquez sur Panneau de configuration.
2 Double-cliquez sur Connexions réseau.
3 Cliquez avec le bouton droit de la souris sur l'icône Connexion réseau sans fil, puis cliquez sur
Afficher les réseaux sans fil disponibles.
Si la fenêtre Choisir un réseau sans fil indique Windows ne peut pas configurer cette connexion,
l'utilisation de configuration de la carte réseau sans fil gère la carte réseau sans fil.
Si la fenêtre Choisir un réseau sans fil indique Cliquer sur un élément de la liste ci-dessous pour se
connecter à un réseau sans fil dans la zone ou obtenir plus d'informations, le système d'exploitation
Windows XP gère la carte réseau sans fil.
Pour des informations spécifiques sur l'utilitaire de configuration sans fil installé sur votre ordinateur,
reportez-vous à votre document de réseau sans fil dans le Centre d'aide et de support Windows.
Pour accéder au Centre d'aide et de support :
1 Cliquez sur le bouton Démarrer, puis sur Aide et support.
2 Sous Choisir une rubrique d'aide, cliquez sur Guides d'utilisation du système de Dell.
3 Sous Guides des périphériques, sélectionnez la documentation de votre carte réseau sans fil.
Fin de la connexion au réseau WLAN
Lorsque vous mettez votre ordinateur sous tension et qu'un réseau est détecté dans la zone pour laquelle
votre ordinateur n'est pas configuré, un message contextuel apparaît à côté de l'icône communications
sans fil de la barre d'état système (située dans le coin inférieur droit du bureau Windows).
Suivez les instructions données dans toute invite d'utilitaire apparaissant à l'écran.
Lorsque l'ordinateur est configuré pour le réseau sans fil que vous avez sélectionné, un autre message
contextuel indique que l'ordinateur est connecté au réseau.
Lorsque vous vous connectez ultérieurement à votre ordinateur dans la zone du réseau sans fil que vous
avez sélectionné, le même message contextuel vous indique qu'une connexion au réseau sans fil est
établie.
REMARQUE : Si vous sélectionnez un réseau sécurisé, vous devez saisir une clé WEP ou WPA à l'invite. Les
paramètres de sécurité du réseau sont uniques à votre réseau. Dell ne peut pas vous fournir ces informations.
REMARQUE : La connexion au réseau peut prendre 1 minute.
Activation/désactivation de la carte réseau sans fil
REMARQUE : Si vous ne parvenez pas à vous connecter à un réseau sans fil, vérifiez que vous disposez de tous
les éléments pour créer un réseau WLAN (reportez-vous à la section « Éléments requis pour établir une connexion
WLAN » à la page 72), puis vérifiez que votre carte réseau sans fil est bien activée en appuyant sur .
Vous pouvez activer/désactiver la fonction de mise en réseau sans fil de votre ordinateur en appuyant sur
la combinaison de touches . Si la fonction de mise en réseau sans fil est activée, appuyez sur
pour la désactiver. Si la fonction de mise en réseau sans fil est désactivée, appuyez sur
pour l'activer.76 Configuration d'un réseau
Surveillance de l'état des connexions réseau sans fil via Dell™ QuickSet
Le voyant d'activité sans fil permet de facilement surveiller l'état des périphériques sans fil de votre
ordinateur. Cliquez avec le bouton droit de la souris sur l'icône Dell QuickSet de la barre des tâches pour
sélectionner ou désélectionner Indicateur d'activité sans fil pour activer ou désactiver cet indicateur.
Le voyant d'activité sans fil indique si les périphériques sans fil de votre ordinateur sont activés ou
désactivés. Lorsque vous activez ou désactivez la fonction de mise en réseau sans fil, l'indicateur
d'activité sans fil change pour afficher l'état en cours.
Pour plus d'informations sur l'indicateur d'activité sans fil, consultez le fichier d'aide sur Dell QuickSet.
Pour obtenir des informations sur QuickSet et savoir comment accéder au fichier d'aide sur Dell
QuickSet, reportez-vous à la section « Fonctions Dell™ QuickSet » à la page 133.
Réseau étendu large bande mobile ou sans fil (WWAN)
De même qu'un WLAN, un réseau large bande mobile (ou WWAN) regroupe des ordinateurs
interconnectés qui communiquent entre eux par le biais d'une technologie sans fil. Cependant, un
réseau large bande mobile utilise la technologie cellulaire. Par conséquent, l'accès Internet est disponible
dans les mêmes régions que le service cellulaire. Votre ordinateur peut conserver une connexion réseau
large bande mobile indépendamment de sa localisation physique tant que l'ordinateur reste dans une
zone couverte par votre prestataire de service cellulaire.
Éléments requis pour établir une connexion avec un réseau large bande mobile
REMARQUE : Selon votre ordinateur, vous pouvez vous connecter à un réseau large bande mobile au moyen
d'une carte ExpressCard ou Mini large bande mobile mais pas les deux.
Pour configurer une connexion réseau large bande mobile, vous devez disposer des éléments suivants :
• Une carte ExpressCard ou Mini large bande mobile (selon la configuration de votre ordinateur)
Pour des instructions sur l'utilisation des cartes ExpressCard, reportez-vous à la section « Utilisation de
cartes ExpressCard » à la page 65.
• L'utilitaire Dell Mobile Broadband Card Utility (préinstallé sur votre ordinateur si vous achetez la carte
en même temps que l'ordinateur ou disponible sur le CD accompagnant la carte achetée séparément).
Si l'utilitaire est corrompu ou supprimé de votre ordinateur, reportez-vous au guide d'utilisation de
l'utilitaire Dell Mobile Broadband Card Utility pour obtenir des instructions. Le guide d'utilisation est
accessible via le Centre d'aide et de support de Windows (ou le CD accompagnant la carte achetée
séparément). Pour accéder au Centre d'aide et de support, reportez-vous à la section « Centre d'aide et
de support de Windows » à la page 14.Configuration d'un réseau 77
Connexion à un réseau large bande mobile
REMARQUE : Ces instructions ne s'appliquent qu'aux cartes ExpressCard ou Mini large bande mobile. Elles ne
s'appliquent pas aux cartes internes dotées de la technologie sans fil Bluetooth® ni aux cartes Mini WLAN.
REMARQUE : Avant de vous connecter à Internet, vous devez activer le service large bande mobile auprès de
votre fournisseur de services cellulaires. Pour des instructions et d'autres informations sur l'utilisation de
l'utilitaire Dell Mobile Broadband Card Utility, reportez-vous au guide de l'utilisateur disponible dans le Centre
d'aide et de support de Windows. Pour accéder au Centre d'aide et de support, reportez-vous à la section « Centre
d'aide et de support de Windows » à la page 14. Le guide d'utilisation est également disponible sur le site Web de
support de Dell à l'adresse support.dell.com et sur le CD fourni avec votre carte large bande mobile si vous avez
acheté la carte séparément de l'ordinateur.
À l'aide de l'utilitaire Dell Mobile Broadband Card Utility, créez et gérez une connexion réseau large
bande mobile à Internet :
1 Cliquez sur l'icône de l'utilitaire Dell Mobile Broadband Card Utility, , dans la barre des tâches
de Windows pour exécuter l'utilitaire.
2 Cliquez sur Connecter.
REMARQUE : Le bouton Connecter se transforme en bouton Déconnecter.
3 Suivez les instructions à l'écran pour gérer la connexion réseau à l'aide de cet utilitaire.
Réseau Bluetooth
Configuration de votre connexion Bluetooth
Les systèmes, équipés de la technologie Bluetooth, afficheront l'icône Bluetooth dans la barre d'état
système. Si vous disposez de la technologie Bluetooth, double-cliquez sur l'icône Bluetooth. Selon le
logiciel Bluetooth installé sur votre ordinateur, vous pouvez être amené à effectuer plusieurs opérations
pour terminer la configuration. Le logiciel Bluetooth vous guidera dans la procédure. Cette procédure
prendra environ 5 minutes. Une fois la procédure effectuée, votre système peut établir et utiliser des
connexions Bluetooth. Si, après avoir double-cliqué sur l'icône Bluetooth, le logiciel Bluetooth ne vous
invite pas à effectuer une série d'opérations, votre système Bluetooth est déjà complètement configuré et
prêt à être utilisé.
Connexion à un réseau Bluetooth
Les systèmes, équipés d'une carte interne Bluetooth, peuvent se connecter à d'autres périphériques
Bluetooth, tels que des claviers et des souris, des casques stéréo, des appareils photos, des assistants
numériques personnels (PDA) et des imprimantes. Il suffit d'effectuer quelques opérations, qui restent
simples, pour établir une connexion au périphérique. Ces opérations varient selon le logiciel Bluetooth
installé sur votre ordinateur. Pour des informations détaillées sur l'établissement de connexions
Bluetooth, ouvrez votre logiciel Bluetooth en double-cliquant sur l'icône Bluetooth dans la barre d'état
système. Sélectionnez Aide dans le menu principal pour une description détaillée de l'utilisation de votre
carte de mise en réseau interne.78 Configuration d'un réseauSécurisation de votre ordinateur 79
Sécurisation de votre ordinateur
Verrou du câble de sécurité
REMARQUE : Votre ordinateur n'est pas livré avec un verrou de câble de sécurité.
Un verrou de câble de sécurité est un dispositif antivol disponible dans le commerce. Pour utiliser le
verrou, fixez-le à l'emplacement pour câble de sécurité de votre ordinateur Dell™. Pour plus
d'informations, reportez-vous aux instructions fournies avec le dispositif.
AVIS : Avant d'acheter un dispositif antivol, vérifiez qu'il est compatible avec l'emplacement pour câble de
sécurité de votre ordinateur.
Mots de passe
Les mots de passe évitent tout accès non autorisé à votre ordinateur. Dès que vous démarrez votre
ordinateur, vous devez affecter un mot de passe principal à l'invite. Si aucun mot de passe n'est entré
dans les deux minutes qui suivent, l'ordinateur revient à l'état de fonctionnement précédent.
En cas d'utilisation de mots de passe, respectez les consignes suivantes :
• Choisissez un mot de passe dont vous vous souviendrez mais qui ne soit pas facile à deviner. Par
exemple, n'utilisez pas les noms des membres de votre famille ni les noms de vos animaux
familiers dans vos mots de passe.
• Évitez de noter votre mot de passe sur un papier. Si vous notez vos mots de passe sur un papier,
assurez-vous qu'il sont stockés dans un lieu sûr.80 Sécurisation de votre ordinateur
• Ne partagez pas votre mot de passe avec quelqu'un.
• Assurez-vous que personne ne vous regarde lorsque vous saisissez votre mot de passe.
AVIS : Les mots de passe affectent un haut niveau de sécurité aux données de votre ordinateur ou de votre disque
dur. Cependant, votre système n'est pas à l'abri de personnes mal intentionnées. Si vous souhaitez un plus haut
niveau de sécurité, utilisez d'autres formes de protection, comme les cartes à puce, les programmes de cryptage
de données ou les cartes PC (ou Mini) dotées de fonctions de cryptage.
Pour ajouter ou modifier des mots de passe, allez dans Panneau de configuration, puis Comptes
d'utilisateurs.
Si vous avez oublié l'un de vos mots de passe, contactez Dell (reportez-vous à la section « Contacter
Dell » à la page 137). Pour votre protection, l'équipe du support technique de Dell vous demandera de
prouver votre identité pour que seules les personnes autorisées puissent utiliser votre ordinateur.
Logiciel de suivi informatique
Un logiciel de suivi informatique peut vous permettre de localiser votre ordinateur s'il est perdu ou volé.
Le logiciel est disponible en option et peut être acquis lors de l'achat de votre ordinateur Dell™. Vous
pouvez également contacter votre commercial Dell pour plus d'informations sur cette fonction de
sécurité.
REMARQUE : Il se peut que le logiciel de suivi ne soit pas disponible dans tous les pays.
REMARQUE : Si vous disposez de ce logiciel, vous devez contacter l'entreprise en charge du service de suivi pour
signaler la disparition de votre ordinateur en cas de perte ou de vol de ce dernier.
En cas de perte ou de vol de votre ordinateur
• Appelez les autorités compétentes pour signaler la perte ou le vol. Incluez le numéro de service dans
votre description de l'ordinateur. Demandez à ce qu'un numéro soit affecté à cette affaire et relevez ce
numéro avec le nom, l'adresse et le numéro de téléphone du bureau de police. Si possible, obtenez le
nom de l'agent chargé de l'affaire.
REMARQUE : Si vous savez où a eu lieu le vol ou la perte de l'ordinateur, contactez les autorités compétentes de
la région. Si vous ne connaissez pas cet endroit, appelez un bureau de police de votre lieu de résidence.
• Si l'ordinateur appartient à une société, avertissez le bureau de sécurité de la société.
• Contactez le service clientèle de Dell pour signaler la perte de l'ordinateur. Fournissez le numéro de
service de l'ordinateur, le numéro de dossier et le nom, l'adresse et le numéro de téléphone du bureau
de police auquel vous avez signalé le vol. Si possible, donnez le nom de l'agent chargé de l'affaire.
Le représentant du service clientèle de Dell enregistrera votre rapport sous le numéro de service de
l'ordinateur et enregistrera l'ordinateur comme manquant ou volé. Si quelqu'un appelle Dell pour obtenir
de l'assistance technique et donne votre numéro de service, l'ordinateur sera automatiquement identifié
comme le vôtre. Le représentant essaiera d'obtenir le numéro de téléphone et l'adresse de son
correspondant. Dell contactera ensuite les autorités compétentes auxquelles vous avez signalé la perte de
votre ordinateur.Dépannage 81
Dépannage
Service Dell Technical Update
Le service Dell Technical Update fournit une notification proactive par courrier électronique des
mises à jour matérielles et logicielles pour votre ordinateur. Ce service est gratuit. En outre, vous
pouvez personnaliser son contenu, son format et la fréquence à laquelle vous recevez des
notifications.
Pour vous abonner au service Dell Technical Update, visitez le site Web suivant :
support.dell.com/technicalupdate.
Dell Diagnostics
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les
consignes de sécurité du Guide d'information sur le produit.
Quand utiliser Dell Diagnostics
Si des problèmes surviennent lors de l'utilisation de votre ordinateur, effectuez les vérifications
indiquées dans la section « Blocages et problèmes logiciels » à la page 94 et exécutez Dell
Diagnostics avant de contacter Dell pour obtenir une assistance technique.
AVIS : Dell Diagnostics ne fonctionne qu'avec les ordinateurs Dell.
REMARQUE : Le CD Drivers and Utilities est en option et n'est pas obligatoirement expédié avec votre
ordinateur.
Démarrez Dell Diagnostics à partir de votre disque dur ou du CD Drivers and Utilities (également
appelé ResourceCD).
Démarrage de Dell Diagnostics à partir du disque dur
Dell Diagnostics se trouve dans une partition cachée (utilitaire de diagnostics) de votre disque dur.
REMARQUE : Si aucune image ne s'affiche, contactez Dell. Reportez-vous à la section « Contacter Dell » à la
page 137.
1 Éteignez l'ordinateur.
2 Connectez l'ordinateur à une prise secteur.82 Dépannage
3 Il existe deux manières de lancer Diagnostics :
a Allumez l'ordinateur. Lorsque le logo DELL™ apparaît, appuyez immédiatement sur .
Sélectionnez Diagnostics à partir du menu de démarrage et appuyez sur .
REMARQUE : Si vous attendez trop longtemps et que le logo du système d'exploitation apparaît, patientez
jusqu'à ce que le bureau de Microsoft® Windows® s'affiche. Éteignez alors votre ordinateur et faites une
nouvelle tentative.
b Appuyez sur la touche et maintenez-la enfoncée lors de la mise sous tension du système.
REMARQUE : Si un message indique qu'aucune partition de diagnostic n'a été trouvée, exécutez Dell
Diagnostics à partir du CD Drivers and Utilities.
L'ordinateur lance l'évaluation du système de préamorçage avec une série de diagnostics intégrés qui
effectue un test préalable de la carte système, du clavier, du disque dur et de l'écran.
• Répondez à toutes les questions qui s'affichent pendant l'évaluation.
• Si une défaillance de composant est détectée, l'ordinateur s'arrête et émet un signal sonore. Pour
arrêter l'évaluation et redémarrer l'ordinateur, appuyez sur ; pour passer au test suivant,
appuyez sur ; pour retester le composant défectueux, appuyez sur .
• Si des défaillances sont détectées lors de l'évaluation de préamorçage du système, notez les codes
d'erreur et contactez Dell.
Si l'évaluation de préamorçage du système se déroule sans problème, vous recevez le message
Booting Dell Diagnostic Utility Partition. Press any key to continue
(Amorçage de la partition de l'utilitaire Dell Diagnostics. Appuyez sur une touche pour continuer).
4 Appuyez sur une touche pour démarrer Dell Diagnostics à partir de la partition de diagnostics du
disque dur.
Démarrage de Dell Diagnostics à partir du CD Drivers and Utilities
1 Insérez le CD Drivers and Utilities.
2 Arrêtez, puis redémarrez l'ordinateur.
Lorsque le logo DELL apparaît, appuyez immédiatement sur .
Si vous attendez trop longtemps et que le logo Windows apparaît, attendez encore jusqu'à ce que le
bureau Windows s'affiche. Éteignez alors votre ordinateur et faites une nouvelle tentative.
REMARQUE : Les étapes suivantes modifient la séquence d'amorçage pour une seule exécution. Au
démarrage suivant, l'ordinateur démarre en fonction des périphériques définis dans le programme de
configuration du système.
3 Lorsque la liste des périphériques d'amorçage s'affiche, sélectionnez Lecteur de CD/DVD/CD-RW et
appuyez sur .
4 Sélectionnez l'option Boot from CD-ROM (Amorcer à partir du CD-ROM) dans le menu qui
s'affiche, puis appuyez sur .
5 Tapez 1 pour démarrer le menu du CD ResourceCD, puis appuyez sur pour continuer.
6 Sélectionnez Run Dell 32-bit Diagnostics (Exécuter Dell Diagnostics 32 bits) dans la liste numérotée.
Si plusieurs versions sont répertoriées, sélectionnez la version appropriée à votre ordinateur.
7 Lorsque le menu principal de Dell Diagnostics s'affiche, sélectionnez le test à effectuer.Dépannage 83
Menu principal de Dell Diagnostics
1 Une fois Dell Diagnostics chargé et lorsque l'écran du menu principal s'affiche, cliquez sur le bouton
de l'option que vous souhaitez.
2 Si un problème survient pendant un test, un message indiquant le code d'erreur et une description du
problème s'affiche. Notez le code d'erreur et la description du problème et suivez les instructions à
l'écran.
Si vous ne pouvez pas résoudre le problème, contactez Dell.
REMARQUE : Le numéro de service de votre ordinateur est situé en haut de chaque écran de test. Lorsque
vous contacterez le support technique de Dell, ce numéro de service vous sera demandé.
3 Si vous exécutez un test à partir de l'option Test personnalisé ou Arborescence des symptômes, cliquez
sur l'onglet approprié décrit dans le tableau suivant pour obtenir plus d'informations.
Option Fonction
Express Test (Test
rapide)
Exécute un test rapide des périphériques. Ce test dure
généralement entre 10 et 20 minutes et n'exige pas d'action de
votre part. Effectuez tout d'abord un Test rapide pour trouver le
problème plus rapidement.
Extended Test (Test
approfondi)
Exécute un test approfondi des périphériques. En règle générale,
ce test prend une heure ou plus et nécessite que vous répondiez
régulièrement à des questions.
Custom Test (Test
personnalisé)
Teste un périphérique spécifique. Vous pouvez personnaliser les
tests à exécuter.
Symptom Tree
(Arborescence des
symptômes)
Répertorie les symptômes couramment rencontrés et permet de
sélectionner un test en fonction du symptôme du problème.
Onglet Fonction
Results (Résultats) Affiche les résultats du test et les conditions d'erreur rencontrées.
Errors (Erreurs) Affiche les conditions d'erreur rencontrées, les codes d'erreur et la
description du problème.
Help (Aide) Décrit le test et peut indiquer les conditions requises pour exécuter
le test.
Configuration
(Configuration)
Affiche la configuration matérielle du périphérique sélectionné.
Dell Diagnostics obtient les informations de configuration de tous
les périphériques à partir du programme de configuration du
système, de la mémoire et de divers tests internes, et les affiche dans
la liste des périphériques située dans le volet gauche de l'écran. La
liste des périphériques risque de ne pas afficher les noms de tous les
composants installés sur votre ordinateur ou de tous les
périphériques reliés à celui-ci.
Parameters (Paramètres) Vous permet de personnaliser le test en modifiant ses paramètres.84 Dépannage
4 Une fois les tests effectués, si vous exécutez Dell Diagnostics à partir du CD Drivers and Utilities,
retirez le CD.
5 Une fois les tests terminés, fermez l'écran de test pour revenir à l'écran de menu principal. Pour quitter
Dell Diagnostics et redémarrer l'ordinateur, fermez l'écran de menu principal.
Utilitaire de support de Dell
L'utilitaire de support de Dell est installé sur votre ordinateur et accessible en cliquant sur l'icône de
support de Dell dans la barre des tâches ou à partir du bouton Démarrer. Cet utilitaire vous permet
d'exécuter les actions suivantes : obtenir des informations de support automatique, effectuer des mises à
jour et des balayages de votre environnement informatique pour en vérifier l'état.
Accès à l'utilitaire de support de Dell
Accédez à l'utilitaire de support de Dell à partir de l'icône de support de Dell dans la barre des tâches ou
à partir du menu Démarrer.
Si l'icône de support de Dell n'apparaît pas dans la barre des tâches, procédez comme suit :
1 Cliquez sur le bouton Démarrer, puis pointez sur Tous les programmes.
2 Cliquez sur Support de Dell, puis pointez sur Paramètres du support de Dell.
3 Assurez-vous que l'option Afficher l'icône dans la barre des tâches est sélectionnée.
REMARQUE : Si l'utilitaire de support de Dell n'est pas disponible depuis le menu Démarrer, accédez au site
support.dell.com et téléchargez le logiciel.
L'utilitaire de support de Dell est personnalisé pour votre environnement informatique.
L'icône de support de Dell figurant dans la barre des tâches offre un fonctionnement différent lorsque
vous cliquez, double-cliquez ou cliquez dessus avec le bouton droit.
Clic sur l'icône de support de Dell
Cliquez ou cliquez avec le bouton droit de la souris sur l'icône pour exécuter les tâches suivantes :
• Vérifier votre environnement informatique
• Afficher les paramètres de l'utilitaire de support de Dell
• Accéder au fichier d'aide de l'utilitaire de support de Dell
• Afficher les questions les plus fréquemment posées
• En savoir plus sur l'utilitaire de support de Dell
• Désactiver l'utilitaire de support de Dell
Double-clic sur l'icône de support de Dell
Double-cliquez sur l'icône pour contrôler manuellement votre environnement informatique,
afficher les questions fréquemment posées, accéder aux fichiers d'aide de l'utilitaire de support de Dell et
afficher les paramètres de support de Dell.
Pour plus d'informations sur l'utilitaire de support de Dell, cliquez sur le point d'interrogation (?)situé
en haut de l'écran Dell Support (Support de Dell).Dépannage 85
Problèmes de lecteur
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
VÉRIFIEZ QUE MICROSOFT® WINDOWS® RECONNAÎT L E LECTEUR — Cliquez sur le bouton Démarrer, puis
sur Poste de travail. Si le lecteur de disquette, de CD ou de DVD ne figure pas dans la liste, effectuez un
balayage complet avec votre logiciel antivirus à la recherche de virus pour les supprimer. Les virus
empêchent parfois Windows de reconnaître le lecteur.
TESTEZ L E LECTEUR —
• Insérez une autre disquette, un autre CD ou un autre DVD pour éliminer la possibilité que le premier
support soit défectueux.
• Insérez une disquette d'amorçage et redémarrez l'ordinateur.
NETTOYEZ L E LECTEUR O U L E DISQUE — Reportez-vous à la section « Nettoyage de votre ordinateur » à la
page 167.
ASSUREZ-VOUS QUE L E CD EST CORRECTEMENT POSITIONNÉ SUR L'AXE
VÉRIFIEZ LES CONNEXIONS DES CÂBLES
VÉRIFIEZ LES INCOMPATIBILITÉS MATÉRIELLES — Reportez-vous à la section « Résolution des
incompatibilités logicielles et matérielles » à la page 104.
EXÉCUTEZ DELL DIAGNOSTICS — Reportez-vous à la section « Dell Diagnostics » à la page 81.
Problèmes de lecteur de CD et de DVD
REMARQUE : Il peut arriver que le lecteur de CD ou de DVD haute vitesse vibre et produise du bruit. Cela ne
signifie en aucun cas que le lecteur ou le CD/DVD est défectueux.
REMARQUE : En raison des différentes régions du monde entier et des différents formats de disque, certains
titres DVD ne fonctionnent pas dans certains lecteurs DVD.
Problèmes d'écriture sur un lecteur de CD/DVD-RW
FERMEZ TOUS LES PROGRAMMES — Le lecteur de CD/DVD-RW doit recevoir un flux régulier de données
lors de l'écriture. Si ce flux est interrompu, une erreur se produit. Fermez tous les programmes avant de
lancer l'écriture sur le CD/DVD-RW.
DÉSACTIVEZ L E MODE VEILLE DANS WINDOWS AVANT D E LANCER L'ÉCRITURE SUR UN CD/DVD-RW —
Reportez-vous à la section « Modes d'économie d'énergie » à la page 40 pour des informations
supplémentaires sur le mode Veille.
RÉDUISEZ LA VITESSE D E GRAVURE — Consultez les fichiers d'aide de votre logiciel de création de CD ou
de DVD.
Si vous ne parvenez pas à éjecter le plateau du lecteur de CD, de CD-RW, de DVD ou de DVD+RW
1 Vérifiez que l'ordinateur est éteint.
2 Redressez un trombone et insérez l'une de ses extrémités dans le trou d'éjection situé à l'avant du
lecteur ; poussez ensuite fermement jusqu'à ce que le plateau soit partiellement éjecté.
3 Retirez le plateau avec précaution jusqu'à ce qu'il s'arrête.86 Dépannage
Si vous entendez un bruit grinçant ou un raclement inhabituel
• Assurez-vous que ce son n'est pas émis par un programme en cours d'exécution.
• Assurez-vous que le disque est correctement inséré.
Problèmes liés au disque dur
LAISSEZ L'ORDINATEUR REFROIDIR AVANT D E L'ALLUMER — Un disque dur trop chaud peut empêcher le
fonctionnement du système d'exploitation. Laissez l'ordinateur s'acclimater à la température ambiante
avant de l'allumer.
LANCEZ LA COMMANDE CHECK DISK (VÉRIFIER DISQUE) —
1 Cliquez sur le bouton Démarrer, puis sur Poste de travail.
2 Avec le bouton droit, cliquez sur Disque local C:.
3 Cliquez sur Propriétés.
4 Cliquez sur l'onglet Outils.
5 Sous Détection d'erreurs, cliquez sur Vérifier maintenant.
6 Cliquez sur Rechercher et tenter une récupération des secteurs défectueux.
7 Cliquez sur Démarrer.
Problèmes liés à la messagerie électronique, au modem ou à
Internet
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
REMARQUE : Connectez le modem uniquement à une prise téléphonique analogique. Le modem ne fonctionne
pas s'il est connecté à un réseau téléphonique numérique.
VÉRIFIEZ LES PARAMÈTRES D E SÉCURITÉ D E MICROSOFT OUTLOOK® EXPRESS — Si vous n'arrivez pas à
ouvrir les pièces jointes à vos messages électroniques :
1 Dans Outlook Express, cliquez sur Outils, sur Options, puis sur Sécurité.
2 Cliquez sur Interdire les pièces jointes pour supprimer la coche.
VÉRIFIEZ L A CONNEXION D E L A LIGNE TÉLÉPHONIQUE
VÉRIFIEZ L A PRISE TÉLÉPHONIQUE
CONNECTEZ L E MODEM DIRECTEMENT À LA PRISE TÉLÉPHONIQUE MURALE
UTILISEZ UNE LIGNE TÉLÉPHONIQUE DIFFÉRENTE
• Assurez-vous que la ligne téléphonique est connectée à la prise jack du modem. (La prise jack
comporte une étiquette verte ou bien une icône en forme de connecteur apparaît à côté de cette prise.)
• Insérez le connecteur de ligne téléphonique dans le modem jusqu'à ce que vous entendiez un déclic.
• Déconnectez la ligne téléphonique du modem et connectez-la à un téléphone. Attendez la tonalité.
• Si d'autres appareils téléphoniques partagent cette ligne, par exemple un répondeur téléphonique, un
télécopieur, un parasurtenseur ou un séparateur de ligne, contournez-les et connectez le modem
directement à la prise jack téléphonique murale. Si vous utilisez une ligne qui mesure au moins 3 m
(10 pieds), essayez une ligne plus courte.Dépannage 87
EXÉCUTEZ LES DIAGNOSTICS ASSISTANT D U MODEM — Cliquez sur le bouton Démarrer, pointez sur Tous
les programmes, puis cliquez sur Assistant du modem. Suivez les instructions qui s'affichent à l'écran
pour identifier et résoudre les problèmes de modem. (L'Assistant du modem n'est pas disponible sur
certains ordinateurs.)
VÉRIFIEZ QUE L E MODEM COMMUNIQUE AVEC WINDOWS —
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Cliquez sur Imprimantes et autres périphériques.
3 Cliquez sur Options de modem et de téléphonie.
4 Cliquez sur l'onglet Modems.
5 Cliquez sur le port COM de votre modem.
6 Cliquez sur Propriétés, sur l'onglet Diagnostics, puis sur Interroger le modem pour vérifier que le
modem communique avec Windows.
Si toutes les commandes reçoivent des réponses, le modem fonctionne correctement.
VÉRIFIEZ QUE VOUS ÊTES CONNECTÉ À INTERNET — Assurez-vous que vous êtes bien abonné auprès d'un
fournisseur d'accès Internet. Une fois le programme de messagerie électronique Outlook Express ouvert,
cliquez sur Fichier. Si la case Travailler hors connexion est cochée, décochez-la, puis connectez-vous à
Internet. Pour obtenir de l'aide, contactez votre fournisseur d'accès Internet.
ANALYSEZ L'ORDINATEUR À L A RECHERCHE D E LOGICIELS ESPIONS — Si vous observez un ralentissement des
performances de votre ordinateur, si des fenêtres publicitaires s'affichent fréquemment sur votre écran ou
si vous avez des problèmes pour vous connecter sur Internet, votre ordinateur est peut-être infecté par un
logiciel espion. Utilisez un programme antivirus qui inclut une protection contre les logiciels espions
(une mise à niveau de votre programme sera peut-être nécessaire) afin d'analyser votre ordinateur et de
supprimer les logiciels espions. Pour plus d'informations, allez sur le site support.dell.com et lancez une
recherche à l'aide du mot-clé spyware (espion).
Messages d'erreur
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
Si le message n'est pas répertorié, consultez la documentation du système d'exploitation ou du
programme qui s'exécutait lorsque le message s'est affiché.
AUXILIARY DEVICE FAILURE (ÉCHEC D'UN PÉRIPHÉRIQUE AUXILIAIRE) — La tablette tactile, la manette ou la
souris externe présente peut-être une défaillance. Dans le cas d'une souris externe, vérifiez la connexion
du câble. Activez l'option Dispositif de pointage dans le programme de configuration du système. Si le
problème persiste, contactez Dell. Reportez-vous à la section « Contacter Dell » à la page 137.
BA D COMMAND O R FILE NAME (COMMANDE O U NOM D E FICHIER INCORRECT) — Vérifiez que vous avez bien
orthographié la commande, mis des espaces à bon escient et utilisé le chemin d'accès correct.
CACHE DISABLED DUE T O FAILURE (CACHE DÉSACTIVÉ EN RAISON D'UNE PANNE) — Le cache interne
principal du microprocesseur présente un dysfonctionnement. Contactez Dell. Reportez-vous à la
section « Contacter Dell » à la page 137.
CD DRIVE CONTROLLER FAILURE (ÉCHEC D U CONTRÔLEUR D U LECTEUR D E CD) — Le lecteur de CD ne répond
pas aux commandes de l'ordinateur. Reportez-vous à la section « Problèmes de lecteur » à la page 85.88 Dépannage
DATA ERROR (ERREUR D E DONNÉES) — Le disque dur ne peut pas lire les données. Reportez-vous à la
section « Problèmes de lecteur » à la page 85.
DECREASING AVAILABLE MEMORY (MÉMOIRE DISPONIBLE RÉDUITE) — Un ou plusieurs modules de mémoire
peuvent être défaillants ou mal fixés. Réinstallez les modules de mémoire et remplacez-les au besoin.
Reportez-vous à la section « Lecteurs optiques » à la page 116.
DISK C: FAILED INITIALIZATION (ÉCHEC D E L'INITIALISATION D U DISQUE C:) — L'initialisation du disque dur
a échoué. Exécutez le groupe de tests des unités de disque dur dans Dell Diagnostics. Reportez-vous à la
section « Dell Diagnostics » à la page 81.
DRIVE NOT READY (LE LECTEUR N'EST PAS PRÊT) — Le fonctionnement requiert la présence d'un disque
dur dans la baie pour pouvoir continuer. Installez une unité de disque dur dans la baie d'unité de disque
dur. Reportez-vous à la section « Disque dur » à la page 113.
ERROR READING PCMCIA CARD (ERREUR LORS D E LA LECTURE D E LA CARTE PCMCIA) — L'ordinateur ne
peut pas identifier la carte ExpressCard. Remettez la carte en place ou essayez une autre carte. Reportezvous à la section « Utilisation de cartes ExpressCard » à la page 65.
EXTENDED MEMORY SIZE HAS CHANGED (LA TAILLE D E LA MÉMOIRE ÉTENDUE A CHANGÉ) — La quantité de
mémoire enregistrée dans la mémoire vive rémanente (NVRAM) ne correspond pas à la mémoire
installée sur l'ordinateur. Redémarrez l'ordinateur. Si l'erreur apparaît de nouveau, contactez Dell.
Reportez-vous à la section « Contacter Dell » à la page 137.
TH E FILE BEING COPIED I S TOO LARGE FOR THE DESTINATION DRIVE (LE FICHIER EN COURS D E COPIE EST TROP
VOLUMINEUX POUR L E LECTEUR D E DESTINATION) — Le fichier que vous essayez de copier est trop
volumineux pour le disque ou le disque est plein. Essayez de copier le fichier sur un autre disque ou
utilisez un disque de capacité plus élevée.
A FILENAME CANNOT CONTAIN ANY O F THE FOLLOWING CHARACTERS: (UN NOM D E FICHIER N E PEUT CONTENIR
AUCUN DES CARACTÈRES SUIVANTS :) \ / : * ? " < > | — N'utilisez pas ces caractères lorsque vous
nommez un fichier.
GATE A20 FAILURE (ÉCHEC D E L A PORTE A20) — Un module de mémoire est peut-être mal fixé.
Réinstallez les modules de mémoire et remplacez-les au besoin. Reportez-vous à la section « Lecteurs
optiques » à la page 116.
GENERAL FAILURE (ERREUR GÉNÉRALE) — Le système d'exploitation ne peut pas exécuter la commande.
Ce message est généralement suivi d'informations spécifiques—par exemple, Printer out of
paper (L'imprimante manque de papier). Effectuez l'action corrective appropriée.
HARD-DISK DRIVE CONFIGURATION ERROR (ERREUR D E CONFIGURATION D E L'UNITÉ D E DISQUE DUR) —
L'ordinateur ne peut pas identifier le type d'unité. Éteignez l'ordinateur, retirez le disque dur (reportezvous à la section « Disque dur » à la page 113) et amorcez l'ordinateur depuis un CD. Éteignez ensuite
l'ordinateur, réinstallez l'unité de disque dur et redémarrez. Exécutez les tests Hard-Disk Drive (Lecteur
de disque dur) de Dell Diagnostics (reportez-vous à la section « Dell Diagnostics » à la page 81).
HARD-DISK DRIVE CONTROLLER FAILURE 0 (ÉCHEC D U CONTRÔLEUR D E DISQUE DUR 0) — L'unité de disque
dur ne répond pas aux commandes de l'ordinateur. Éteignez l'ordinateur, retirez le disque dur (reportezvous à la section « Disque dur » à la page 113) et amorcez l'ordinateur depuis un CD. Éteignez ensuite
l'ordinateur, réinstallez l'unité de disque dur et redémarrez. Si le problème persiste, faites une tentative
avec une autre unité. Exécutez les tests Hard-Disk Drive (Lecteur de disque dur) de Dell Diagnostics
(reportez-vous à la section « Dell Diagnostics » à la page 81).Dépannage 89
HARD-DISK DRIVE FAILURE (ÉCHEC D E L'UNITÉ D E DISQUE DUR) — L'unité de disque dur ne répond pas aux
commandes de l'ordinateur. Éteignez l'ordinateur, retirez le disque dur (reportez-vous à la section
« Disque dur » à la page 113) et amorcez l'ordinateur depuis un CD. Éteignez ensuite l'ordinateur,
réinstallez l'unité de disque dur et redémarrez. Si le problème persiste, faites une tentative avec une autre
unité. Exécutez les tests Hard-Disk Drive (Lecteur de disque dur) de Dell Diagnostics (reportez-vous à la
section « Dell Diagnostics » à la page 81).
HARD-DISK DRIVE READ FAILURE (ÉCHEC D E LECTURE D E L'UNITÉ D E DISQUE DUR) — L'unité de disque dur
est peut-être défectueuse. Éteignez l'ordinateur, retirez le disque dur (reportez-vous à la section « Disque
dur » à la page 113) et amorcez l'ordinateur à partir d'un CD. Éteignez ensuite l'ordinateur, réinstallez
l'unité de disque dur et redémarrez. Si le problème persiste, faites une tentative avec une autre unité.
Exécutez les tests Hard-Disk Drive (Lecteur de disque dur) de Dell Diagnostics (reportez-vous à la
section « Dell Diagnostics » à la page 81).
INSERT BOOTABLE MEDIA (INTRODUISEZ UN SUPPORT AMORÇABLE) — Le système d'exploitation tente de
s'amorcer sur un CD non amorçable. Introduisez un CD amorçable.
INVALID CONFIGURATION INFORMATION-PLEASE RUN SYSTEM SETUP PROGRAM (INFORMATIONS D E
CONFIGURATION NON VALIDES, EXÉCUTEZ L E PROGRAMME D E CONFIGURATION D U SYSTÈME) — Les
informations de configuration du système ne correspondent pas à la configuration matérielle. C'est après
l'installation d'un module de mémoire que ce message est le plus susceptible d'apparaître. Corrigez les
options appropriées dans le programme de configuration du système (reportez-vous à la section
« Utilisation du programme de configuration du système » à la page 165).
KEYBOARD CLOCK LINE FAILURE (ÉCHEC D E LA LIGNE D E L'HORLOGE CLAVIER) — Pour les claviers externes,
vérifiez la connexion du câble. Exécutez le test Keyboard Controller(Contrôleur du clavier) de Dell
Diagnostics (reportez-vous à la section « Dell Diagnostics » à la page 81).
KEYBOARD CONTROLLER FAILURE (ÉCHEC D U CONTRÔLEUR D U CLAVIER) — Pour les claviers externes, vérifiez
la connexion du câble. Redémarrez l'ordinateur et évitez de toucher le clavier ou la souris durant la
procédure d'amorçage. Exécutez le test Keyboard Controller (Contrôleur du clavier) de Dell Diagnostics
(reportez-vous à la section « Dell Diagnostics » à la page 81).
KEYBOARD DATA LINE FAILURE (ÉCHEC D E LA LIGNE D E DONNÉES D U CLAVIER) — Pour les claviers externes,
vérifiez la connexion du câble. Exécutez le test Keyboard Controller (Contrôleur du clavier) de Dell
Diagnostics (reportez-vous à la section « Dell Diagnostics » à la page 81).
KEYBOARD STUCK KEY FAILURE (TOUCHE D U CLAVIER BLOQUÉE) — Pour les pavés numériques et les claviers
externes, vérifiez la connexion du câble. Redémarrez l'ordinateur et évitez de toucher le clavier ou les
touches durant la procédure d'amorçage. Exécutez le test Stuck Key (Touche du clavier bloquée) de Dell
Diagnostics (reportez-vous à la section « Dell Diagnostics » à la page 81).
LICENSED CONTENT I S NOT ACCESSIBLE IN MEDIADIRECT (LE CONTENU SOUS LICENCE N'EST PAS ACCESSIBLE
DANS MEDIADIRECT) — Dell MediaDirect ne peut pas vérifier les restrictions Digital Rights Management
(DRM - Gestion des droits numériques) sur le fichier, le fichier ne peut par conséquent pas être lu.
Reportez-vous à la section « Problèmes Dell MediaDirect » à la page 95.
MEMORY ADDRESS LINE FAILURE A T ADDRESS, READ VALUE EXPECTING VALUE (ÉCHEC D E LA LIGNE D'ADRESSE
MÉMOIRE À CETTE ADRESSE, VALEUR LUE VALEUR ATTENDUE) — Un module de mémoire est peut-être
défectueux ou mal fixé. Réinstallez les modules de mémoire et remplacez-les au besoin (reportez-vous à
la section « Lecteurs optiques » à la page 116).90 Dépannage
MEMORY ALLOCATION ERROR (ERREUR D'ALLOCATION D E MÉMOIRE) — Le logiciel que vous voulez utiliser
est en conflit avec le système d'exploitation ou un autre programme ou utilitaire. Éteignez l'ordinateur,
patientez 30 secondes, puis redémarrez-le. Essayez d’utiliser le programme de nouveau. Si le message
d'erreur réapparaît, consultez la documentation du logiciel.
MEMORY DATA LINE FAILURE A T ADDRESS, READ VALUE EXPECTING VALUE (ÉCHEC D E L A LIGNE D E DONNÉES À
CETTE ADRESSE, VALEUR LUE VALEUR ATTENDUE) — Un module de mémoire est peut-être défectueux ou
mal fixé. Réinstallez les modules de mémoire et remplacez-les au besoin (reportez-vous à la section
« Lecteurs optiques » à la page 116).
MEMORY DOUBLE WORD LOGIC FAILURE A T ADDRESS, READ VALUE EXPECTING VALUE (ÉCHEC D E L A LOGIQUE
DOUBLE MOT À CETTE ADRESSE, VALEUR LUE VALEUR ATTENDUE) — Un module de mémoire est peut-être
défectueux ou mal fixé. Réinstallez les modules de mémoire et remplacez-les au besoin (reportez-vous à
la section « Lecteurs optiques » à la page 116).
MEMORY ODD/EVEN LOGIC FAILURE A T ADDRESS, READ VALUE EXPECTING VALUE (ÉCHEC D E L A LOGIQUE
PAIR/IMPAIR À CETTE ADRESSE, VALEUR LUE VALEUR ATTENDUE) — Un module de mémoire est peut-être
défectueux ou mal fixé. Réinstallez les modules de mémoire et remplacez-les au besoin (reportez-vous à
la section « Lecteurs optiques » à la page 116).
MEMORY WRITE/READ FAILURE A T ADDRESS, READ VALUE EXPECTING VALUE (ÉCHEC D E LECTURE/ÉCRITURE À
CETTE ADRESSE, VALEUR LUE VALEUR ATTENDUE) — Un module de mémoire est peut-être défectueux ou
mal fixé. Réinstallez les modules de mémoire et remplacez-les au besoin (reportez-vous à la section
« Lecteurs optiques » à la page 116).
NO BOOT DEVICE AVAILABLE (AUCUN PÉRIPHÉRIQUE D'AMORÇAGE N'EST DISPONIBLE) — L'ordinateur ne
peut pas trouver le disque dur. Si l'unité de disque dur est votre périphérique d'amorçage, assurez-vous
qu'elle est installée, bien en place et partitionnée comme périphérique d'amorçage.
NO BOOT SECTOR ON HARD DRIVE (AUCUN SECTEUR D'AMORÇAGE SUR L'UNITÉ D E DISQUE DUR) — Le
système d'exploitation est peut-être endommagé. Contactez Dell. Reportez-vous à la section « Contacter
Dell » à la page 137.
NO TIMER TICK INTERRUPT (AUCUNE INTERRUPTION D E TIC D'HORLOGE) — Une puce de la carte système
présente peut-être un dysfonctionnement. Exécutez les tests System Set (Ensemble du système) de Dell
Diagnostics (reportez-vous à la section « Dell Diagnostics » à la page 81).
NO T ENOUGH MEMORY O R RESOURCES. EXIT SOME PROGRAMS AND TRY AGAIN (MÉMOIRE O U RESSOURCES
INSUFFISANTES. FERMEZ DES PROGRAMMES E T RÉESSAYEZ) — Trop d'applications sont ouvertes. Fermez
toutes les fenêtres et ouvrez le programme de votre choix.
OPERATING SYSTEM NOT FOUND (SYSTÈME D'EXPLOITATION INTROUVABLE) — Réinstallez le disque dur
(reportez-vous à la section « Disque dur » à la page 113). Si le problème persiste, contactez Dell.
Reportez-vous à la section « Contacter Dell » à la page 137.
OPTIONAL ROM BAD CHECKSUM (MAUVAIS TOTAL D E CONTRÔLE D E LA ROM FACULTATIVE) — La mémoire
ROM optionnelle présente peut-être un dysfonctionnement. Contactez Dell. Reportez-vous à la section
« Contacter Dell » à la page 137.
A REQUIRED .DLL FILE WAS NOT FOUND (UN FICHIER .DLL REQUIS EST INTROUVABLE) — Il manque un
fichier essentiel au programme que vous essayez d'ouvrir. Supprimez, puis réinstallez le programme.
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Cliquez sur Ajout/Suppression de programmes.
3 Sélectionnez le programme à supprimer.Dépannage 91
4 Cliquez sur Supprimer ou Modifier/Supprimer et suivez les invites.
5 Reportez-vous à la documentation du programme pour obtenir les instructions d'installation.
SECTOR NOT FOUND (SECTEUR INTROUVABLE) — Le système d'exploitation ne parvient pas à trouver un
secteur sur le disque dur. Votre disque dur contient probablement un secteur défectueux ou une table
d'allocation de fichiers (FAT) endommagée. Exécutez l'utilitaire de vérification des erreurs Windows
pour vérifier la structure des fichiers du disque dur. Pour obtenir des instructions, reportez-vous au
Centre d'aide et de support de Windows. Pour accéder au Centre d'aide et de support, reportez-vous à la
section « Centre d'aide et de support de Windows » à la page 14. Si un grand nombre de secteurs sont
défectueux, sauvegardez les données (si vous le pouvez), puis reformatez le disque dur.
SEEK ERROR (ERREUR D E RECHERCHE) — Le système d'exploitation ne parvient pas à trouver une piste
particulière sur le disque dur.
SHUTDOWN FAILURE (ÉCHEC D E L'ARRÊT) — Une puce de la carte système présente peut-être un
dysfonctionnement. Exécutez les tests System Set (Ensemble du système) de Dell Diagnostics (reportezvous à la page 81).
TIME-O F-DAY CLOCK LOST POWER (PERTE D'ALIMENTATION D E L'HORLOGE MACHINE) — Les paramètres de
configuration du système sont corrompus. Branchez votre ordinateur sur une prise secteur pour charger
la batterie. Si le problème persiste, essayez de restaurer les données en accédant au programme de
configuration du système. Puis quittez immédiatement le programme. Reportez-vous à la section
« Utilisation du programme de configuration du système » à la page 165. Si le message réapparaît,
contactez Dell. Reportez-vous à la section « Contacter Dell » à la page 137.
TIME-O F-DAY CLOCK STOPPED (ARRÊT D E L'HORLOGE MACHINE) — La batterie de réserve qui alimente les
paramètres de configuration du système nécessite peut-être d'être rechargée. Branchez votre ordinateur
sur une prise secteur pour charger la batterie. Si le problème persiste, contactez Dell. Reportez-vous à la
section « Contacter Dell » à la page 137.
TIME-O F-DAY NOT SET-PLEASE RUN THE SYSTEM SETUP PROGRAM (L'HEURE N'EST PAS CONFIGURÉE, EXÉCUTEZ
L E PROGRAMME D E CONFIGURATION D U SYSTÈME) — L'heure ou la date du programme de configuration du
système ne correspond pas à l'horloge du système. Corrigez les paramètres des options Date et Heure.
Reportez-vous à la section « Utilisation du programme de configuration du système » à la page 165.
TIMER CHIP COUNTER 2 FAILED (ÉCHEC D U COMPTEUR 2 D E LA PUCE D'HORLOGE) — Une puce de la carte
système présente peut-être un dysfonctionnement. Exécutez le groupe de tests System Set (Ensemble
du système) de Dell Diagnostics. Reportez-vous à la section « Dell Diagnostics » à la page 81.
UNEXPECTED INTERRUPT IN PROTECTED MODE (INTERRUPTION INATTENDUE EN MODE PROTÉGÉ) — Le
contrôleur du clavier présente peut-être un dysfonctionnement ou un module de mémoire est mal fixé.
Exécutez les tests System Memory (Mémoire système) et Keyboard Controller (Contrôleur de clavier) de
Dell Diagnostics. Reportez-vous à la section « Dell Diagnostics » à la page 81.
X:\ I S NOT ACCESSIBLE. TH E DEVICE I S NOT READY (X:\ N'EST PAS ACCESSIBLE. LE PÉRIPHÉRIQUE N'EST PAS
PRÊT) — Insérez une disquette dans le lecteur et réessayez.
WARNING: BATTERY I S CRITICALLY LOW (AVERTISSEMENT : LE NIVEAU D E CHARGE D E LA BATTERIE EST
CRITIQUE) — La batterie est pratiquement déchargée. Remplacez la batterie ou branchez l'ordinateur sur
une prise secteur. Sinon, activez le mode Mise en veille prolongée ou éteignez l'ordinateur.92 Dépannage
Problèmes liés à la carte ExpressCard
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
REMARQUE : Le logement de carte ExpressCard ne prend pas en charge les cartes PC.
VÉRIFIEZ L A CARTE EXPRESSCARD — Assurez-vous que la carte ExpressCard est correctement insérée dans
le connecteur.
VÉRIFIEZ QUE L A CARTE EST RECONNUE PAR WINDOWS — Double-cliquez sur l'icône Safely Remove
Hardware (Supprimer le périphérique en toute sécurité) dans la barre des tâches Windows. Assurez-vous
que la carte est répertoriée.
SI VOUS RENCONTREZ DES PROBLÈMES AVEC UNE CARTE EXPRESSCARD FOURNIE PAR DELL — Contactez
Dell. Reportez-vous à la section « Contacter Dell » à la page 137.
SI VOUS RENCONTREZ DES PROBLÈMES AVEC UNE CARTE EXPRESSCARD NON FOURNIE PAR DELL — Contactez
le fabricant de la carte ExpressCard.
Problèmes liés au périphérique IEEE 1394
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
ASSUREZ-VOUS QUE L E PÉRIPHÉRIQUE IEEE 1394 EST RECONNU PAR WINDOWS —
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Cliquez sur Imprimantes et autres périphériques.
Si votre périphérique IEEE 1394 est répertorié, Windows le reconnaît.
SI VOUS RENCONTREZ DES PROBLÈMES AVEC UN PÉRIPHÉRIQUE IEEE 1394 FOURNI PAR DELL — Contactez
Dell ou le fabricant du périphérique IEEE 1394. Reportez-vous à la section « Contacter Dell » à la
page 137.
SI VOUS RENCONTREZ DES PROBLÈMES AVEC UN PÉRIPHÉRIQUE IEEE 1394 NON FOURNI PAR DELL —
Contactez Dell ou le fabricant du périphérique IEEE 1394. Reportez-vous à la section « Contacter Dell »
à la page 137.
ASSUREZ-VOUS QUE L E PÉRIPHÉRIQUE IEEE 1394 EST CORRECTEMENT INSÉRÉ DANS L E CONNECTEUR.
Problèmes liés au clavier
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
REMARQUE : Utilisez le clavier intégré lorsque vous exécutez Dell Diagnostics ou le programme de configuration
du système. Lorsque vous connectez un clavier externe, le clavier intégré reste entièrement opérationnel.Dépannage 93
Problèmes liés au clavier externe
REMARQUE : Lorsque vous connectez un clavier externe, le clavier intégré reste entièrement opérationnel.
VÉRIFIEZ L E CÂBLE D U CLAVIER — Éteignez l'ordinateur. Déconnectez le câble du clavier, assurez-vous
qu'il n'est pas endommagé et reconnectez-le fermement.
Si vous utilisez un câble d'extension pour clavier, déconnectez-le et branchez le clavier directement à
l'ordinateur.
VÉRIFIEZ L E CLAVIER EXTERNE —
1 Éteignez l'ordinateur, patientez une minute, puis rallumez-le.
2 Vérifiez que les voyants des touches Verr num, Verr maj et Arrêt défil du clavier clignotent pendant le
processus d'amorçage.
3 Sur le bureau Windows, cliquez sur le bouton Démarrer, pointez sur Tous les programmes→
Accessoires, puis cliquez sur Bloc-notes.
4 Entrez quelques caractères à l'aide du clavier externe et vérifiez qu'ils s'affichent correctement.
Si vous ne parvenez pas à effectuer ces vérifications, votre clavier externe est probablement
défectueux.
POUR VOUS ASSURER QUE L E PROBLÈME VIENT BIEN D U CLAVIER EXTERNE, VÉRIFIEZ L E CLAVIER INTÉGRÉ —
1 Éteignez l'ordinateur.
2 Déconnectez le clavier externe.
3 Allumez l'ordinateur.
4 Sur le bureau Windows, cliquez sur le bouton Démarrer, pointez sur Tous les programmes→
Accessoires, puis cliquez sur Bloc-notes.
5 Entrez quelques caractères à l'aide du clavier interne et vérifiez qu'ils s'affichent correctement.
Si les caractères s'affichent maintenant tandis qu'ils ne s'affichaient pas avec le clavier externe, ce
dernier est probablement défectueux. Contactez Dell. Reportez-vous à la section « Contacter Dell » à
la page 137.
EXÉCUTEZ LES TESTS D E DIAGNOSTIC D U CLAVIER — Exécutez les tests PC-AT Compatible Keyboards
(Claviers compatibles PC-AT) dans Dell Diagnostics.Reportez-vous à la section « Dell Diagnostics » à la
page 81. Si les tests indiquent que le clavier externe est défectueux, contactez Dell. Reportez-vous à la
section « Contacter Dell » à la page 137.
Caractères imprévus
DÉSACTIVEZ L E PAVÉ NUMÉRIQUE — Appuyez sur pour désactiver le pavé numérique s'il
affiche des chiffres au lieu de lettres. Assurez-vous que le voyant de verrouillage numérique n'est pas
allumé.94 Dépannage
Blocages et problèmes logiciels
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
L'ordinateur ne démarre pas
ASSUREZ-VOUS QUE L'ADAPTATEUR SECTEUR EST SOLIDEMENT BRANCHÉ SUR L'ORDINATEUR E T SUR L A PRISE
SECTEUR
L'ordinateur ne répond plus
AVIS : Vous pouvez perdre des données si vous n'arrivez pas à arrêter correctement le système d'exploitation.
ÉTEIGNEZ L'ORDINATEUR — Si vous n'obtenez aucune réponse lorsque vous appuyez sur une touche du
clavier ou lorsque vous déplacez la souris, appuyez sur le bouton d'alimentation et maintenez-le enfoncé
pendant au moins 8 à 10 secondes jusqu'à ce que l'ordinateur s'éteigne. Redémarrez l'ordinateur.
Un programme ne répond plus ou se bloque régulièrement
FIN D U PROGRAMME —
1 Appuyez simultanément sur <Échap>.
2 Cliquez sur l'onglet Applications, puis sélectionnez le programme qui ne répond plus.
3 Cliquez sur Fin de tâche.
REMARQUE : Le programme chkdsk peut s'exécuter lorsque vous redémarrez l'ordinateur. Suivez les instructions
qui s'affichent à l'écran.
CONSULTEZ L A DOCUMENTATION D U LOGICIEL — Si nécessaire, supprimez, puis réinstallez le programme.
La documentation, la disquette ou le CD qui accompagne tout logiciel inclut généralement des
instructions d'installation.
Un programme est conçu pour un système d'exploitation Microsoft® Windows® antérieur
EXÉCUTEZ L'ASSISTANT COMPATIBILITÉ DES PROGRAMMES — L'Assistant Compatibilité des programmes
configure un programme pour qu'il fonctionne dans un environnement proche des environnements des
systèmes d'exploitation non Windows XP.
1 Cliquez sur le bouton Démarrer, pointez sur Tous les programmes→ Accessoires, puis cliquez sur
Assistant Compatibilité des programmes.
2 Dans l'écran d'accueil, cliquez sur Suivant.
3 Suivez les instructions qui s'affichent à l'écran.
Un écran bleu uni apparaît
ÉTEIGNEZ L'ORDINATEUR — Si vous n'obtenez aucune réponse lorsque vous appuyez sur une touche du
clavier ou lorsque vous déplacez la souris, appuyez sur le bouton d'alimentation et maintenez-le enfoncé
pendant au moins 8 à 10 secondes jusqu'à ce que l'ordinateur s'éteigne. Redémarrez l'ordinateur. Dépannage 95
Problèmes Dell MediaDirect
POUR PLUS D'INFORMATIONS, REPORTEZ-VOUS A U FICHIER D'AIDE DELL MEDIADIRECT — Cliquez sur l'icône
en forme de point d'interrogation en bas de l'écran Dell MediaDirect pour accéder à l'aide.
POUR LIRE DES FILMS AVEC DELL MEDIADIRECT, VOUS DEVEZ AVOIR UN LECTEUR D E DVD E T L E LOGICIEL DELL
DVD PLAYER — Si vous avez acheté un ordinateur équipé d'un lecteur de DVD, ce logiciel doit déjà être
installé.
PROBLÈMES LIÉS À LA QUALITÉ VIDÉO — Désactivez l'option Use Hardware Acceleration (Utiliser
l'accélération matérielle). Cette fonctionnalité utilise le traitement spécial dans certains graphiques pour
réduire les exigences du processeur lors de la lecture de DVD et de certains types de fichiers vidéo.
IMPOSSIBILITÉ D E LIRE CERTAINS FICHIERS MÉDIA — Étant donné que Dell MediaDirect offre un accès aux
fichiers média hors de l'environnement du système d'exploitation Windows XP, l'accès au contenu sous
licence est restreint. Le contenu sous licence est du contenu numérique auquel s'applique Digital Rights
Management (DRM). L'environnement Dell MediaDirect ne peut pas vérifier les restrictions DRM, les
fichiers sous licence ne peuvent par conséquent pas être lus. Les fichiers musicaux et vidéo sous licence
sont indiqués par une icône verrou. Vous pouvez accéder aux fichiers sous licence dans l'environnement
du système d'exploitation Windows XP.
RÉGLAGE DES PARAMÈTRES D E COULEUR POUR LES FILMS CONTENANT DES SCÈNES TROP SOMBRES O U TROP
CLAIRES — Cliquez sur EagleVision pour utiliser une technologie d'amélioration vidéo qui détecte le
contenu vidéo et règle la luminosité/le contraste/la saturation de manière dynamique.
AVIS : Vous ne pouvez pas réinstaller la fonctionnalité Dell MediaDirect si vous reformatez volontairement le
disque dur. Contactez Dell pour obtenir une assistance. Reportez-vous à la section « Contacter Dell » à la page 137.
Autres problèmes logiciels
CONSULTEZ L A DOCUMENTATION D U LOGICIEL O U CONTACTEZ L E FABRICANT POUR OBTENIR DES INFORMATIONS
D E DÉPANNAGE —
• Assurez-vous que le programme est compatible avec le système d'exploitation installé sur votre
ordinateur.
• Assurez-vous que l'ordinateur est conforme aux exigences matérielles requises pour que le logiciel
fonctionne. Consultez la documentation du logiciel pour de plus amples informations.
• Assurez-vous que le programme est correctement installé et configuré.
• Assurez-vous que les pilotes de périphérique n'entrent pas en conflit avec le programme.
• Le cas échéant, supprimez, puis réinstallez le programme.
SAUVEGARDEZ IMMÉDIATEMENT VOS FICHIERS
UTILISEZ UN PROGRAMME D E RECHERCHE DES VIRUS POUR VÉRIFIER L E DISQUE DUR, LES DISQUETTES O U LES CD
ENREGISTREZ E T QUITTEZ TOUS LES PROGRAMMES E T LES FICHIERS OUVERTS, PUIS ÉTEIGNEZ L'ORDINATEUR VIA
L E MENU Démarrer96 Dépannage
ANALYSEZ L'ORDINATEUR À L A RECHERCHE D E LOGICIELS ESPIONS — Si vous observez un ralentissement des
performances de votre ordinateur, si des fenêtres publicitaires s'affichent fréquemment sur votre écran ou
si vous avez des problèmes pour vous connecter sur Internet, votre ordinateur est peut-être infecté par un
logiciel espion. Utilisez un programme antivirus qui inclut une protection contre les logiciels espions
(une mise à niveau de votre programme sera peut-être nécessaire) afin d'analyser votre ordinateur et de
supprimer les logiciels espions. Pour plus d'informations, allez sur le site support.dell.com et lancez une
recherche à l'aide du mot-clé spyware (espion).
EXÉCUTEZ DELL DIAGNOSTICS — Si tous les tests s'exécutent correctement, la condition d'erreur est liée à
un problème logiciel. Reportez-vous à la section « Dell Diagnostics » à la page 81.
Problèmes liés à la mémoire
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
SI L E MESSAGE D E MÉMOIRE INSUFFISANTE S'AFFICHE —
• Enregistrez et fermez tous les fichiers ouverts et quittez tous les programmes en cours d'exécution que
vous n'utilisez pas pour voir si cela permet de résoudre le problème.
• Consultez la documentation du logiciel pour prendre connaissance des besoins en mémoire minimaux.
Le cas échéant, ajoutez de la mémoire. Reportez-vous à la section « Lecteurs optiques » à la page 116.
• Réinsérez les modules de mémoire pour vous assurer que l'ordinateur communique bien avec la
mémoire. Reportez-vous à la section « Lecteurs optiques » à la page 116.
• Exécutez Dell Diagnostics. Reportez-vous à la section « Dell Diagnostics » à la page 81.
SI VOUS RENCONTREZ D'AUTRES PROBLÈMES D E MÉMOIRE —
• Réinstallez les modules de mémoire pour vous assurer que votre ordinateur communique correctement
avec la mémoire (reportez-vous à la section « Lecteurs optiques » à la page 116).
• Veillez à bien suivre les consignes d'installation de la mémoire. Reportez-vous à la section « Lecteurs
optiques » à la page 116.
• Exécutez Dell Diagnostics. Reportez-vous à la section « Dell Diagnostics » à la page 81.
Problèmes liés au réseau
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
VÉRIFIEZ L E CONNECTEUR D U CÂBLE RÉSEAU — Vérifiez que le câble de réseau est bien inséré dans le
connecteur de réseau situé sur le côté de l'ordinateur et le port ou périphérique réseau.
VÉRIFIEZ LES VOYANTS D U RÉSEAU SUR L E CONNECTEUR RÉSEAU — Si aucun voyant ne s'allume, cela
signifie qu'il n'y a pas de communication avec le réseau. Remplacez le câble de réseau.
REDÉMARREZ L'ORDINATEUR E T RECONNECTEZ-VOUS A U RÉSEAU
VÉRIFIEZ LES PARAMÈTRES D U RÉSEAU — Contactez l'administrateur de réseau pour qu'il vérifie vos
paramètres et le fonctionnement du réseau.Dépannage 97
Problèmes d'alimentation
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
VÉRIFIEZ L E VOYANT D'ALIMENTATION — Lorsque le voyant d'alimentation est allumé ou lorsqu'il clignote,
l'ordinateur est sous tension. Si le voyant clignote, l'ordinateur est en mode Veille—appuyez sur le
bouton d'alimentation pour quitter le mode Veille. Si le voyant est éteint, appuyez sur le bouton
d'alimentation pour allumer l'ordinateur.
REMARQUE : Pour plus d'informations sur le mode Veille, reportez-vous à la section « Modes d'économie
d'énergie » à la page 40.
CHARGEZ LA BATTERIE — Il se peut que la batterie soit déchargée.
1 Réinstallez la batterie.
2 Utilisez l'adaptateur secteur pour connecter votre ordinateur à une prise secteur.
3 Allumez l'ordinateur.
REMARQUE : L'autonomie de la batterie (la période durant laquelle la batterie reste chargée) diminue avec le
temps. Selon la fréquence d'utilisation et les conditions de fonctionnement de la batterie, vous devrez peut-être en
acheter une autre au cours de la durée de vie de votre ordinateur.
VÉRIFIEZ L E VOYANT D'ÉTAT D E LA BATTERIE — Si le voyant d'état de la batterie clignote en orange ou est
orange et fixe, la batterie est peu chargée ou complètement déchargée. Connectez l'ordinateur à une
prise secteur.
Si le voyant d'état de la batterie clignote alternativement en vert et orange, la batterie est trop chaude
pour lancer le processus de recharge. Éteignez l'ordinateur, déconnectez-le de la prise secteur, ainsi que la
batterie, pour qu'ils reviennent à la température ambiante.
Si le voyant d'état de la batterie est vert et clignote rapidement, il se peut que la batterie soit
défectueuse. Contactez Dell. Reportez-vous à la section « Contacter Dell » à la page 137.
VÉRIFIEZ L A TEMPÉRATURE D E LA BATTERIE — Si la température de la batterie est inférieure à 0 °C (32 °F),
l'ordinateur ne démarrera pas.
TESTEZ L A PRISE SECTEUR — Assurez-vous que la prise secteur fonctionne en la testant à l'aide d'un autre
appareil, une lampe par exemple.
VÉRIFIEZ L'ADAPTATEUR SECTEUR — Vérifiez les connexions du câble de l'adaptateur secteur. Si
l'adaptateur secteur est muni d'un voyant, assurez-vous que ce dernier est allumé.
CONNECTEZ L'ORDINATEUR DIRECTEMENT À UNE PRISE SECTEUR — Contournez les parasurtenseurs, les
rampes d'alimentation et les rallonges de câble pour vérifier que l'ordinateur est sous tension.
ÉLIMINEZ LES SOURCES POTENTIELLES D'INTERFÉRENCES — Éteignez les ventilateurs, les lampes
fluorescentes ou halogènes ou tout autre appareil se trouvant à proximité.
RÉGLEZ LES PROPRIÉTÉS D E L'ALIMENTATION — Reportez-vous à la section « Modes d'économie d'énergie »
à la page 40.
REMETTEZ EN PLACE LES MODULES D E MÉMOIRE — Si le voyant d'alimentation de l'ordinateur est allumé
mais que l'écran reste vide, réinstallez les modules de mémoire (reportez-vous à la section « Lecteurs
optiques » à la page 116).98 Dépannage
Problèmes d'imprimante
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
REMARQUE : Si vous avez besoin d'une assistance technique pour votre imprimante, contactez le fabricant.
VÉRIFIEZ QUE L'IMPRIMANTE EST ALLUMÉE
VÉRIFIEZ LES CONNEXIONS DES CÂBLES D E L'IMPRIMANTE —
• Consultez la documentation de l'imprimante pour obtenir des informations sur la connexion des
câbles.
• Assurez-vous que les câbles de l'imprimante sont solidement connectés à l'imprimante et à l'ordinateur.
TESTEZ L A PRISE SECTEUR — Assurez-vous que la prise secteur fonctionne en la testant à l'aide d'un autre
appareil, une lampe par exemple.
VÉRIFIEZ QUE L'IMPRIMANTE EST RECONNUE PAR WINDOWS —
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration et ensuite sur Imprimantes et
autres périphériques.
2 Cliquez sur Afficher les imprimantes ou les télécopieurs installés.
Si l'imprimante apparaît dans la liste, cliquez avec le bouton droit sur l'icône la représentant.
3 Cliquez sur Propriétés, puis sur l'onglet Ports. Pour une imprimante parallèle, assurez-vous que le port
d'impression est défini sur LPT1 (Port de l'imprimante). Pour une imprimante USB, assurez-vous que
le port d'impression est défini sur USB.
RÉINSTALLATION D U PILOTE D E L'IMPRIMANTE — Reportez-vous à la documentation de l'imprimante pour
obtenir des instructions.
Problèmes liés au scanner
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
REMARQUE : Si vous avez besoin d'une assistance technique pour votre scanner, contactez le fabricant du
scanner.
CONSULTEZ L A DOCUMENTATION D E L'IMPRIMANTE — Reportez-vous à la documentation de l'imprimante
pour obtenir des informations de configuration et de dépannage.
CONSULTEZ L A DOCUMENTATION D U SCANNER — Reportez-vous à la documentation du scanner pour
obtenir des informations de configuration et de dépannage.
DÉVERROUILLEZ L E SCANNER — Vérifiez que votre scanner est déverrouillé s'il comporte un bouton ou une
languette de verrouillage.
REDÉMARREZ L'ORDINATEUR E T RÉESSAYEZ
VÉRIFIEZ LES CONNEXIONS DES CÂBLES —
• Consultez la documentation du scanner pour obtenir des informations sur la connexion des câbles.
• Assurez-vous que les câbles du scanner sont solidement connectés au scanner et à l'ordinateur.Dépannage 99
VÉRIFIEZ QUE L E SCANNER EST RECONNU PAR MICROSOFT WINDOWS —
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration et ensuite sur Imprimantes et
autres périphériques.
2 Cliquez sur Scanners et appareils-photo.
Si votre scanner est répertorié, Windows le reconnaît.
RÉINSTALLEZ L E PILOTE D U SCANNER — Consultez la documentation du scanner pour obtenir des
instructions.
Problèmes de son et de haut-parleurs
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
Aucun son ne sort des haut-parleurs intégrés
RÉGLEZ L E CONTRÔLE D E VOLUME D E WINDOWS — Double-cliquez sur l'icône en forme de haut-parleur,
dans le coin inférieur droit de l'écran. Assurez-vous d'avoir monté le volume et que le son n'est pas mis en
sourdine. Réglez le volume, les aigus ou les basses pour supprimer toute distorsion.
RÉGLEZ L E VOLUME À L'AIDE DES RACCOURCIS CLAVIER — Pour désactiver (mettre en sourdine) les hautparleurs intégrés, appuyez sur .
RÉINSTALLEZ L E PILOTE AUDIO — Reportez-vous à la section « Réinstallation des pilotes et utilitaires » à la
page 102.
Aucun son ne sort des haut-parleurs externes
ASSUREZ-VOUS QUE L E CAISSON D E BASSE E T LES HAUT-PARLEURS SONT SOUS TENSION — Reportez-vous au
schéma d'installation fourni avec les haut-parleurs. Si vos haut-parleurs sont dotés de commandes du
volume, réglez le volume, les basses ou les aigus pour éliminer les distorsions.
RÉGLEZ L E VOLUME D E WINDOWS — Cliquez ou double-cliquez sur l'icône haut-parleur dans le coin
inférieur droit de l'écran. Assurez-vous d'avoir monté le volume et que le son n'est pas mis en sourdine.
DÉCONNECTEZ L E CASQUE D U CONNECTEUR D E CASQUE — Le son des haut-parleurs est automatiquement
désactivé lorsque le casque est connecté au connecteur de casque du panneau avant de l'ordinateur.
TESTEZ L A PRISE SECTEUR — Assurez-vous que la prise secteur fonctionne en la testant à l'aide d'un autre
appareil, une lampe par exemple.
ÉLIMINEZ LES SOURCES POTENTIELLES D'INTERFÉRENCES — Éteignez les ventilateurs, tubes au néon ou
lampes halogènes proches afin de vérifier s'ils produisent des interférences.
RÉINSTALLEZ L E PILOTE AUDIO — Reportez-vous à la section « Réinstallation des pilotes et utilitaires » à la
page 102.
EXÉCUTEZ DELL DIAGNOSTICS — Reportez-vous à la section « Dell Diagnostics » à la page 81.
REMARQUE : Le réglage du volume de certains lecteurs MP3 annule l'effet du paramètre de volume de Windows.
Si vous avez écouté des chansons au format MP3, assurez-vous que vous n'avez pas baissé ou augmenté le
volume.100 Dépannage
Aucun son émis par le casque
VÉRIFIEZ L A CONNEXION DES CÂBLES D U CASQUE — Assurez-vous que le câble du casque est solidement
connecté au connecteur de casque (reportez-vous à la section « connecteurs audio » à la page 20).
RÉGLEZ L E CONTRÔLE D E VOLUME D E WINDOWS — Cliquez ou double-cliquez sur l'icône haut-parleur dans
le coin inférieur droit de l'écran. Assurez-vous d'avoir monté le volume et que le son n'est pas mis en
sourdine.
Problèmes liés à la tablette tactile ou à la souris
VÉRIFIEZ LES PARAMÈTRES D E LA TABLETTE TACTILE —
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration et ensuite sur Imprimantes et
autres périphériques.
2 Cliquez sur Souris.
3 Réglez les paramètres.
VÉRIFIEZ L E CÂBLE D E LA SOURIS — Éteignez l'ordinateur. Déconnectez le câble de la souris, vérifiez s'il
n'est pas endommagé et reconnectez-le fermement.
Si vous utilisez un câble d'extension pour la souris, déconnectez-le et branchez la souris directement à
l'ordinateur.
POUR VOUS ASSURER QUE L E PROBLÈME VIENT D E LA SOURIS, TESTEZ L A TABLETTE TACTILE —
1 Éteignez l'ordinateur.
2 Déconnectez la souris.
3 Allumez l'ordinateur.
4 Lorsque le bureauWindows apparaît, utilisez la tablette tactile pour déplacer le curseur, sélectionner
une icône et l'ouvrir.
Si la tablette tactile fonctionne correctement, la souris est probablement défectueuse.
RÉINSTALLEZ L E PILOTE D E L A TABLETTE TACTILE — Reportez-vous à la section « Réinstallation des pilotes
et utilitaires » à la page 102.
Problèmes vidéo et d'affichage
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
Si l'écran est vide
REMARQUE : Si vous utilisez un programme qui exige une résolution supérieure à celle dont vous disposez, Dell
vous conseille de brancher un écran externe à votre ordinateur.
VÉRIFIEZ L A BATTERIE — Si vous utilisez une batterie pour alimenter l'ordinateur, la batterie peut être
déchargée. Branchez l'ordinateur sur une prise secteur à l'aide de l'adaptateur secteur, puis allumez
l'ordinateur.Dépannage 101
TESTEZ L A PRISE SECTEUR — Assurez-vous que la prise secteur fonctionne en la testant à l'aide d'un autre
appareil, une lampe par exemple.
VÉRIFIEZ L'ADAPTATEUR SECTEUR — Vérifiez les connexions du câble de l'adaptateur secteur. Si
l'adaptateur secteur est muni d'un voyant, assurez-vous que ce dernier est allumé.
CONNECTEZ L'ORDINATEUR DIRECTEMENT À UNE PRISE SECTEUR — Contournez les parasurtenseurs, les
rampes d'alimentation et les rallonges de câble pour vérifier que l'ordinateur est sous tension.
RÉGLEZ LES PROPRIÉTÉS D E L'ALIMENTATION — Lancez une recherche à l'aide du mot-clé veille dans le
Centre d'aide et de support de Windows. Pour accéder au Centre d'aide et de support, reportez-vous à la
section « Centre d'aide et de support de Windows » à la page 14.
BASCULEZ L'IMAGE VIDÉO — Si votre ordinateur est connecté à un moniteur externe, appuyez sur
pour basculer l'affichage de l'image vidéo vers l'écran.
Si l'écran est difficile à lire
RÉGLEZ L A LUMINOSITÉ — Appuyez sur et sur la touche fléchée vers le haut ou vers le bas.
ÉLOIGNEZ L E CAISSON D E BASSE EXTERNE D E L'ORDINATEUR O U D E L'ÉCRAN — Si vos haut-parleurs externes
comportent un caisson de basse, vérifiez que ce dernier se trouve à au moins 60 cm (2 pieds) de
l'ordinateur ou du moniteur externe.
ÉLIMINEZ LES SOURCES POTENTIELLES D'INTERFÉRENCES — Éteignez les ventilateurs, les lampes
fluorescentes ou halogènes ou tout autre appareil se trouvant à proximité.
ORIENTEZ L'ORDINATEUR DANS UNE DIRECTION DIFFÉRENTE — Éliminez les reflets du soleil pouvant altérer
la qualité de l'image.
RÉGLEZ LES PARAMÈTRES D'AFFICHAGE D E WINDOWS —
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Cliquez sur Apparence et thèmes.
3 Cliquez sur la zone que vous souhaitez modifier ou cliquez sur l'icône Affichage.
4 Essayez différents paramètres de Qualité couleur et Résolution d'écran.
VOIR «MESSAGES D'ERREUR » — Si un message d'erreur apparaît, reportez-vous à la section « Messages
d'erreur » à la page 87.
Si seule une partie de l'écran est lisible
CONNECTEZ UN MONITEUR EXTERNE —
1 Éteignez votre ordinateur et connectez un moniteur externe à ce dernier.
2 Allumez l'ordinateur et le moniteur, puis réglez la luminosité et le contraste.
Si le moniteur externe fonctionne correctement, le moniteur ou le contrôleur vidéo de l'ordinateur peut
être défectueux. Contactez Dell. Reportez-vous à la section « Contacter Dell » à la page 137.102 Dépannage
Pilotes
Qu'est-ce qu'un pilote ?
Un pilote est un programme qui contrôle un périphérique, une imprimante, une souris ou un clavier par
exemple. Tous les périphériques nécessitent un pilote.
Un pilote sert d'interprète entre le périphérique et tout autre programme qui l'utilise. Chaque
périphérique dispose de son propre jeu de commandes spécialisées que seul son pilote reconnaît.
Lorsque Dell livre l'ordinateur, les pilotes requis sont déjà installés—aucune installation ou configuration
supplémentaire n'est nécessaire.
AVIS : Le CD Drivers and Utilities peut contenir des pilotes pour des systèmes d'exploitation qui ne sont pas
installés sur votre ordinateur. Assurez-vous que vous installez les logiciels appropriés à votre système
d'exploitation.
De nombreux pilotes, tels que le pilote du clavier, sont fournis avec le système d'exploitation Microsoft®
Windows®. Vous devez installer des pilotes si vous :
• Mettez à jour votre système d'exploitation ;
• Réinstallez votre système d'exploitation ;
• Connectez ou installez un nouveau périphérique.
Identification des pilotes
Si vous rencontrez des difficultés avec un périphérique, identifiez le pilote à l'origine du problème et
mettez-le à niveau si nécessaire.
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Sous Choisissez une catégorie, cliquez sur Performances et maintenance.
3 Cliquez sur Système.
4 Dans la fenêtre Propriétés système, cliquez sur l'onglet Matériel.
5 Cliquez sur Gestionnaire de périphériques.
6 Faites défiler la liste pour rechercher des périphériques comportant un point d'exclamation (un cercle
jaune et un [!]) sur l'icône du périphérique.
Lorsqu'un point d'exclamation se trouve à côté du nom du périphérique, vous devez réinstaller le
pilote ou en installer un nouveau. Reportez-vous à la section « Réinstallation des pilotes et utilitaires »
à la page 102.
Réinstallation des pilotes et utilitaires
AVIS : Le site Web de support de Dell à l'adresse support.dell.com et le CD Drivers and Utilities fournissent les
pilotes appropriés pour les ordinateurs Dell™. Si vous installez des pilotes que vous avez obtenus par d'autres
moyens, votre ordinateur risque de ne pas fonctionner correctement.
REMARQUE : Le CD Drivers and Utilities est en option et n'est pas obligatoirement expédié avec votre ordinateur.Dépannage 103
Utilisation de la fonction Device Driver Rollback (Restauration des pilotes de périphériques) de Windows XP
Si un problème apparaît sur votre ordinateur après avoir installé ou mis à jour le pilote, utilisez la
fonction Restauration des pilotes de périphériques de Windows XP pour remplacer le pilote par la
version précédemment installée.
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Sous Choisissez une catégorie, cliquez sur Performances et maintenance.
3 Cliquez sur Système.
4 Dans la fenêtre Propriétés système, cliquez sur l'onglet Matériel.
5 Cliquez sur Gestionnaire de périphériques.
6 Cliquez avec le bouton droit sur le périphérique pour lequel le nouveau pilote a été installé et cliquez
sur Propriétés.
7 Cliquez sur l'onglet Pilotes.
8 Cliquez sur Restauration des pilotes.
Si le problème persiste, utilisez la fonction Restauration du système pour retourner à un état de
fonctionnement de votre système d'exploitation antérieur à l'installation du nouveau pilote de
périphérique.
Utilisation du CD Drivers and Utilities
REMARQUE : Le CD Drivers and Utilities est en option et n'est pas obligatoirement expédié avec votre ordinateur.
Si l'utilisation de la fonctionRestauration des pilotes de périphériques (reportez-vous à la section
« Utilisation de la fonction Device Driver Rollback (Restauration des pilotes de périphériques) de
Windows XP » à la page 103) ou de Restauration du système ne résout pas le problème, réinstallez le
pilote à partir du CD Drivers and Utilities.
1 Enregistrez et fermez tous les fichiers et quittez tous les programmes.
2 Insérez le CD Drivers and Utilities.
Dans la plupart des cas, le CD démarre automatiquement. Dans le cas contraire, lancez l'Explorateur
Windows, cliquez sur le répertoire du lecteur de CD pour afficher le contenu du CD, puis doublecliquez sur le fichier autorcd.exe. La première fois que vous exécutez le CD, il se peut qu'il vous invite
à installer des fichiers de configuration. Cliquez sur OK et suivez les instructions qui s'affichent pour
continuer.
3 Dans le menu déroulant Langue de la barre d'outils, sélectionnez une langue pour le pilote ou
l'utilitaire (si disponible). Un écran d'accueil s'affiche.
4 Cliquez sur Suivant.
Le CD analyse automatiquement votre matériel et détecte les pilotes et les utilitaires employés par
votre ordinateur.
5 Une fois l'analyse du matériel terminée, vous pouvez détecter d'autres pilotes et utilitaires. Sous
Critères de recherche, sélectionnez les catégories appropriées dans les menus déroulants Modèle de
système, Système d'exploitation et Rubrique.
Un ou plusieurs liens apparaissent pour le pilote et l'utilitaire particuliers utilisés par votre ordinateur.104 Dépannage
6 Cliquez sur le lien d'un pilote ou d'un utilitaire spécifique afin d'afficher les informations
correspondantes.
7 Cliquez sur le bouton Installer (s'il est disponible) pour lancer l'installation du pilote ou de l'utilitaire.
À l'écran d'accueil, suivez les invites pour terminer l'installation.
Si vous ne trouvez pas de bouton Installer, l'installation automatique n'est pas possible. Pour obtenir
des instructions d'installation, reportez-vous aux instructions appropriées dans les sous-sections
suivantes ou cliquez sur le bouton Extraire, suivez les instructions d'extraction et lisez le fichier Lisezmoi.
S'il vous est demandé de trouver les fichiers de pilote, cliquez sur le répertoire du CD dans la fenêtre
d'information sur le pilote pour afficher les fichiers associés à ce pilote.
Réinstallation manuelle des pilotes
1 Une fois les fichiers de pilote extraits vers votre disque dur, tel que décrit dans la section précédente,
cliquez sur le bouton Démarrer, puis cliquez avec le bouton droit de la souris sur Poste de travail.
2 Cliquez sur Propriétés.
3 Cliquez sur l'onglet Matériel, puis sur Gestionnaire de périphériques.
4 Double-cliquez sur le type de périphérique pour lequel vous installez le pilote (par exemple, Modems
ou périphériques infrarouges).
5 Double-cliquez sur le nom du périphérique pour lequel vous installez le pilote.
6 Cliquez sur l'onglet Pilote, puis sur Mettre à jour le pilote.
7 Cliquez sur Installer à partir d'une liste ou d'un emplacement spécifié (utilisateurs expérimentés),
puis sur Suivant.
8 Cliquez sur Parcourir et placez-vous à l'endroit où vous avez précédemment copié les fichiers de pilote.
9 Lorsque le nom du pilote approprié apparaît, cliquez sur Suivant.
10 Cliquez sur Terminer et redémarrez l'ordinateur.
Résolution des incompatibilités logicielles et matérielles
Si un périphérique n'est pas détecté pendant la configuration du système d'exploitation ou est détecté
mais n'est pas configuré correctement, utilisez le Dépanneur des conflits matériels pour résoudre cette
incompatibilité.
Pour démarrer le Dépanneur des conflits matériels :
1 Cliquez sur le bouton Démarrer, puis sur Aide et Support.
2 Entrez dépanneur des conflits matériels dans le champ Rechercher, puis cliquez sur la
flèche pour lancer la recherche.
3 Cliquez sur Dépanneur de conflits matériels dans la liste Résultats de la recherche.
4 Dans la liste Dépanneur de conflits matériels, cliquez sur Je dois résoudre un conflit matériel sur
mon ordinateur, puis sur Suivant.Dépannage 105
Restauration du système d'exploitation
Plusieurs méthodes de restauration du système d'exploitation sont disponibles :
• La fonction Restauration du système de Microsoft® Windows® XP ramène votre ordinateur à un état
de fonctionnement antérieur, sans affecter les fichiers de données. Commencez par utiliser la fonction
Restauration du système pour restaurer votre système d'exploitation et préserver vos fichiers de
données.
• L'utilitaire Dell PC Restore de Symantec restaure votre disque dur à l'état de fonctionnement dans
lequel il était lorsque vous avez acheté l'ordinateur. Dell PC Restore supprime de façon permanente
toutes les données qui figurent sur le disque dur et supprime toutes les applications installées après
réception de l'ordinateur. N'utilisez PC Restore que si la restauration du système n'a pas résolu le
problème rencontré par votre système d'exploitation.
• Si un CD Operating system vous a été livré avec votre ordinateur, vous pouvez l'utiliser pour restaurer
votre système d'exploitation. Toutefois, l'utilisation de ce CD entraîne la suppression de toutes les
données présentes sur le disque dur. N'utilisez ce CD que si la restauration du système n'a pas permis
de résoudre le problème rencontré par votre système d'exploitation.
Utilisation de la fonction Restauration du système de MicrosoftWindows XP
Le système d'exploitation Microsoft Windows XP comporte la fonction Restauration du système, qui
vous permet de restaurer l'ordinateur à un état antérieur (sans affecter les fichiers de données) si les
modifications apportées au matériel, aux logiciels ou aux paramètres du système empêchent l'ordinateur
de fonctionner correctement. Consultez le Centre d'aide et de support Windows pour plus
d'informations sur l'utilisation de la fonction Restauration du système. Pour accéder au Centre d'aide et
de support, reportez-vous à la section « Centre d'aide et de support de Windows » à la page 14.
AVIS : Sauvegardez régulièrement vos fichiers de données. La fonction Restauration du système ne contrôle pas
vos fichiers de données et ne permet pas de les récupérer.
REMARQUE : Les procédures présentées dans ce document concernent l'affichage par défaut de Windows. Par
conséquent, elles risquent de ne pas fonctionner si votre ordinateur Dell™ est réglé sur le mode d'affichage
classique de Windows.
Création d'un point de restauration
1 Cliquez sur le bouton Démarrer, puis sur Aide et support.
2 Cliquez sur la tâche Restauration du système.
3 Suivez les instructions qui s'affichent à l'écran.
Restauration de l'ordinateur à un état antérieur
Si des problèmes surviennent après l'installation d'un pilote de périphérique, utilisez la fonction
Restauration des pilotes de périphériques (reportez-vous à la section « Utilisation de la fonction Device
Driver Rollback (Restauration des pilotes de périphériques) de Windows XP » à la page 103) pour
résoudre le problème. Si le problème persiste, utilisez la fonction Restauration du système.
AVIS : Avant de restaurer l'ordinateur à un état antérieur, enregistrez et fermez tous les fichiers ouverts et quittez
tous les programmes en cours d'exécution. Ne modifiez, n'ouvrez ou ne supprimez en aucun cas des fichiers ou
des programmes tant que la restauration du système n'est pas terminée.106 Dépannage
1 Cliquez sur le bouton Démarrer, pointez sur Tous les programmes→ Accessoires→ Outils système,
puis cliquez sur Restauration du système.
2 Assurez-vous que l'option Restaurer mon ordinateur à un état antérieur est sélectionnée, puis cliquez
sur Suivant.
3 Cliquez sur une date du calendrier à laquelle vous souhaitez restaurer votre ordinateur.
L'écran Sélectionner un point de restauration affiche un calendrier vous permettant de sélectionner
des points de restauration. Toutes les dates du calendrier comportant des points de restauration
apparaissent en gras.
4 Sélectionnez un point de restauration, puis cliquez sur Suivant.
Si une date du calendrier contient un seul point de restauration, ce dernier est sélectionné
automatiquement. Si plusieurs points de restauration sont disponibles, cliquez sur celui que vous
souhaitez utiliser.
5 Cliquez sur Suivant.
L'écran Restauration terminée s'affiche une fois que la collecte des données par la fonction
Restauration du système est terminée. L'ordinateur redémarre.
6 Une fois l'ordinateur redémarré, cliquez sur OK.
Pour changer de point de restauration, répétez les étapes précédentes en utilisant un autre point de
restauration ou annulez la restauration.
Annulation de la dernière restauration du système
AVIS : Avant d'annuler la dernière restauration du système, enregistrez et fermez tous les fichiers ouverts et
quittez tous les programmes en cours d'exécution. Ne modifiez, n'ouvrez ou ne supprimez en aucun cas des
fichiers ou des programmes tant que la restauration du système n'est pas terminée.
1 Cliquez sur le bouton Démarrer, pointez sur Tous les programmes→ Accessoires→ Outils système,
puis cliquez sur Restauration du système.
2 Cliquez sur Undo my last restoration (Annuler ma dernière restauration), puis sur Suivant.
Activation de la fonctionnalité Restauration du système
Si vous réinstallez Windows XP avec moins de 200 Mo d'espace disponible sur le disque dur, la fonction
Restauration du système est automatiquement désactivée. Pour vérifier si la fonction Restauration du
système est activée :
1 Cliquez sur le bouton Démarrer, puis sur Panneau de configuration.
2 Cliquez sur Performances et maintenance.
3 Cliquez sur Système.
4 Cliquez sur l'onglet Restauration du système.
5 Assurez-vous que l'option Désactiver la Restauration du système est bien désactivée.Dépannage 107
Utilisation de Dell PC Restore de Symantec
AVIS : Dell PC Restore supprime définitivement toutes les données qui figurent sur le disque dur et supprime
toutes les applications et tous les pilotes installés après que vous avez reçu l'ordinateur. Si possible, sauvegardez
toutes les données avant de lancer PC Restore. N'utilisez PC Restore que si la restauration du système n'a pas
résolu le problème rencontré par votre système d'exploitation.
REMARQUE : Dell PC Restore de Symantec n'est pas obligatoirement disponible dans certains pays ou sur
certains ordinateurs.
N'utilisez Dell PC Restore de Symantec qu'en dernier ressort pour restaurer votre système d'exploitation.
PC Restore restaure votre disque dur à l'état de fonctionnement dans lequel il était lorsque vous avez
acheté l'ordinateur. Tous les programmes ou fichiers ajoutés depuis que vous avez reçu votre ordinateur,
notamment les fichiers de données, sont définitivement supprimés du disque dur. Les documents,
feuilles de calcul, messages électroniques, photos numériques et fichiers de musique constituent les
fichiers de données. Si possible, sauvegardez toutes les données avant de lancer PC Restore.
Pour utiliser PC Restore :
1 Allumez l'ordinateur.
Au cours du processus d'amorçage, une barre bleue portant la mention www.dell.com apparaît dans la
partie supérieure de l'écran.
2 Dès que cette barre bleue s'affiche, appuyez sur .
Si vous n'appuyez pas sur à temps, laissez l'ordinateur finir de démarrer, puis
redémarrez-le de nouveau.
AVIS : Si vous ne voulez pas poursuivre l'utilisation de PC Restore, cliquez sur Redémarrer à l'étape suivante.
3 Dans l'écran qui apparaît ensuite, cliquez sur Restaurer.
4 Dans l'écran suivant, cliquez sur Confirmer.
La restauration prend de 6 à 10 minutes environ.
5 Lorsque vous y êtes invité, cliquez sur Terminer pour redémarrer l'ordinateur.
REMARQUE : N'éteignez pas manuellement l'ordinateur. Cliquez sur Terminer et laissez l'ordinateur
terminer le redémarrage.
6 Lorsque vous y êtes invité, cliquez sur Oui.
L'ordinateur redémarre. Étant donné que l'ordinateur est restauré à son état de fonctionnement
d'origine, les écrans qui apparaissent, tels que le Contrat de licence pour utilisateur final sont
identiques à ceux qui s'étaient affichés au premier démarrage de l'ordinateur.
7 Cliquez sur Suivant.
L'écran Restauration du système apparaît et l'ordinateur redémarre.
8 Une fois l'ordinateur redémarré, cliquez sur OK.108 Dépannage
Suppression de Dell PC Restore
AVIS : La suppression de Dell PC Restore du disque dur supprime de manière permanente l'utilitaire PC Restore de
votre ordinateur. Une fois Dell PC Restore supprimé, vous ne pourrez plus l'utiliser pour restaurer le système
d'exploitation de votre ordinateur.
REMARQUE : Dell PC Restore de Symantec n'est pas obligatoirement disponible dans certains pays ou sur
certains ordinateurs.
L'utilitaire Dell PC Restore restaure votre disque dur à l'état de fonctionnement dans lequel il était
lorsque vous avez acheté l'ordinateur. Nous vous recommandons de ne pas supprimer PC Restore de
votre ordinateur, même s'il se révèle nécessaire de libérer de l'espace sur le disque dur. Une fois PC
Restore supprimé du disque dur, il est impossible de le rappeler et vous ne pourrez jamais utiliser PC
Restore pour restaurer le système d'exploitation de votre ordinateur à son état de fonctionnement
d'origine.
Pour supprimer PC Restore :
1 Connectez-vous à l'ordinateur en tant qu'administrateur local.
2 Dans l'Explorateur Windows, rendez-vous à l'adresse c:\dell\utilities\DSR.
3 Double-cliquez sur le nom de fichier DSRIRRemv2.exe.
REMARQUE : Si vous ne vous êtes pas connecté en tant qu'administrateur local, le message qui s'affiche
vous invite à le faire. Cliquez sur Quitter et connectez-vous en tant qu'administrateur local.
REMARQUE : Si la partition de PC Restore n'existe pas sur le disque dur de votre ordinateur, un message
indiquant qu'elle n'a pas été trouvée apparaît. Cliquez sur Quitter; il n'existe aucune partition à supprimer.
4 Cliquez sur OK pour supprimer la partition PC Restore sur le disque dur.
5 Lorsqu'un message de confirmation s'affiche, cliquez sur Oui.
La partition PC Restore est supprimée et l'espace disque ainsi libéré est ajouté à l'espace disque
disponible sur le disque dur.
6 Cliquez avec le bouton droit sur Disque local (C) dans l'Explorateur Windows, cliquez sur Propriétés,
puis vérifiez que l'espace disque supplémentaire est disponible tel qu'indiqué par la valeur plus élevée
sous Espace libre.
7 Cliquez sur Terminer pour fermer la fenêtre PC Restore Removal (Retrait de PC Restore).
8 Redémarrez l'ordinateur.
Utilisation du CD Operating system
Avant de commencer
Si vous souhaitez réinstaller le système d'exploitation Windows XP pour corriger un problème avec un
nouveau pilote, utilisez tout d'abord la fonction Restauration des pilotes de périphériques (reportez-vous
à la section « Utilisation de la fonction Device Driver Rollback (Restauration des pilotes de
périphériques) de Windows XP » à la page 103). Si la Restauration des pilotes de périphériques ne résout
pas le problème, utilisez Restauration du système pour ramener l'ordinateur à l'état de fonctionnement
précédant l'installation du pilote. Reportez-vous à la section « Utilisation de la fonction Restauration du
système de Microsoft Windows XP » à la page 105.Dépannage 109
Pour réinstaller Windows XP, vous devez disposer des éléments suivants :
• CD Système d'exploitation
• Dell™ CD Drivers and Utilities
REMARQUE : Le CD Drivers and Utilities contient les pilotes installés à l'assemblage de l'ordinateur. Utilisez le CD
Drivers and Utilities pour charger les pilotes requis. Selon la région dans laquelle vous avez commandé votre
ordinateur et selon que vous avez demandé ou non les CD, le CD Drivers and Utilities et le CD Operating System ne
sont pas forcément livrés avec l'ordinateur.
Réinstallation de Windows XP
Pour réinstaller Windows XP, suivez toutes les étapes des sections ci-après, dans l'ordre indiqué.
Le processus de réinstallation peut prendre de 1 à 2 heures. Après avoir réinstallé le système
d'exploitation, vous devez également réinstaller les pilotes de périphériques, le programme antivirus et
d'autres logiciels.
AVIS : Le CD Operating System fournit des options de réinstallation du système Windows XP. Ces options peuvent
remplacer des fichiers installés et avoir des répercussions sur les programmes installés sur votre disque dur. Par
conséquent, ne réinstallez pas votre Windows XP à moins qu'un membre de l'équipe du support technique de Dell
ne vous le demande.
AVIS : Pour éviter des conflits avec Windows XP, vous devez désactiver tout logiciel de protection antivirus
installé sur l'ordinateur avant de réinstaller le système d'exploitation. Pour plus d'informations, consultez la
documentation qui accompagne le logiciel.
1 Enregistrez et fermez tout fichier ouvert et quittez tous les programmes d'application en cours
d'utilisation.
2 Insérez le CD Operating system. Cliquez sur Quitter si le message Installer Windows XP
apparaît.
3 Redémarrez l'ordinateur.
4 Appuyez sur dès l'apparition du logo DELL™.
Si le logo du système d'exploitation apparaît, patientez jusqu'à l'affichage du bureau Windows,
éteignez de nouveau l'ordinateur et faites une nouvelle tentative.
5 Utilisez les touches de direction pour sélectionner l'option CD-ROM, puis appuyez sur .
6 Appuyez sur une touche lorsque le message Appuyez sur une touche pour démarrer
depuis le CD-ROM apparaît à l'écran.
7 Lorsque l'écran Configuration de Windows XP apparaît, appuyez sur .
8 Respectez les instructions pour terminer la réinstallation.
9 Une fois la réinstallation terminée, réinstallez les pilotes et les applications, le cas échéant. Reportezvous à la section « Réinstallation des pilotes et utilitaires » à la page 102.110 DépannageAjout et remplacement de pièces 111
Ajout et remplacement de pièces
Avant de commencer
Ce chapitre fournit les instructions de retrait et d'installation des composants de votre ordinateur. À
moins d'indication contraire, les conditions suivantes doivent exister préalablement à chaque
procédure :
• Vous avez effectué les étapes des sections « Mise hors tension de l'ordinateur » (reportez-vous à
cette page) et « Avant d'intervenir à l'intérieur de votre ordinateur » (reportez-vous à la page 112).
• Vous avez lu les consignes de sécurité qui figurent dans le Guide d'information sur le produit
Dell™.
• Pour remplacer un composant ou pour l'installer, s'il a été acheté séparément, effectuez la
procédure de retrait en ordre inverse.
Outils recommandés
Les procédures mentionnées dans ce document nécessitent les outils suivants :
• un petit tournevis à lame plate
• un tournevis cruciforme
• une petite pointe en plastique
• la mise à jour Flash BIOS (visitez le site Web d'assistance technique de Dell à l'adresse
support.dell.com)
Mise hors tension de l'ordinateur
AVIS : Pour éviter de perdre des données, enregistrez tous les fichiers ouverts, fermez-les et quittez toutes
les applications avant de procéder à l'arrêt du système.
1 Arrêtez le système d'exploitation :
a Enregistrez et fermez tous les fichiers ouverts, quittez tous les programmes, cliquez sur le
bouton Démarrer, puis sur Arrêter l'ordinateur.
b Dans la fenêtre Arrêter l'ordinateur, cliquez sur Arrêter/Éteindre.
L'ordinateur s'éteint une fois le système d'exploitation arrêté.
2 Assurez-vous que l'ordinateur et les périphériques connectés sont éteints. Si votre ordinateur et les
périphériques qui y sont connectés ne se sont pas éteints automatiquement lorsque vous avez
éteint votre ordinateur, appuyez sur le bouton d'alimentation et maintenez-le enfoncé pendant
4 secondes.112 Ajout et remplacement de pièces
Avant d'intervenir à l'intérieur de votre ordinateur
Respectez les consignes de sécurité suivantes pour vous aider à protéger votre ordinateur contre les
dommages éventuels et pour garantir votre sécurité personnelle.
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
PRÉCAUTION : Manipulez les composants et les cartes avec précaution. Ne touchez pas les pièces ou les
contacts d'une carte. Tenez une carte par les bords ou par la languette de montage métallique. Tenez les pièces,
telles qu'un processeur, par les bords et non par les broches.
AVIS : Seul un technicien d'entretien qualifié doit effectuer les réparations sur votre ordinateur. Les dommages
causés par une personne non autorisée par Dell ne sont pas couverts par votre garantie.
AVIS : Lorsque vous débranchez un câble, tirez sur le connecteur ou sur la boucle prévue, mais jamais sur le câble
lui-même. Certains câbles sont munis d'un connecteur à languettes de verrouillage ; si vous déconnectez ce type
de câble, appuyez sur les languettes de verrouillage vers l'intérieur avant de déconnecter le câble. Quand vous
séparez les connecteurs en tirant dessus, veillez à les maintenir alignés pour ne pas plier de broches de
connecteur. De même, lorsque vous connectez un câble, assurez-vous que les deux connecteurs sont bien
orientés et alignés.
AVIS : Avant de commencer à travailler sur l'ordinateur, suivez les étapes suivantes pour éviter de l'endommager.
1 Assurez-vous que la surface de travail est plane et propre afin d'éviter de rayer le capot de l'ordinateur.
2 Éteignez l'ordinateur. Reportez-vous à la section « Mise hors tension de l'ordinateur » à la page 111.
AVIS : Pour déconnecter un câble de réseau, débranchez d'abord le câble de votre ordinateur, puis de la prise
réseau murale.
3 Débranchez également de l'ordinateur tous les câbles de téléphone ou de réseau.
AVIS : Pour éviter d'endommager la carte système, veillez à retirer la batterie principale avant de réparer
l'ordinateur.
4 Déconnectez l'ordinateur et tous les périphériques qui y sont reliés de leur prise secteur.
5 Retirez la batterie.
Faites glisser et maintenez le loquet de fermeture de la baie de batterie, situé en dessous de
l'ordinateur, puis retirez la batterie de la baie.Ajout et remplacement de pièces 113
6 Retirez le lecteur optique, le cas échéant, de la baie de lecteur optique. Reportez-vous à la section
« Lecteurs optiques » à la page 116.
7 Appuyez sur le bouton d'alimentation pour mettre à la terre la carte système.
8 Retirez les cartes ExpressCard du logement correspondant. Reportez-vous à la section « Retrait d'une
carte ExpressCard ou d'un cache » à la page 67.
9 Retirez les cartes mémoire multimédia du lecteur 5 en 1 correspondant. Reportez-vous à la section
« Caches de carte mémoire multimédia » à la page 68.
10 Fermez l'écran, retournez l'ordinateur et placez-le sur une surface plane.
Disque dur
PRÉCAUTION : Si vous enlevez le disque dur lorsqu'il est chaud, ne touchez pas l'habitacle en métal du
disque dur.
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
AVIS : Pour éviter toute perte de données, éteignez votre ordinateur (reportez-vous à la page 111) avant de retirer
le disque dur. Ne retirez jamais l'unité de disque dur lorsque l'ordinateur est allumé, en mode Veille ou en mode
Mise en veille prolongée.
AVIS : Les disques durs sont très fragiles ; même un léger choc peut les endommager.
REMARQUE : Dell ne garantit ni la compatibilité ni la prise en charge des unités de disque dur provenant de
sources autres que Dell.
REMARQUE : Si vous installez un disque dur provenant d'une source autre que Dell, vous devez installer un
système d'exploitation, des pilotes et des utilitaires sur le nouveau disque dur.
1 batterie 2 loquet de fermeture de la baie de batterie
2
1114 Ajout et remplacement de pièces
Pour remettre l'unité de disque dur dans la baie d'unité :
1 Suivez les procédures décrites dans la section « Avant de commencer » à la page 111.
2 Retournez l'ordinateur et desserrez les deux vis imperdables du cache du disque dur.
AVIS : Lorsque le disque dur n'est pas dans l'ordinateur, placez-le dans son emballage protecteur antistatique.
Reportez-vous à la section « Protection contre les décharges électrostatiques » du Guide d'information sur le
produit.
3 Soulevez le capot et mettez-le de côté.
4 Utilisez votre doigt pour faire glisser le disque dur vers les trous de vis, puis la languette de retrait pour
soulever le disque dur vers le haut et le retirer de l'ordinateur.
1 vis (2)
1Ajout et remplacement de pièces 115
5 Enlevez le nouveau disque de son emballage.
Conservez cet emballage d'origine pour l'utiliser à nouveau lors du stockage ou de l'expédition du
disque dur.
AVIS : Faites glisser le disque dans son logement en exerçant une pression ferme et uniforme. Si vous exercez une
pression trop forte sur le disque pour le mettre en place, vous risquez d'endommager le connecteur.
6 Installez le nouveau disque dur dans la baie, puis faites-le glisser dans le connecteur dans la direction
opposée à celle des trous de vis jusqu'à ce qu'il soit bien en place.
7 Remettez le cache et les vis en place.
8 Installez le système d'exploitation de votre ordinateur. Reportez-vous à la section « Restauration du
système d'exploitation » à la page 105.
9 Installez les pilotes et utilitaires de votre ordinateur. Reportez-vous à la section « Réinstallation des
pilotes et utilitaires » à la page 102.
Retour de votre disque dur à Dell
Pour retourner votre ancien disque dur à Dell, placez-le dans son emballage d'origine ou dans un
emballage similaire. Faute de quoi il risque d'être endommagé en transit.
1 languette de retrait 2 unité de disque dur
2
1116 Ajout et remplacement de pièces
Lecteurs optiques
À propos de la vis de fixation de périphérique
REMARQUE : Vous n'avez pas besoin d'installer la vis de fixation de périphérique à moins que vous vouliez
sécuriser le module afin qu'on ne puisse pas facilement le retirer.
Votre ordinateur Dell™ est livré avec un lecteur optique, installé dans la baie modulaire, et avec une vis
de fixation de périphérique. Celle-ci n'est pas nécessairement installée sur le lecteur optique, elle peut
être dans un sachet séparé. Lorsque vous installez le module dans la baie, vous pouvez aussi installer la
vis de fixation de périphérique afin qu'on ne puisse pas facilement le retirer.
Retrait et installation des lecteurs optiques
AVIS : Pour éviter d'endommager les lecteurs, rangez-les dans un endroit sec et sûr lorsqu'ils ne sont pas installés
dans l'ordinateur. Évitez d'exercer une pression quelconque ou de placer des objets lourds sur ces derniers.
1 L'ordinateur étant sous tension, double-cliquez sur l'icône Supprimer le périphérique en toute sécurité
sur la barre des tâches, cliquez sur le périphérique que vous souhaitez éjecter, puis sur Stop (Arrêter).
2 Fermez votre écran et retournez l'ordinateur.
3 Utilisez un tournevis cruciforme pour retirer la vis de fixation de périphérique qui se trouve sous
l'ordinateur.
4 Insérez un tournevis cruciforme dans le trou de vis afin de pousser le lecteur hors de la baie modulaire.
1 emballage en polystyrène 2 unité de disque dur
2
1Ajout et remplacement de pièces 117
5 Sortez le lecteur de la baie modulaire.
6 Poussez le nouveau lecteur dans la baie modulaire jusqu'au déclic.
7 Remettez en place la vis de fixation de périphérique.
8 Retournez l'ordinateur à l'endroit et ouvrez l'écran.
9 Le système d'exploitation reconnaît automatiquement le lecteur. Le cas échéant, entrez votre mot de
passe pour déverrouiller votre ordinateur.
Mémoire
Vous pouvez augmenter la mémoire de votre ordinateur en installant des modules de mémoire sur la
carte système. Pour plus d'informations sur la mémoire prise en charge par votre ordinateur, reportezvous à la section « Caractéristiques » à la page 157. Installez uniquement des modules conçus
spécifiquement pour votre ordinateur.
REMARQUE : Cet ordinateur prend en charge les modules de mémoire 533 MHz et 667 MHz. En cas d'installation
d'un autre module de mémoire, vous devez vous assurer que les deux DIMM sont cadencés à 667 MHz. Si l'un est
cadencé à 533 MHz et l'autre à 667 MHz, l'ordinateur fonctionnera uniquement à la vitesse de 533 MHz et pas à la
vitesse mémoire maximale de 667 MHz.
REMARQUE : Les modules de mémoire achetés chez Dell sont couverts par la garantie de votre ordinateur.
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.118 Ajout et remplacement de pièces
L'ordinateur possède deux connecteurs de module de mémoire, « DIMM A » et « DIMM B ». DIMM A
(situé sous le clavier) renferme le module de mémoire principal configuré par l'usine. Si vous n'avez pas
commandé de mémoire supplémentaire, le connecteur DIMM B (situé en dessous de l'ordinateur sous le
cache du module de mémoire) est vide. Généralement, si vous ajoutez de la mémoire, vous devez
installer un module de mémoire dans le connecteur DIMM B. Si vous voulez mettre la mémoire à
niveau, vous devrez peut-être installer la mémoire dans les deux connecteurs DIMM A et B, en fonction
de l'étendue de la mise à niveau.
Installation d'un module de mémoire dans le connecteur DIMM B
1 Suivez les procédures décrites dans la section « Avant de commencer » à la page 111.
2 Raccordez-vous à la masse en touchant l'un des connecteurs en métal à l'arrière de l'ordinateur.
REMARQUE : Si vous quittez les lieux, remettez-vous à la terre au moment où vous revenez vers l'ordinateur.
3 Retournez l'ordinateur, desserrez les vis imperdables du cache du compartiment des modules de
mémoire, puis retirez le cache.
AVIS : Pour éviter d'endommager le connecteur du module de mémoire, n'utilisez pas d'outil pour écarter les clips
de fixation du module de mémoire.
4 Si vous remplacez un module de mémoire, retirez le module existant :
a Du bout des doigts, écartez avec précaution les clips de fixation situés à chaque extrémité du
connecteur du module de mémoire jusqu'à ce que le module sorte.
b Retirez le module du connecteur.
1 vis (2) 2 cache du module de mémoire
1
2Ajout et remplacement de pièces 119
AVIS : Si vous devez installer des modules de mémoire dans deux connecteurs, installez un module de mémoire
dans le connecteur « DIMM A » avant d'en installer un dans le connecteur « DIMM B ». Insérez les modules de
mémoire suivant un angle de 45 degrés pour éviter d'endommager le connecteur.
REMARQUE : Si le module de mémoire n'est pas installé correctement, l'ordinateur ne démarre pas. Aucun
message d'erreur ne vous avertit de cet échec.
5 Raccordez-vous à la masse et installez le nouveau module de mémoire :
a Alignez l'encoche du bord du module sur la languette située dans l'emplacement du connecteur.
b Faites glisser fermement le module dans l'emplacement en suivant un angle de 45 degrés, puis
faites-le pivoter vers le bas jusqu'à ce que vous entendiez un déclic. S'il ne s'enclenche pas, retirez
le module et réinstallez-le.
1 module de mémoire 2 clips de fixation
(2 par connecteur)
1
2120 Ajout et remplacement de pièces
6 Replacez le cache du module de mémoire et serrez les vis.
AVIS : Si vous rencontrez des difficultés pour fermer le cache, retirez le module et réinstallez-le. Ne forcez pas la
fermeture du cache, car vous risqueriez d'endommager l'ordinateur.
7 Insérez la batterie dans sa baie ou connectez l'adaptateur secteur à votre ordinateur et à une prise
secteur.
8 Réinstallez le disque dur. Reportez-vous à la section « Disque dur » à la page 113.
9 Allumez l'ordinateur.
Au démarrage, l'ordinateur détecte la mémoire supplémentaire et met automatiquement à jour les
informations de configuration du système.
Pour vérifier la quantité de mémoire installée, cliquez sur le bouton Démarrer, sur Aide et support, puis
sur Informations sur l'ordinateur.
Installation d'un module de mémoire dans le connecteur DIMM A
Le connecteur de module de mémoire étiqueté « DIMM A » est situé sous le clavier.
1 Suivez les procédures décrites dans la section « Avant de commencer » à la page 111.
2 Raccordez-vous à la masse en touchant l'un des connecteurs en métal à l'arrière de l'ordinateur.
REMARQUE : Si vous quittez les lieux, remettez-vous à la terre au moment où vous revenez vers l'ordinateur.
1 languette dans le logement du connecteur
1Ajout et remplacement de pièces 121
3 Retirez le cache de la charnière. Reportez-vous à la section « Cache de la charnière » à la page 127.
REMARQUE : Assurez-vous de retirer les deux vis de la baie de batterie lors du retrait des charnières.
4 Retirez le clavier. Reportez-vous à la section « Clavier » à la page 129.
AVIS : Pour éviter d'endommager le connecteur du module de mémoire, n'utilisez pas d'outil pour écarter les
clips de fixation du module de mémoire.
5 Si vous remplacez un module de mémoire, retirez le module existant :
a Du bout des doigts, écartez avec précaution les clips de fixation situés à chaque extrémité du
connecteur du module de mémoire jusqu'à ce que le module sorte.
b Retirez le module du connecteur.
AVIS : Si vous devez installer des modules de mémoire dans deux connecteurs, installez un module de mémoire
dans le connecteur « DIMM A » avant d'en installer un dans le connecteur « DIMM B ». Insérez les modules de
mémoire suivant un angle de 45 degrés pour éviter d'endommager le connecteur.
REMARQUE : Si le module de mémoire n'est pas installé correctement, l'ordinateur ne démarre pas. Aucun
message d'erreur ne vous avertit de cet échec.
6 Raccordez-vous à la masse et installez le nouveau module de mémoire :
a Alignez l'encoche du bord du module sur la languette située dans l'emplacement du connecteur.
b Faites glisser fermement le module dans l'emplacement en suivant un angle de 45 degrés, puis
faites-le pivoter vers le bas jusqu'à ce que vous entendiez un déclic. S'il ne s'enclenche pas, retirez
le module et réinstallez-le.
1 module de mémoire 2 clips de fixation
(2 par connecteur)
1
2122 Ajout et remplacement de pièces
7 Remettez le clavier en place. Reportez-vous à la section « Clavier » à la page 129.
8 Remettez en place le cache de la charnière. Reportez-vous à la section « Cache de la charnière » à la
page 127.
REMARQUE : Assurez-vous de remettre les deux vis dans la baie de batterie lors de la réinstallation des
charnières.
9 Insérez la batterie dans sa baie ou connectez l'adaptateur secteur à votre ordinateur et à une prise
secteur.
10 Réinstallez le disque dur. Reportez-vous à la section « Disque dur » à la page 113.
11 Allumez l'ordinateur.
Au démarrage, l'ordinateur détecte la mémoire supplémentaire et met automatiquement à jour les
informations de configuration du système.
Pour vérifier la quantité de mémoire installée, cliquez sur le bouton Démarrer, sur Aide et support, puis
sur Informations sur l'ordinateur.
1 languette dans le logement du connecteur
1Ajout et remplacement de pièces 123
Modem (en option)
Si vous avez commandé le modem en option en même temps que votre ordinateur, le modem est déjà
installé.
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
1 Suivez les procédures décrites dans la section « Avant de commencer » à la page 111.
2 Retournez l'ordinateur et desserrez les vis imperdables du cache du modem/de la carte Mini/du sans fil,
puis retirez le cache.
3 Retirez le modem installé :
a Retirez la vis permettant de fixer le modem sur la carte système et mettez-la de côté.
b Soulevez la languette de retrait afin de retirer le modem du connecteur, sur la carte système, puis
déconnectez le câble du modem.
1 cache du modem/de la carte Mini/du sans fil
1124 Ajout et remplacement de pièces
4 Installez le modem de remplacement :
a Connectez le câble du modem au modem.
AVIS : Les connecteurs sont prévus pour une insertion correcte. Si vous sentez une résistance, vérifiez les
connecteurs et réalignez la carte.
b Alignez le modem sur les trous des vis et appuyez sur le modem pour l'insérer dans le connecteur
de la carte système.
c Remettez en place la vis qui fixe le modem à la carte système.
5 Remettez en place le cache du modem/de la carte Mini/du sans fil.
1 vis 2 câble du modem 3 modem
4 languette de retrait 5 connecteur de carte système
4
5
1
2
3Ajout et remplacement de pièces 125
Carte Mini
Si vous avez commandé une carte Mini avec votre ordinateur, la carte est déjà installée.
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
1 Suivez les procédures décrites dans la section « Avant de commencer » à la page 111.
2 Si aucune carte Mini n'est installée, passez à l'étape 3. Si vous remplacez une carte Mini, retirez la carte
existante :
a Débranchez les câbles d'antenne de la carte Mini.
b Retirez la carte Mini en poussant les clips de fixation métalliques vers l'arrière de l'ordinateur
jusqu'à ce que la carte soit doucement éjectée.
c Retirez la carte Mini de son connecteur.
1 câbles d'antenne (2)
1126 Ajout et remplacement de pièces
AVIS : Les connecteurs disposent de codes de couleur pour garantir leur bonne insertion. Si vous sentez une
résistance, vérifiez les connecteurs et réalignez la carte.
3 Installez la carte Mini de remplacement :
AVIS : Pour éviter d'endommager la carte Mini, vérifiez que les câbles d'antenne ne sont pas sous la carte lorsque
vous la mettez en place.
a Alignez la carte Mini sur le connecteur suivant un angle de 45 degrés et enfoncez-la dans le
connecteur jusqu'à ce que vous entendiez un clic.
AVIS : Pour éviter d'endommager la carte Mini, ne placez jamais de câbles au-dessous de la carte.
b Raccordez les câbles d'antenne aux connecteurs d'antenne de la carte Mini en faisant correspondre
la couleur du câble avec la couleur du triangle au-dessus du connecteur. Raccordez le câble
d'antenne principal (blanc) au connecteur d'antenne avec le triangle blanc. Raccordez le câble
d'antenne auxiliaire (noir) au connecteur d'antenne avec le triangle noir.
REMARQUE : Si votre ordinateur dispose d'un câble gris, raccordez celui-ci au connecteur avec le triangle gris, si
ce connecteur est disponible sur votre carte.
1 languettes de fixation en métal (2) 2 carte Mini
2
1Ajout et remplacement de pièces 127
Cache de la charnière
Retrait du cache de la charnière
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
AVIS : Pour éviter une décharge électrostatique, raccordez-vous à la masse à l'aide d'un bracelet antistatique ou
en touchant périodiquement une surface métallique non peinte (par exemple un connecteur sur le panneau arrière
de l'ordinateur).
AVIS : Pour éviter d'endommager la carte système, vous devez retirer la batterie principale avant d'intervenir à
l'intérieur de l'ordinateur.
AVIS : Le cache de la charnière est fragile et peut être endommagé s'il est forcé. Faites plus particulièrement
attention au cours du retrait du cache de la charnière.
1 Suivez les procédures de la section « Avant de commencer » à la page 111.
2 Retirez la batterie (reportez-vous à la section « Remplacement de la batterie » à la page 41).
3 Retirez les deux vis de la baie de batterie.
1 câbles d'antenne (2)
1128 Ajout et remplacement de pièces
4 Remettez l'ordinateur à l'endroit et ouvrez entièrement l'écran (180 degrés) afin qu'il repose sur votre
surface de travail.
AVIS : Pour éviter d'endommager le cache de la charnière, ne soulevez pas le cache des deux côtés
simultanément.
5 Insérez une pointe en plastique dans l'encoche pour soulever le cache de la charnière du côté droit.
6 Faites glisser le cache de la charnière de droite à gauche, vers le haut et retirez-le.
1 vis (2)
1 cache de la charnière 2 encoche
1
1
2Ajout et remplacement de pièces 129
Remise en place du cache de la charnière
1 Mettez le coin gauche du cache en place.
2 Appuyez de gauche à droite sur le cache jusqu'à ce qu'il s'enclenche.
3 Fermez l'écran et retournez l'ordinateur.
4 Remettez en place les deux vis dans la baie de batterie.
5 Remettez la batterie en place (reportez-vous à la section « Remplacement de la batterie » à la page 41).
Clavier
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
AVIS : Pour éviter une décharge électrostatique, raccordez-vous à la masse à l'aide d'un bracelet antistatique ou
en touchant périodiquement une surface métallique non peinte (par exemple un connecteur sur le panneau arrière
de l'ordinateur).
AVIS : Pour éviter d'endommager la carte système, vous devez retirer la batterie principale avant d'intervenir à
l'intérieur de l'ordinateur.
Retrait du clavier
1 Suivez les procédures décrites dans la section « Avant de commencer » à la page 111.
2 Retirez le cache de la charnière. Reportez-vous à la section « Cache de la charnière » à la page 127.
AVIS : Les touches du clavier sont fragiles, se déboîtent facilement et sont difficiles à remettre en place. Faites
plus particulièrement attention au cours du retrait et de la manipulation du clavier.
3 Soulevez le clavier et maintenez-le soulevé et légèrement vers l'avant pour pouvoir accéder au
connecteur du clavier.
4 Tirez sur le levier du connecteur de la carte système pour déconnecter le câble du clavier de la carte
système.130 Ajout et remplacement de pièces
Remise en place du clavier
AVIS : Pour éviter de rayer le repose-mains lors de la remise en place du clavier, attachez les six languettes
situées à l'avant du clavier dans le repose-mains, puis fixez le clavier.
1 Connectez le câble du clavier à la carte système.
2 Sécurisez le câble du clavier et le levier sur le connecteur de la carte système.
3 Placez les six languettes situées à l'avant du clavier dans le repose-mains.
Carte interne dotée de la technologie sans fil Bluetooth®
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
AVIS : Pour éviter une décharge électrostatique, raccordez-vous à la masse à l'aide d'un bracelet antistatique ou
en touchant périodiquement une surface métallique non peinte (par exemple un connecteur sur le panneau arrière
de l'ordinateur).
AVIS : Pour éviter d'endommager la carte système, vous devez retirer la batterie principale avant d'intervenir à
l'intérieur de l'ordinateur.
1 clavier 2 câble du clavier 3 levier du connecteur de la carte système
4 languettes (6)
4
1
3
2Ajout et remplacement de pièces 131
La carte dotée de la technologie sans fil Bluetooth est déjà installée sur votre système si vous l'avez
commandée avec votre ordinateur.
1 Suivez les procédures décrites dans la section « Avant de commencer » à la page 111.
2 Desserrez les vis captives du cache du modem/de la carte Mini/du sans fil, puis retirez le cache.
3 Retirez la vis de fixation du porte-carte.
4 Tirez le porte-carte hors du compartiment afin de pouvoir déconnecter la carte de son câble et la retirer
de l'ordinateur.
5 Pour remettre la carte en place, connectez la carte au câble.
6 Puis, insérez-la avec précaution dans le porte-carte et introduisez ce dernier dans le compartiment.
7 Remettez la vis de fixation du porte-carte en place.
1 vis 2 porte-carte 3 carte
4 connecteur de carte
1
4 3
2132 Ajout et remplacement de pièces
Pile bouton
Retrait de la pile bouton
PRÉCAUTION : Avant d'effectuer les procédures suivantes, consultez et respectez les consignes de sécurité du
Guide d'information sur le produit.
AVIS : Pour éviter une décharge électrostatique, raccordez-vous à la masse à l'aide d'un bracelet antistatique ou
en touchant régulièrement une surface métallique non peinte (par exemple, le panneau arrière de l'ordinateur).
AVIS : Pour éviter d'endommager la carte système, vous devez retirer la batterie principale avant d'intervenir à
l'intérieur de l'ordinateur.
1 Suivez les procédures décrites dans la section « Avant de commencer » à la page 111.
2 Retirez le cache de la charnière (reportez-vous à la page 127).
3 Retirez le clavier (reportez-vous à la page 129).
4 À l'aide d'une pointe en plastique, soulevez la pile afin de l'extraire de la carte système.
Remise en place de la pile bouton
Lorsque vous remettez la pile bouton en place, insérez-la dans le support circulaire avec le côté positif
vers le haut, et enfoncez-la doucement jusqu'à ce qu'elle soit bien en place.
1 pile bouton
1Fonctions Dell™ QuickSet 133
Fonctions Dell™ QuickSet
REMARQUE : Cette fonction peut ne pas être disponible sur votre ordinateur.
Dell™ QuickSet vous permet de configurer et d'afficher facilement les paramètres suivants :
• Connectivité réseau
• Gestion de l'alimentation
• Écran
• Informations système
En fonction de ce que vous souhaitez faire dans Dell™ QuickSet, vous pouvez lancer cette
application en cliquant, en double-cliquant ou en cliquant avec le bouton droit de la souris sur l'icône
QuickSet, , dans la barre des tâches de Microsoft® Windows®. La barre des tâches se trouve
dans le coin inférieur droit de votre écran.
Pour plus d'informations sur QuickSet, cliquez avec le bouton droit de la souris sur l'icône QuickSet
et sélectionnez Aide.134 Fonctions Dell™ QuickSetVoyager avec votre ordinateur 135
Voyager avec votre ordinateur
Identification de l'ordinateur
• Attachez une étiquette avec votre nom ou votre carte de visite à votre ordinateur.
• Notez votre numéro de service et gardez-le en lieu sûr, dans un endroit autre que près de
l'ordinateur ou de la sacoche de transport.
• Utilisez votre numéro de service si vous devez reporter la perte ou le vol de votre ordinateur à la
police et à Dell.
• Créez un fichier sur le bureau Microsoft® Windows® et nommez-le si_trouvé. Placez dans ce
fichier des informations, telles que vos nom, adresse et numéro de téléphone.
• Contactez votre compagnie de carte de crédit et demandez-lui si elle offre des étiquettes avec
identification codée.
Emballage de l'ordinateur
• Retirez tous les périphériques externes connectés à l'ordinateur et stockez-les en lieu sûr.
Débranchez tous les câbles reliés aux cartes PC installées et retirez les cartes PC étendues
(« Utilisation de cartes ExpressCard » à la page 65).
• Pour alléger l'ordinateur autant que possible, remplacez les périphériques installés dans la baie
modulaire par le module de voyage Dell TravelLite™.
• Chargez complètement la batterie principale et toutes les batteries de secours que vous pensez
emporter.
• Éteignez l'ordinateur.
• Débranchez l'adaptateur secteur.
AVIS : Lorsque vous fermez l'écran, les objets laissés sur le clavier ou le repose-mains risquent
d'endommager l'écran.
• Retirez tous objets du clavier et du repose-mains, comme les trombones, les stylos et les papiers,
puis fermez l'écran.
• Utilisez la sacoche de transport Dell™ (en option) pour emballer l'ordinateur et ses accessoires en
toute sécurité.
• Évitez d'emballer l'ordinateur avec des articles tels que crème à raser, eau de Cologne, parfum ou
nourriture.136 Voyager avec votre ordinateur
AVIS : Si l'ordinateur a été exposé à des températures extrêmes, laissez-le s'acclimater pendant une heure à la
température ambiante avant de l'allumer.
• Protégez l'ordinateur, les batteries et le disque dur contre des risques tels que les températures
extrêmes, la surexposition à la lumière, la saleté, la poussière ou les liquides.
• Calez bien l'ordinateur afin d'éviter qu'il ne se déplace dans le coffre de votre voiture ou dans un
compartiment à bagages situé en hauteur.
Conseils de voyage
AVIS : Pour éviter de perdre des données, ne déplacez pas l'ordinateur lorsque vous utilisez le lecteur optique.
AVIS : N'enregistrez pas votre ordinateur avec vos bagages.
• Pensez à désactiver l'activité réseau sans fil sur votre ordinateur afin d'optimiser l'autonomie de la
batterie. Pour désactiver l'activité sans fil, appuyez sur .
• Pensez à modifier vos options de gestion de l'alimentation (reportez-vous à la section « Configuration
des paramètres de gestion de l'alimentation » à la page 41) afin d'optimiser l'autonomie de la batterie.
• Si vous voyagez à l'étranger, emmenez une preuve de propriété ou de votre droit à utiliser l'ordinateur
s'il appartient à votre société pour accélérer le passage de la douane. Cherchez des informations auprès
des autorités douanières des pays que vous pensez visiter et envisagez d'acquérir un carnet
international (appelé également passeport de marchandises) auprès de votre gouvernement.
• Renseignez-vous sur le type de prises secteur utilisées dans les pays où vous vous rendez et munissezvous des adaptateurs appropriés.
• Les détenteurs de cartes de crédit doivent se renseigner auprès de leur compagnie de crédit au sujet de
l'assistance en cas d'urgence à l'étranger proposée aux utilisateurs d'ordinateurs portables.
Transport aérien
AVIS : Ne faites jamais passer votre ordinateur dans un détecteur de métal. Vous pouvez faire passer l'ordinateur
dans un détecteur à rayons X ou le faire inspecter manuellement.
• Assurez-vous d'avoir une batterie chargée sous la main au cas où l'on vous demanderait d'allumer
l'ordinateur.
• Avant de pénétrer dans l'avion, assurez-vous que l'utilisation d'un ordinateur est permise. Certaines
compagnies aériennes interdisent l'usage d'appareils électroniques pendant le vol. Toutes les
compagnies aériennes interdisent l'usage de tels dispositifs pendant les phases de décollage et
d'atterrissage.Contacter Dell 137
Contacter Dell
Vous pouvez contacter Dell par voie électronique, par l'intermédiaire des sites Web suivants :
• www.dell.com
• support.dell.com (support)
Pour les adresses Internet de votre pays, recherchez la section appropriée du pays dans le tableau cidessous.
REMARQUE : Les numéros verts sont valables dans le pays pour lequel ils sont renseignés.
REMARQUE : Dans certains pays, le support spécifique aux ordinateurs Dell XPS™ est disponible via un
numéro de téléphone différent, répertorié pour les pays participants. Si vous ne trouvez pas de numéro de
téléphone répertorié spécifique aux ordinateurs XPS, contactez le service de support de Dell, au numéro
indiqué, et l'on fera suivre votre appel de manière appropriée.
Si vous devez contacter Dell, utilisez les adresses électroniques, les numéros de téléphone et les
indicatifs fournis dans le tableau ci-dessous. Si vous avez besoin d'assistance pour connaître les
indicatifs à utiliser, contactez un opérateur local ou international.
REMARQUE : Les coordonnées fournies étaient correctes au jour d'impression de ce document et sont
sujettes à modification sans préavis.
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts
Afrique du Sud (Johannesburg)
Indicatif international :
09/091
Indicatif national : 27
Indicatif de la ville : 11
Site Web : support.euro.dell.com
E-mail : dell_za_support@dell.com
File d'attente Gold 011 709 7713
Support technique 011 709 7710
Service clientèle 011 709 7707
Ventes 011 709 7700
Fax 011 706 0495
Standard 011 709 7700138 Contacter Dell
Allemagne (Francfort)
Indicatif international : 00
Indicatif national : 49
Indicatif de la ville : 69
Site Web : support.euro.dell.com
E-mail : tech_support_central_europe@dell.com
Support technique pour XPS 069 9792 7222
Support technique pour tous les autres ordinateurs
Dell
069 9792-7200
Service clientèle pour le grand public et les PME 0180-5-224400
Service clientèle segment International 069 9792-7320
Service clientèle comptes privilégiés 069 9792-7320
Service clientèle grands comptes 069 9792-7320
Service clientèle comptes publics 069 9792-7320
Standard 069 9792-7000
Amérique Latine Support technique clients (Austin, Texas, ÉtatsUnis)
512 728-4093
Service clientèle (Austin, Texas, États-Unis) 512 728-3619
Fax (Support technique et Service clientèle)
(Austin, Texas, États-Unis)
512 728-3883
Ventes (Austin, Texas, États-Unis) 512 728-4397
Fax pour les ventes (Austin, Texas, États-Unis) 512 728-4600
ou 512 728-3772
Anguilla Site Web : www.dell.com.ai
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 800-335-0031
Antigua-et-Barbuda Site Web : www.dell.com.ag
E-mail : la-techsupport@dell.com
Support technique général 1-800-805-5924
Antilles Néerlandaises E-mail : la-techsupport@dell.com
Support technique général 001-800-882-1519
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 139
Argentine (Buenos Aires)
Indicatif international : 00
Indicatif national : 54
Indicatif de la ville : 11
Site Web : www.dell.com.ar
E-mail : la-techsupport@dell.com
E-mail pour ordinateurs de bureau et portables :
la-techsupport@dell.com
E-mail pour serveurs et produits de stockage
EMC® :
la_enterprise@dell.com
Service clientèle numéro vert : 0-800-444-0730
Support technique numéro vert : 0-800-444-0733
Services de support technique numéro vert : 0-800-444-0724
Ventes 0-810-444-3355
Aruba Site Web : www.dell.com.aw
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 800-1578
Australie (Sydney)
Indicatif international : 0011
Indicatif national : 61
Indicatif de la ville : 2
Site Web : support.ap.dell.com
E-mail : support.ap.dell.com/contactus
Support technique général 13DELL-133355
Autriche (Vienne)
Indicatif international : 900
Indicatif national : 43
Indicatif de la ville : 1
Site Web : support.euro.dell.com
E-mail : tech_support_central_europe@dell.com
Ventes aux grand public et PME 0820 240 530 00
Fax pour le grand public et les PME 0820 240 530 49
Service clientèle pour le grand public et les PME 0820 240 530 14
Service clientèle Comptes privilégiés/Entreprises 0820 240 530 16
Support technique de XPS 0820 240 530 81
Support aux grand public et PME pour tous les
autres ordinateurs Dell
0820 240 530 17
Support Comptes privilégiés/Entreprises 0820 240 530 17
Standard 0820 240 530 00
Bahamas Site Web : www.dell.com.bs
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 1-866-278-6818
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts140 Contacter Dell
Belgique (Bruxelles)
Indicatif international : 00
Indicatif national : 32
Indicatif de la ville : 2
Site Web : support.euro.dell.com
Support technique pour XPS 02 481 92 96
Support technique pour tous les autres ordinateurs
Dell
02 481 92 88
Télécopieur pour support technique 02 481 92 95
Service clientèle 02 713 15 65
Ventes aux grandes entreprises 02 481 91 00
Fax 02 481 92 99
Standard 02 481 91 00
Bermudes Site Web : www.dell.com/bm
E-mail : la-techsupport@dell.com
Support technique général 1-877-890-0751
Bolivie Site Web : www.dell.com/bo
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 800-10-0238
Brésil
Indicatif international : 00
Indicatif national : 55
Indicatif de la ville : 51
Site Web : www.dell.com/br
E-mail : la-techsupport@dell.com
Support clients, support technique 0800 90 3355
Fax du support technique 51 3481 5470
Fax du Service clientèle 51 3481 5480
Ventes 0800 90 3390
Brunei
Indicatif national : 673
Support technique (Penang, Malaisie) 604 633 4966
Service clientèle (Penang, Malaisie) 604 633 4888
Ventes aux particuliers (Penang, Malaisie) 604 633 4955
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 141
Canada (North York, Ontario)
Indicatif international : 011
État des commandes en ligne : www.dell.ca/ostatus
AutoTech (Support matériel et garantie
automatisé)
numéro vert : 1-800-247-9362
Service clientèle (grand public et PME) numéro vert : 1-800-847-4096
Service clientèle (grands comptes et
gouvernement)
numéro vert : 1-800-326-9463
Service clientèle (imprimantes, projecteurs,
téléviseurs, ordinateurs de poche, jukebox
numériques et ordinateurs sans fil)
numéro vert : 1-800-847-4096
Support garantie de matériel (ventes au grand
public/PME)
numéro vert : 1-800-906-3355
Support garantie de matériel (grands comptes et
gouvernement)
numéro vert : 1-800-387-5757
Support garantie de matériel (imprimantes,
projecteurs, téléviseurs, ordinateurs de poche,
jukebox numériques et ordinateurs sans fil)
1-877-335-5767
Ventes aux grand public et PME numéro vert : 1-800-387-5752
Ventes (grands comptes et gouvernement) numéro vert : 1-800-387-5755
Vente de pièces et Vente de service étendu 1866 440 3355
Chili (Santiago)
Indicatif national : 56
Indicatif de la ville : 2
Site Web : www.dell.com/cl
E-mail : la-techsupport@dell.com
Ventes et support clients numéro vert : 1230-020-4823
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts142 Contacter Dell
Chine (Xiamen)
Indicatif national : 86
Indicatif de la ville : 592
Site Web du Support technique :
support.dell.com.cn
E-mail (Support technique) :
cn_support@dell.com
E-mail du Service clientèle :
customer_cn@dell.com
Fax du support technique 592 818 1350
Support technique (Dell™ Dimension™ et
Inspiron)
numéro vert : 800 858 2968
Support technique (OptiPlex™, Latitude™ et Dell
Precision™)
numéro vert : 800 858 0950
Support technique (serveurs et stockage) numéro vert : 800 858 0960
Support technique (projecteurs, PDA,
commutateurs, routeurs, etc.)
numéro vert : 800 858 2920
Support technique (imprimantes) numéro vert : 800 858 2311
Service clientèle numéro vert : 800 858 2060
Fax du Service clientèle 592 818 1308
Grand public et PME numéro vert : 800 858 2222
Division des comptes privilégiés numéro vert : 800 858 2557
Comptes grandes entreprises - GCP numéro vert : 800 858 2055
Comptes clés des grandes entreprises numéro vert : 800 858 2628
Comptes grandes entreprises - Nord numéro vert : 800 858 2999
Comptes grandes entreprises Administration et
éducation - Nord
numéro vert : 800 858 2955
Comptes grandes entreprises - Est numéro vert : 800 858 2020
Comptes grandes entreprises Administration et
éducation - Est
numéro vert : 800 858 2669
Équipe File d'attente des comptes grandes
entreprises
numéro vert : 800 858 2572
Comptes grandes entreprises - Sud numéro vert : 800 858 2355
Comptes grandes entreprises - Ouest numéro vert : 800 858 2811
Comptes grandes entreprises Pièces détachées numéro vert : 800 858 2621
Colombie Site Web : www.dell.com/cl
E-mail : la-techsupport@dell.com
Support technique général 01-800-915-4755
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 143
Corée (Séoul)
Indicatif international : 001
Indicatif national : 82
Indicatif de la ville : 2
E-mail : krsupport@dell.com
Support technique numéro vert : 080-200-3800
Support (Dimension, PDA, Électronique et
accessoires)
numéro vert : 080-200-3801
Ventes numéro vert : 080-200-3600
Fax 2194-6202
Standard 2194-6000
Costa Rica Site Web : www.dell.com/cr
E-mail : la-techsupport@dell.com
Support technique général 0800-012-0231
Danemark (Copenhague)
Indicatif international : 00
Indicatif national : 45
Site Web : support.euro.dell.com
Support technique pour XPS 7010 0074
Support technique pour tous les autres ordinateurs
Dell
7023 0182
Service clientèle (relations) 7023 0184
Service clientèle pour le grand public et les PME 3287 5505
Standard (relations) 3287 1200
Standard Fax (relations) 3287 1201
Standard (grand public et PME) 3287 5000
Fax (grand public et PME) 3287 5001
Dominique Site Web : www.dell.com/dm
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 1-866-278-6821
Équateur Site Web : www.dell.com/ec
E-mail : la-techsupport@dell.com
Support technique général (appel de Quito) numéro vert :
999-119-877-655-3355
Support technique général (appel de Guayaquil) numéro vert :
1800-999-119-877-655-3355
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts144 Contacter Dell
Espagne (Madrid)
Indicatif international : 00
Indicatif national : 34
Indicatif de la ville : 91
Site Web : support.euro.dell.com
Grand public et PME
Support technique 902 100 130
Service clientèle 902 118 540
Ventes 902 118 541
Standard 902 118 541
Fax 902 118 539
Grandes entreprises
Support technique 902 100 130
Service clientèle 902 115 236
Standard 91 722 92 00
Fax 91 722 95 83
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 145
États-Unis (Austin, Texas)
Indicatif international : 011
Indicatif national : 1
Service d'état des commandes automatisé numéro vert : 1-800-433-9014
AutoTech (ordinateurs portables et de bureau) numéro vert : 1-800-247-9362
Support matériel et garantie (téléviseurs,
imprimantes et projecteurs Dell) pour la clientèle
relationnelle
numéro vert : 1-877-459-7298
Support des produits SPS destinés aux clients
américains
numéro vert : 1-800-232-8544
Support consommateur (Activités à domicile et
activités professionnelles à domicile) pour tous les
autres produits Dell
numéro vert : 1-800-624-9896
Service clientèle numéro vert : 1-800-624-9897
Clients du programme d'achats par les employés
(EPP)
numéro vert : 1-800-695-8133
Site Web des services financiers :
www.dellfinancialservices.com
Services financiers (leasing/prêts) numéro vert : 1-877-577-3355
Services financiers (Comptes privilégiés Dell
[DPA])
numéro vert : 1-800-283-2210
Secteur privé
Support et Service clientèle numéro vert : 1-800-456-3355
Clients du programme d'achats par les employés
(EPP)
numéro vert : 1-800-695-8133
Support pour imprimantes, projecteurs, PDA et
lecteurs MP3
numéro vert : 1-877-459-7298
Public (gouvernement, enseignement et services de la santé)
Support et Service clientèle numéro vert : 1-800-456-3355
Clients du programme d'achats par les employés
(EPP)
numéro vert : 1-800-695-8133
Ventes Dell numéro vert : 1-800-289-3355
ou numéro vert : 1-800-879-3355
Points de vente Dell (ordinateurs Dell recyclés) numéro vert : 1-888-798-7561
Ventes de logiciels et de périphériques numéro vert : 1-800-671-3355
Ventes de pièces au détail numéro vert : 1-800-357-3355
Service étendu et ventes sous garantie numéro vert : 1-800-247-4618
Fax numéro vert : 1-800-727-8320
Services Dell pour les sourds, les malentendants ou
les personnes ayant des problèmes d'élocution
numéro vert : 1-877-DELLTTY
(1-877-335-5889)
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts146 Contacter Dell
Finlande (Helsinki)
Indicatif international : 990
Indicatif national : 358
Indicatif de la ville : 9
Site Web : support.euro.dell.com
E-mail : fi_support@dell.com
Support technique 0207 533 555
Service clientèle 0207 533 538
Standard 0207 533 533
Ventes (moins de 500 employés) 0207 533 540
Fax 0207 533 530
Ventes (plus de 500 employés) 0207 533 533
Fax 0207 533 530
France (Paris) (Montpellier)
Indicatif international : 00
Indicatif national : 33
Indicatifs de la ville : (1) (4)
Site Web : support.euro.dell.com
Grand public et PME
Support technique pour XPS 0825 387 129
Support technique pour tous les autres ordinateurs
Dell
0825 387 270
Service clientèle 0825 823 833
Standard 0825 004 700
Standard (appels extérieurs à la France) 04 99 75 40 00
Ventes 0825 004 700
Fax 0825 004 701
Fax (appels extérieurs à la France) 04 99 75 40 01
Grandes entreprises
Support technique 0825 004 719
Service clientèle 0825 338 339
Standard 01 55 94 71 00
Ventes 01 55 94 71 00
Fax 01 55 94 71 01
Grèce
Indicatif international : 00
Indicatif national : 30
Site Web : support.euro.dell.com
Support technique 00800-44 14 95 18
Support technique Gold Service 00800-44 14 00 83
Standard 2108129810
Standard Gold Service 2108129811
Ventes 2108129800
Fax 2108129812
Grenade E-mail : la-techsupport@dell.com
Support technique général numéro vert : 1-866-540-3355
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 147
Guatemala E-mail : la-techsupport@dell.com
Support technique général 1-800-999-0136
Guyane E-mail : la-techsupport@dell.com
Support technique général numéro vert : 1-877-270-4609
Hong Kong
Indicatif international : 001
Indicatif national : 852
Site Web : support.ap.dell.com
E-mail (Support technique) :
HK_support@Dell.com
Support technique (Dimension et Inspiron) 2969 3188
Support technique (OptiPlex, Latitude et Dell
Precision)
2969 3191
Support technique (PowerApp™, PowerEdge™,
PowerConnect™ et PowerVault™)
2969 3196
Service clientèle 3416 0910
Comptes grandes entreprises 3416 0907
Programmes clients internationaux 3416 0908
Division des moyennes entreprises 3416 0912
Division du grand public et des PME 2969 3105
Îles Caïmans E-mail : la-techsupport@dell.com
Support technique général 1-877-262-5415
Îles Turks et Caicos Site Web : www.dell.com/tc
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 1-877-441-4735
Îles Vierges Britanniques Support technique général numéro vert : 1-866-278-6820
Îles Vierges (États-Unis) E-mail : la-techsupport@dell.com
Support technique général 1-877-702-4288
Inde E-mail : india_support_desktop@dell.com
india_support_notebook@dell.com
india_support_Server@dell.com
Support technique 1600338045
et 1600448046
Ventes (Comptes grandes entreprises) 1600 33 8044
Ventes (Grand public et PME) 1600 33 8046
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts148 Contacter Dell
Irlande (Cherrywood)
Indicatif international : 00
Indicatif national : 353
Indicatif de la ville : 1
Site Web : support.euro.dell.com
E-mail : dell_direct_support@dell.com
Ventes
Ventes pour l'Irlande 01 204 4444
Dell Outlet 1850 200 778
Support de commande en ligne 1850 200 778
Service clientèle
Service clientèle pour les particuliers 01 204 4014
Service clientèle pour les petites entreprises 01 204 4014
Service clientèle pour les entreprises 1850 200 982
Support technique
Support technique spécifique aux ordinateurs XPS 1850 200 722
Support technique pour tous les autres ordinateurs
Dell
1850 543 543
Généralités
Fax des relations ventes 01 204 0103
Standard 01 204 4444
Service clientèle pour le Royaume-Uni (interne au
Royaume-Uni uniquement)
0870 906 0010
Service clientèle pour les entreprises (interne au
Royaume-Uni uniquement)
0870 907 4499
Ventes pour le Royaume-Uni (interne au RoyaumeUni uniquement)
0870 907 4000
Italie (Milan)
Indicatif international : 00
Indicatif national : 39
Indicatif de la ville : 02
Site Web : support.euro.dell.com
Grand public et PME
Support technique 02 577 826 90
Service clientèle 02 696 821 14
Fax 02 696 821 13
Standard 02 696 821 12
Grandes entreprises
Support technique 02 577 826 90
Service clientèle 02 577 825 55
Fax 02 575 035 30
Standard 02 577 821
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 149
Jamaïque E-mail : la-techsupport@dell.com
Support technique général (appel à partir de la
Jamaïque uniquement)
1-800-440-9205
Japon (Kawasaki)
Indicatif international : 001
Indicatif national : 81
Indicatif de la ville : 44
Site Web : support.jp.dell.com
Support technique (serveurs) numéro vert : 0120-198-498
Support technique à l'extérieur du Japon (serveurs) 81-44-556-4162
Support technique (Dimension et Inspiron) numéro vert : 0120-198-226
Support technique à l'extérieur du Japon
(Dimension et Inspiron)
81-44-520-1435
Support technique (Dell Precision, OptiPlex et
Latitude)
numéro vert : 0120-198-433
Support technique à l'extérieur du Japon (Dell
Precision, OptiPlex et Latitude)
81-44-556-3894
Support technique (PDA, projecteurs,
imprimantes, routeurs)
numéro vert : 0120-981-690
Support technique en dehors du Japon (PDA,
projecteurs, imprimantes, routeurs)
81-44-556-3468
Service Faxbox 044-556-3490
Service de commandes automatisé 24 heures sur 24 044-556-3801
Service clientèle 044-556-4240
Division Ventes aux entreprises (jusqu'à 400
employés)
044-556-1465
Division Ventes aux Comptes privilégiés (plus de
400 employés)
044-556-3433
Ventes secteur public (agences gouvernementales,
établissements d'enseignement et institutions
médicales)
044-556-5963
Segment International - Japon 044-556-3469
Utilisateur individuel 044-556-1760
Standard 044-556-4300
La Barbade Site Web : www.dell.com/bb
E-mail : la-techsupport@dell.com
Support technique général 1-800-534-3142
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts150 Contacter Dell
Luxembourg
Indicatif international : 00
Indicatif national : 352
Site Web : support.euro.dell.com
Support technique 342 08 08 075
Ventes aux grand public et PME +32 (0)2 713 15 96
Ventes aux grandes entreprises 26 25 77 81
Service clientèle +32 (0)2 481 91 19
Fax 26 25 77 82
Macao
Indicatif national : 853
Support technique numéro vert : 0800 105
Service clientèle (Xiamen, Chine) 34 160 910
Ventes aux particuliers (Xiamen, Chine) 29 693 115
Malaisie (Penang)
Indicatif international : 00
Indicatif national : 60
Indicatif de la ville : 4
Site Web : support.ap.dell.com
Support technique (Dell Precision, OptiPlex et
Latitude)
numéro vert : 1 800 880 193
Support technique (Dimension, Inspiron et
Électronique et accessoires)
numéro vert : 1 800 881 306
Support technique (PowerApp, PowerEdge,
PowerConnect et PowerVault)
numéro vert : 1800 881 386
Service clientèle numéro vert : 1800 881 306
(option 6)
Ventes aux particuliers numéro vert : 1 800 888 202
Ventes aux grandes entreprises numéro vert : 1 800 888 213
Mexique
Indicatif international : 00
Indicatif national : 52
E-mail : la-techsupport@dell.com
Support technique clients 001-877-384-8979
ou 001-877-269-3383
Ventes 50-81-8800
ou 01-800-888-3355
Service clientèle 001-877-384-8979
ou 001-877-269-3383
Groupe principal 50-81-8800
ou 01-800-888-3355
Montserrat E-mail : la-techsupport@dell.com
Support technique général numéro vert : 1-866-278-6822
Nicaragua E-mail : la-techsupport@dell.com
Support technique général 001-800-220-1377
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 151
Norvège (Lysaker)
Indicatif international : 00
Indicatif national : 47
Site Web : support.euro.dell.com
Support technique pour XPS 815 35 043
Support technique pour tous les autres ordinateurs
Dell
671 16882
Suivi clientèle 671 17575
Service clientèle pour le grand public et les PME 23162298
Standard 671 16800
Standard Fax 671 16865
Nouvelle-Zélande
Indicatif international : 00
Indicatif national : 64
Site Web : support.ap.dell.com
E-mail : support.ap.dell.com/contactus
Support technique général 0800 441 567
Panama E-mail : la-techsupport@dell.com
Support technique général 011-800-507-1264
Pays-Bas (Amsterdam)
Indicatif international : 00
Indicatif national : 31
Indicatif de la ville : 20
Site Web : support.euro.dell.com
Support technique pour XPS 020 674 45 94
Support technique pour tous les autres ordinateurs
Dell
020 674 45 00
Fax du support technique 020 674 47 66
Service clientèle pour le grand public et les PME 020 674 42 00
Suivi clientèle 020 674 4325
Ventes aux grand public et PME 020 674 55 00
Relations ventes 020 674 50 00
Fax des ventes aux grand public et PME 020 674 47 75
Fax des relations ventes 020 674 47 50
Standard 020 674 50 00
Fax du standard 020 674 47 50
Pays du Pacifique et du Sud-est
Asiatique
Support technique, service clientèle et ventes
(Penang, Malaisie)
604 633 4810
Pérou E-mail : la-techsupport@dell.com
Support technique général 0800-50-669
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts152 Contacter Dell
Pologne (Varsovie)
Indicatif international : 011
Indicatif national : 48
Indicatif de la ville : 22
Site Web : support.euro.dell.com
E-mail : pl_support_tech@dell.com
Service clientèle (téléphone) 57 95 700
Service clientèle 57 95 999
Ventes 57 95 999
Service clientèle (Fax) 57 95 806
Réception (Fax) 57 95 998
Standard 57 95 999
Portugal
Indicatif international : 00
Indicatif national : 351
Site Web : support.euro.dell.com
Support technique 707200149
Service clientèle 800 300 413
Ventes 800 300 410 ou 800 300 411 ou
800 300 412 ou 21 422 07 10
Fax 21 424 01 12
Porto Rico E-mail : la-techsupport@dell.com
Support technique général 1-877-537-3355
République Dominicaine Site Web : www.dell.com/do
E-mail : la-techsupport@dell.com
Support technique général 1-800-156-1588
République Tchèque (Prague)
Indicatif international : 00
Indicatif national : 420
Site Web : support.euro.dell.com
E-mail : czech_dell@dell.com
Support technique 22537 2727
Service clientèle 22537 2707
Fax 22537 2714
Télécopieur pour support technique 22537 2728
Standard 22537 2711
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 153
Royaume-Uni (Bracknell)
Indicatif international : 00
Indicatif national : 44
Indicatif de la ville : 1344
Site Web : support.euro.dell.com
E-mail : dell_direct_support@dell.com
Site Web du Service clientèle :
support.euro.dell.com/uk/en/ECare/form/home.asp
Ventes
Ventes aux grand public et PME 0870 907 4000
Ventes aux grandes entreprises/secteur public 01344 860 456
Service clientèle
Service clientèle pour le grand public et les PME 0870 906 0010
Service clientèle pour les entreprises 01344 373 185
Service clientèle pour les comptes privilégiés
(500–5000 employés)
0870 906 0010
Service clientèle Comptes internationaux 01344 373 186
Service clientèle Gouvernement central 01344 373 193
Service clientèle Administration locale et
Enseignement
01344 373 199
Service clientèle (Santé) 01344 373 194
Support technique
Support technique spécifique aux ordinateurs XPS 0870 366 4180
Support technique (Entreprises/Comptes
privilégiés/Division Comptes privilégiés [plus de
1000 employés])
0870 908 0500
Support technique pour tous les autres produits 0870 353 0800
Généralités
Fax pour le grand public et les PME 0870 907 4006
Salvador Site Web : www.dell.com/ec
E-mail : la-techsupport@dell.com
Support technique général 800-6132
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts154 Contacter Dell
Singapour (Singapour)
Indicatif international : 005
Indicatif national : 65
REMARQUE : Les numéros de téléphone mentionnés
ici doivent être utilisés depuis Singapour ou la
Malaisie uniquement.
Site Web : support.ap.dell.com
Support technique (Dimension, Inspiron et
Électronique et accessoires)
numéro vert : 1 800 394 7430
Support technique (OptiPlex, Latitude et Dell
Precision)
numéro vert : 1 800 394 7488
Support technique (PowerApp, PowerEdge,
PowerConnect et PowerVault)
numéro vert : 1 800 394 7478
Service clientèle numéro vert : 1 800 394 7430
(option 6)
Ventes aux particuliers numéro vert : 1 800 394 7412
Ventes aux grandes entreprises numéro vert : 1 800 394 7419
Slovaquie (Prague)
Indicatif international : 00
Indicatif national : 421
Site Web : support.euro.dell.com
E-mail : czech_dell@dell.com
Support technique 02 5441 5727
Service clientèle 420 22537 2707
Fax 02 5441 8328
Fax du Support technique 02 5441 8328
Standard (Ventes) 02 5441 7585
St- Kitts-et-Nevis Site Web : www.dell.com/kn
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 1-866-540-3355
St- Lucie Site Web : www.dell.com/lc
E-mail : la-techsupport@dell.com
Support technique général 1-800-882-1521
St- Vincent-et-les Grenadines Site Web : www.dell.com/vc
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 1-877-441-4740
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsContacter Dell 155
Suède (Upplands Vasby)
Indicatif international : 00
Indicatif national : 46
Indicatif de la ville : 8
Site Web : support.euro.dell.com
Support technique pour XPS 0771 340 340
Support technique pour tous les autres ordinateurs
Dell
08 590 05 199
Suivi clientèle 08 590 05 642
Service clientèle pour le grand public et les PME 08 587 70 527
Support du programme d'achats par les employés
(EPP, Employee Purchase Program)
020 140 14 44
Fax du support technique 08 590 05 594
Ventes 08 590 05 185
Suisse (Genève)
Indicatif international : 00
Indicatif national : 41
Indicatif de la ville : 22
Site Web : support.euro.dell.com
E-mail : Tech_support_central_Europe@dell.com
Support technique pour XPS 0848 33 88 57
Support technique (grand public et PME) pour
tous les autres produits Dell
0844 811 411
Support technique (entreprises) 0844 822 844
Service clientèle (grand public et PME) 0848 802 202
Service clientèle (entreprises) 0848 821 721
Fax 022 799 01 90
Standard 022 799 01 01
Taïwan
Indicatif international : 002
Indicatif national : 886
Site Web : support.ap.dell.com
E-mail : ap_support@dell.com
Support technique (OptiPlex, Latitude, Inspiron,
Dimension et Électronique et accessoires)
numéro vert : 00801 86 1011
Support technique (PowerApp, PowerEdge,
PowerConnect et PowerVault)
numéro vert : 00801 60 1256
Service clientèle numéro vert : 00801 60 1250
(option 5)
Ventes aux particuliers numéro vert : 00801 65 1228
Ventes aux grandes entreprises numéro vert : 00801 651 227
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros verts156 Contacter Dell
Thaïlande
Indicatif international : 001
Indicatif national : 66
Site Web : support.ap.dell.com
Support technique (OptiPlex, Latitude et Dell
Precision)
numéro vert : 1800 0060 07
Support technique (PowerApp, PowerEdge,
PowerConnect et PowerVault)
numéro vert : 1800 0600 09
Service clientèle numéro vert : 1800 006 007
(option 7)
Ventes aux grandes entreprises numéro vert : 1800 006 009
Ventes aux particuliers numéro vert : 1800 006 006
Trinité/Tobago Site Web : www.dell.com/tt
E-mail : la-techsupport@dell.com
Support technique général 1-800-805-8035
Uruguay Site Web : www.dell.com/uy
E-mail : la-techsupport@dell.com
Support technique général numéro vert : 000-413-598-2521
Venezuela Site Web : www.dell.com/ve
E-mail : la-techsupport@dell.com
Support technique général 0800-100-4752
Pays (Ville)
Indicatifs d'accès international,
national et
de la ville
Nom de département ou zone de service,
site Web et adresse e-mail
Indicatifs de zone,
numéros locaux et
numéros vertsCaractéristiques 157
Caractéristiques
Processeur
Type de processeur Processeur Intel® Core™ Solo ou processeur
Intel® Core™ Duo
Mémoire cache L1 I-cache de 32 Ko x2
D-cache de 32 Ko x2
Mémoire cache L2 2 Mo
Fréquence du bus externe (bus
frontal)
533 MHz et 667 MHz
Informations sur le système
Jeu de puces du système Mobile Intel 945 GM Express
Largeur du bus de données 64 bits
Largeur du bus de la mémoire DRAM Bus bicanal (2) 64 bits
Largeur du bus d'adresses du
processeur
32 bits
Flash EPROM 1 Mo
Bus graphique Interne
Bus PCI 32 bits
Carte ExpressCard
REMARQUE : Le logement de carte ExpressCard est conçu uniquement pour les
cartes ExpressCard. Il ne prend PAS en charge les cartes PC.
Contrôleur de la carte ExpressCard Intel ICH7M
Connecteur de la carte ExpressCard Un logement ExpressCard (54 mm)
Cartes prises en charge Carte ExpressCard/34 (34 mm) et
carte ExpressCard/54 (54 mm)
1,5 et 3,3 V
Taille du connecteur de la carte
ExpressCard
28 broches158 Caractéristiques
Lecteur de carte multimédia 5 en 1
Contrôleur de la carte mémoire
multimédia 5 en 1
Ricoh R5C832
Connecteur de la carte mémoire
multimédia 5 en 1
Connecteur de la carte combinée 5 en 1
Cartes prises en charge MS
MS Pro
SD/SDIO
MMC
xD
CF type I/II et IBM® Microdrive via une
carte ExpressCard
Taille du connecteur de la carte
mémoire multimédia 5 en 1
36,8 x 29,3 x 4,75 mm
Mémoire
Connecteur du module de mémoire Deux connecteurs SODIMM
Capacités du module de mémoire 256 Mo, 512 Mo, 1 Go et 2 Go
Type de mémoire DDR2 SODIMM 1,8 V
Mémoire minimale 256 Mo
Mémoire maximale 2 Go
Ports et connecteurs
Audio Connecteur de microphone, connecteur de
casque/haut-parleurs stéréo
IEEE 1394a Connecteur série à 4 broches
Carte Mini Un emplacement de carte Mini type IIIA
Modem Port RJ-11
Carte réseau Port RJ-45
Connecteur de sortie TV S-vidéo Connecteur mini-DIN à 7 broches
(adaptateur S-vidéo/composite)
USB Quatre connecteurs à 4 broches conformes à
la norme USB 2.0
Vidéo Connecteur à 15 trousCaractéristiques 159
Communications
Modem :
Type v.92 56K MDC
Contrôleur Softmodem
Interface Bus HDA interne
Carte réseau LAN Ethernet 10/100 sur la carte système
Sans fil Prise en charge des cartes Mini internes
Wi-Fi et de la technologie sans fil
Bluetooth®
Vidéo
Type de vidéo : Carte intégrée
Contrôleur vidéo Intel® GMA950
Mémoire vidéo Jusqu'à 224 Mo partagés si la mémoire totale
de l'ordinateur est de 512 Mo minimum,
jusqu'à 128 Mo partagés si la mémoire totale
de l'ordinateur est de 256 Mo
Interface LCD LVDS
Prise en charge TV NTSC/PAL
Audio
Type d'audio Bus HDA (High Definition Audio)
Contrôleur audio Sigmatel STAC9200
Conversion stéréo 24 bits (analogique-numérique et
numérique-analogique)
Interfaces :
Interne Bus HDA
Externe Connecteur de microphone (entrée),
connecteur de casque/de haut-parleurs
stéréo
Haut-parleur Deux haut-parleurs 4 ohms
Amplificateur de haut-parleur interne Canal de 1 W en 4 ohms
Contrôle du volume Raccourcis clavier, menus de programme,
boutons de commande multimédia160 Caractéristiques
Écran
Type (matrice active TFT) 14,1 pouces WXGA et
14,1 pouces WXGA+
Dimensions :
Hauteur 206 mm (8,11 pouces)
Largeur 320 mm (12,59 pouces)
Diagonale 357,74 mm (14,1 pouces)
Résolutions maximales :
WXGA
WXGA+
1280 sur 800 avec 262 144 couleurs
1440 sur 900 avec 262 144 couleurs
Taux de rafraîchissement 60 Hz
Angle de fonctionnement 0° (fermé) à 180 °
Angles de visualisation :
Horizontal ±40 ° (WXGA) en général
Vertical +15°/–30 ° (WXGA)
Taille du pixel :
WXGA
WXGA+
0,237 mm
0,211 mm
Boutons de réglage Possibilité de réglage de la luminosité à l'aide
de raccourcis clavier
Clavier
Nombre de touches 87 (États-Unis et Canada) ; 88 (Europe) ;
91 (Japon)
Disposition QWERTY/AZERTY/Kanji
Tablette tactile
Résolution X/Y (mode
Tablette graphique) 240 cpi
Taille :
Largeur Zone sensible de 73 mm (2,9 pouces)
Hauteur Rectangle de 42,9 mm (1,7 pouce)Caractéristiques 161
Batterie
Type lithium ion « intelligente » 6 cellules
lithium ion « intelligente » 9 cellules
Dimensions :
Profondeur 49 mm (1,93 pouce) (6 cellules)
60,1 mm (2,37 pouces) (9 cellules)
Hauteur 24 mm (0,94 pouce)
Largeur 206,8 mm (8,14 pouces)
Poids 0,32 kg (0,7 livres) (6 cellules)
0,48 kg (1,06 livres) (9 cellules)
Tension 11,1 VCC
Durée approximative de la charge :
Ordinateur éteint 2 heures (6 cellules)
3 heures (9 cellules)
Durée de fonctionnement L'autonomie de la batterie varie en fonction
de l'utilisation et peut être considérablement
réduite en cas d'utilisation intensive.
Reportez-vous à la section « Problèmes
d'alimentation » à la page 97.
Pour plus d'informations sur la durée de vie
de la batterie, reportez-vous à la section
« Utilisation d'une batterie » à la page 37.
Durée de service approximative 500 cycles de décharge/charge
Plage de températures :
Fonctionnement 0 ° à 35 °C (32 ° à 95 °F)
Stockage –40 ° à 65 °C (–40 ° à 149 °F)
Pile bouton CR-2032162 Caractéristiques
Adaptateur secteur
Tension d'entrée 90 à 264 VCA
Courant d'entrée (maximal) 1,5 A
Fréquence d'entrée 47 à 63 Hz
Courant de sortie 4,34 A (maximum à impulsion 4 secondes) ;
3,34 A (continu)
Alimentation de sortie 65 W
Tension de sortie nominale 19,5 +/–1,0 VCC
Dimensions :
Hauteur 28,2 mm (1,11 pouce)
Largeur 57,9 mm (2,28 pouces)
Profondeur 137,2 mm (5,4 pouces)
Poids (avec les câbles) 0,4 kg (0,9 livre)
Plage de températures :
Fonctionnement 0 ° à 35 °C (32 ° à 95 °F)
Stockage –40 ° à 65 °C (–40 ° à 149 °F)
Caractéristiques physiques
Hauteur 38,6 mm (1,52 pouce)
Largeur 330 mm (12,99 pouces)
Profondeur 243 mm (9,56 pouces)
Poids (avec batterie 6 cellules, lecteur
combiné CD-RW/DVD et disque dur
de 40 Go) :
Configurable jusqu'à moins de 2,5 kg (5,5 livres)Caractéristiques 163
Environnement de fonctionnement
Plage de températures :
Fonctionnement 0 ° à 35 °C (32 ° à 95 °F)
Stockage –40 ° à 65 °C (–40 ° à 149 °F)
Humidité relative (maximale) :
Fonctionnement 10 à 90 % (sans condensation)
Stockage 5 à 95 % (sans condensation)
Vibration maximale (avec un spectre
de vibration aléatoire simulant
l'environnement utilisateur) :
Fonctionnement 0,66 GRMS
Stockage 1,3 GRMS
Chocs maximaux (mesurés avec le
disque dur en état de marche et une
demi-impulsion sinusoïdale de 2 ms
en fonctionnement. Également
mesurés avec le disque dur en
position de repos et une
demi-impulsion de 2 ms en
stockage) :
Fonctionnement 142 G
Stockage 163 G
Altitude (maximale) :
Fonctionnement –15,2 à 3048 m (–50 à 10 000 pieds)
Stockage –15,2 à 10 668 m (–50 à 35 000 pieds)164 CaractéristiquesAnnexe 165
Annexe
Utilisation du programme de configuration du système
REMARQUE : Il se peut que votre système d'exploitation configure automatiquement la plupart des options
disponibles dans le programme de configuration ; les options que vous avez configurées à l'aide de ce
programme sont alors ignorées. Seule exception, l'option External Hot Key (Touche rapide externe), que vous
pouvez désactiver ou activer via le programme de configuration du système uniquement. Pour plus
d'informations sur la configuration des fonctions de votre système d'exploitation, reportez-vous au Centre
d'aide et de support Windows. Pour accéder au Centre d'aide et de support, reportez-vous à la page 14.
Les écrans de configuration du système affichent les informations sur la configuration courante et
les paramètres de votre ordinateur, par exemple :
• Configuration du système
• Paramètres de configuration de base des périphériques
• Paramètres de sécurité du système et mot de passe de disque dur
• Paramètres de gestion de l'alimentation
• Paramètres de configuration d'amorçage (démarrage) et d'affichage
• Paramètres de la station d'accueil
• Paramètres de contrôle sans fil
AVIS : Ne modifiez les paramètres du programme de configuration du système que si vous êtes un utilisateur
expérimenté en informatique ou si vous êtes assisté par un représentant du support technique de Dell.
Certaines modifications risquent de provoquer un mauvais fonctionnement de l'ordinateur.
Affichage de l'écran de configuration du système
1 Mettez votre ordinateur sous tension (ou redémarrez-le).
2 Lorsque le logo DELL™ apparaît, appuyez immédiatement sur . Si vous attendez trop
longtemps et que le logo Windows apparaît, attendez encore jusqu'à ce que le bureau Windows
s'affiche. Ensuite, arrêtez votre ordinateur et faites une nouvelle tentative.
Programme de configuration du système
L'écran de configuration du système se compose de trois fenêtres d'information. La fenêtre de
gauche contient une hiérarchie développable des catégories de contrôle. Si vous sélectionnez
(mettez en surbrillance) une catégorie (comme Système, Périphériques intégrés ou Vidéo) et que
vous appuyez sur , vous pouvez afficher ou masquer les sous-catégories connexes. La
fenêtre de droite contient des informations sur la catégorie ou sous-catégorie sélectionnée dans la
fenêtre de gauche. 166 Annexe
La fenêtre du bas vous indique comment contrôler les fonctions des touches du programme de
configuration du système. Utilisez ces touches pour sélectionner une catégorie, modifier les paramètres,
ou quitter le programme de configuration du système.
Options fréquemment utilisées
Certaines options nécessitent le redémarrage de l'ordinateur pour que les nouveaux paramètres entrent
en vigueur.
Modification de la séquence d'amorçage
La séquence d'amorçage, ou ordre de démarrage, indique à l'ordinateur où chercher pour trouver le logiciel
requis pour démarrer le système d'exploitation. Vous pouvez contrôler la séquence d'amorçage et
activer/désactiver les périphériques à l'aide de la page Ordre d'amorçage du programme de configuration
du système.
REMARQUE : Pour modifier la séquence d'amorçage sur une base ponctuelle, reportez-vous à la section
« Exécution d'un amorçage ponctuel » à la page 167.
Cette page affiche la liste générale des périphériques amorçables pouvant être installés sur l'ordinateur,
notamment les suivants :
• Lecteur de disquette
• Unité de disque dur interne
• Périphérique de stockage USB
• Lecteur de CD/DVD/CD-RW
• Disque dur de la baie modulaire
REMARQUE : Seuls sont amorçables les périphériques précédés d'un numéro.
Pendant la procédure d'amorçage, l'ordinateur commence par le début de la liste, puis analyse chacun des
périphériques activés à la recherche des fichiers de démarrage du système d'exploitation. Lorsque les
fichiers ont été trouvés, l'ordinateur arrête la recherche et fait démarrer le système d'exploitation.
Pour définir les périphériques d'amorçage, sélectionnez (mettez en surbrillance) un périphérique en
appuyant sur les touches fléchées haut ou bas, puis activez ou désactivez le périphérique ou modifiez son
ordre dans la liste.
• Pour activer ou désactiver un périphérique, sélectionnez-le et appuyez sur la barre d'espacement. Les
éléments activés sont précédés d'un numéro ; ceux qui ne le sont pas ne sont pas précédés d'un
numéro.
• Pour modifier l'ordre d'un périphérique dans la liste, sélectionnez-le et appuyez sur (h) ou
(b) pour déplacer le périphérique vers le haut ou le bas.
Les modifications que vous apportez à la séquence d'amorçage sont prises en compte dès que vous les
enregistrez et que vous quittez le programme de configuration du système.Annexe 167
Exécution d'un amorçage ponctuel
Vous pouvez définir une séquence d'amorçage ponctuelle sans devoir passer par le programme de
configuration du système. (Vous pouvez également utiliser cette procédure pour initialiser Dell
Diagnostics sur la partition de l'utilitaire de diagnostics de votre disque dur.)
1 Arrêtez l'ordinateur à l'aide du menu Démarrer.
2 Connectez l'ordinateur à une prise secteur.
3 Allumez l'ordinateur. Lorsque le logo DELL apparaît, appuyez immédiatement sur . Si vous
attendez trop longtemps et que le logo Windows apparaît, attendez encore jusqu'à ce que le bureau
Windows s'affiche. Éteignez alors votre ordinateur et faites une nouvelle tentative.
4 Lorsque la liste des périphériques d'amorçage apparaît, sélectionnez celui que vous voulez utiliser pour
l'amorçage, puis appuyez sur .
L'ordinateur démarre à partir du périphérique sélectionné.
Au prochain redémarrage de l'ordinateur, l'ordre d'amorçage précédent sera restauré.
Nettoyage de votre ordinateur
PRÉCAUTION : Avant de commencer toute procédure de cette section, consultez et respectez les consignes de
sécurité du Guide d'information sur le produit.
Ordinateur, clavier et écran
PRÉCAUTION : Débranchez l'ordinateur de la prise électrique avant de le nettoyer. Retirez toute batterie
installée. Nettoyez votre ordinateur avec un chiffon doux humecté d'eau. N'utilisez pas de liquide ni d'aérosol
nettoyants, ceux-ci peuvent contenir des substances inflammables.
• Utilisez une bouteille d'air comprimé pour retirer la poussière entre les touches du clavier, ainsi que les
dépôts de poussière sur l'écran.
AVIS : Pour éviter d'endommager l'ordinateur ou l'écran, ne vaporisez pas de liquide de nettoyage directement sur
l'écran. Utilisez uniquement les produits conçus particulièrement pour le nettoyage d'écrans et suivez les
instructions fournies avec le produit.
• Utilisez un chiffon doux, non pelucheux, humecté d'eau ou un nettoyant d'écran. N'utilisez pas
d'alcool ni de nettoyant à base d'ammoniac. Essuyez l'écran doucement du centre vers les bords jusqu'à
ce qu'il soit propre et exempt de traces de doigt. Veillez à ne pas trop appuyer sur l'écran.
• Humectez un chiffon doux, non pelucheux, d'eau et essuyez l'ordinateur et le clavier. Veillez à ne pas
laisser l'eau du chiffon s'infiltrer entre la tablette tactile et le repose-mains qui l'entoure.
Tablette tactile
1 Arrêtez l'ordinateur et mettez-le hors tension. Reportez-vous à la section « Mise hors tension de
l'ordinateur » à la page 111.
2 Débranchez les périphériques de l'ordinateur et des prises secteur.168 Annexe
3 Retirez toute batterie installée. Reportez-vous à la section « Utilisation d'une batterie » à la page 37.
4 Humectez un chiffon doux, non pelucheux, d'eau et passez-le doucement sur la surface de la tablette
tactile. Veillez à ne pas laisser l'eau du chiffon s'infiltrer entre la tablette tactile et le repose-mains qui
l'entoure.
Lecteur de disquette
AVIS : N'essayez pas de nettoyer les têtes de lecture avec une tige de nettoyage. Vous risqueriez de déranger
accidentellement l'alignement des têtes et d'empêcher le fonctionnement du lecteur.
Nettoyez le lecteur de disquette à l'aide d'une trousse de nettoyage que vous trouverez dans le
commerce. Ces trousses comportent des disquettes prétraitées qui permettent d'enlever les dépôts
accumulés au cours d'une utilisation normale.
CD et DVD
AVIS : Utilisez toujours de l'air comprimé pour nettoyer la lentille du lecteur et suivez les instructions fournies avec
l'air comprimé. Ne touchez jamais la lentille qui se trouve à l'intérieur du lecteur.
Si vous avez des problèmes pendant la lecture de vos CD ou DVD (des sauts pendant la lecture par
exemple), nettoyez les disques.
1 Tenez le disque par son bord extérieur. Vous pouvez également toucher le bord intérieur de l'orifice
central.
AVIS : Pour éviter d'abîmer la surface, n'essuyez pas le disque par mouvement circulaire.
2 Avec un chiffon doux et non pelucheux, nettoyez doucement la partie inférieure du disque (côté sans
étiquette) en suivant une ligne droite depuis le centre jusqu'au bord extérieur.
Si la poussière ne part pas, utilisez de l'eau ou une solution diluée d'eau et de savon doux. Certains
produits vendus dans le commerce nettoient les disques et les protègent contre la poussière, les
empreintes et les rayures. Les produits de nettoyage pour CD peuvent également être utilisés sur les
DVD sans aucun risque.
Règle de support technique de Dell (États-Unis uniquement)
Le support technique fourni par les techniciens nécessite la coopération et la participation du client dans
le processus de dépannage et permet de restaurer le système d'exploitation, les logiciels et les pilotes
matériels à leur configuration par défaut telle que livrée par Dell ; il permet en outre de vérifier le
fonctionnement approprié de l'ordinateur et de tout le matériel installé par Dell. En plus du support
technique par nos techniciens, vous disposez d'une aide en ligne à l'adresse support.dell.com. Des
options payantes de support technique complémentaire sont également disponibles.Annexe 169
Dell offre un support technique limité pour l'ordinateur et tous les logiciels et périphériques1
installés
par Dell. Le support technique pour les logiciels et les périphériques tiers est assuré par le fabricant luimême, y compris le support pour tout logiciel ou périphérique acheté et/ou installé par le biais de Dell
Software & Peripherals, Readyware et Custom Factory Integration2
.
1
Les services de réparation sont fournis selon les termes et les conditions stipulés par votre garantie limitée et par tout
contrat de service de support optionnel acheté avec l'ordinateur.
2
Tous les composants Dell standard inclus dans un projet d'intégration personnalisée en usine (Custom Factory
Integration - CFI) sont couverts par la garantie limitée standard de Dell applicable à votre ordinateur. Toutefois, Dell
propose un programme de remplacement des pièces pour couvrir tous les composants non standard ou de sociétés
tierces intégrés via CFI pendant la durée du contrat de service de l’ordinateur.
Définition des logiciels et des périphériques installés par Dell
Les logiciels installés par Dell englobent le système d'exploitation et certains logiciels installés sur
l'ordinateur pendant le processus de fabrication (Microsoft® Office, Norton Antivirus et ainsi de suite).
L'expression « périphériques installés par Dell » recouvre toute carte d'extension interne, ou baie
modulaire de marque Dell ou encore tous les accessoires ExpressCard. Sont inclus également les produits
de marque Dell suivants : moniteurs, claviers, souris, haut-parleurs, microphones pour modems à
fonction téléphonique, stations d'accueil et réplicateurs de port, produits réseau et le câblage associé.
Définition des logiciels et des périphériques tiers
Les logiciels et périphériques tiers incluent tout périphérique, accessoire ou logiciel vendu par Dell mais
qui ne porte pas la marque Dell (imprimantes, scanners et appareils photo, jeux et ainsi de suite). Le
support technique pour tout logiciel ou périphérique tiers est fourni par le fabricant du produit en
question.
Réglementation FCC (États-Unis uniquement)
Classe B de la FCC
Cet équipement crée, utilise et peut émettre de l'énergie de fréquence radio et peut, s'il n'est pas installé
et utilisé conformément aux instructions du guide du fabricant, être la cause de perturbations des
réceptions radio et télévision. Cet équipement a été testé et déclaré conforme aux limites des appareils
numériques de classe B définies à l'alinéa 15 du règlement de la FCC.
Ce périphérique est conforme à l'alinéa 15 du règlement de la FCC. Son fonctionnement est soumis aux
deux conditions suivantes :
• Cet appareil ne doit pas émettre d'interférences nuisibles.
• Cet appareil doit accepter toutes les interférences qu'il reçoit, y compris celles qui peuvent perturber
son fonctionnement.
AVIS : Les réglementations de la FCC prévoient que les changements ou modifications non explicitement
approuvés par Dell Inc. peuvent annuler vos droits à utiliser cet équipement. 170 Annexe
Ces limites ont été conçues pour fournir une protection raisonnable contre les interférences nuisibles
dans un milieu résidentiel. Cependant, la possibilité d'interférence d'une installation particulière n'est
pas entièrement exclue. Si cet équipement crée effectivement des interférences nuisibles avec la
réception radio et télévision, ce qui peut être déterminé en allumant et en éteignant l'équipement, vous
êtes encouragé à essayer de corriger les interférences en prenant une ou plusieurs des mesures suivantes :
• Changer l'orientation de l'antenne de réception.
• Repositionner le système en fonction du récepteur.
• Éloigner le système du récepteur.
• Brancher le système sur une autre prise, pour faire en sorte que le système et le récepteur se trouvent
sur différents circuits de dérivation.
Si nécessaire, consultez un représentant de Dell Inc. ou un technicien radio/télévision expérimenté pour
des suggestions supplémentaires.
Les informations suivantes sont fournies sur le ou les appareil(s) couvert(s) dans ce document
conformément aux réglementations de la FCC :
Caractéristiques Macrovision
Ce produit intègre une technologie de protection des droits d'auteur qui est protégée par des brevets
américains et d'autres droits de propriété intellectuelle. L'utilisation de cette technologie de protection
des droits d'auteur est soumise à l'autorisation de Macrovision ; elle est destinée exclusivement à une
utilisation domestique et à des opérations limitées de visualisation, sauf autorisation particulière de
Macrovision. L'ingénierie inverse et le désassemblage sont interdits.
Nom du produit : Dell™ Inspiron™ 640M/ E1405
Numéro de modèle : PP19L
Nom de la société : Dell Inc.
Worldwide Regulatory Compliance & Environmental Affairs
One Dell Way
Round Rock, TX 78682 USA
512-338-4400Glossaire 171
Glossaire
Les termes répertoriés dans ce glossaire ne sont
fournis qu'à titre informatif et ne décrivent pas
obligatoirement les fonctions incluses avec votre
ordinateur particulier.
A
ACPI — Advanced Configuration and Power Interface —
Spécification de gestion de l'alimentation qui permet aux
systèmes d'exploitation Microsoft® Windows® de placer
l'ordinateur en mode Veille ou Mise en veille prolongée
afin de conserver l'énergie électrique attribuée à chaque
périphérique connecté à l'ordinateur.
adressage de mémoire — Processus permettant à
l'ordinateur d'attribuer des adresses mémoire à des
emplacements physiques au démarrage. Les périphériques
et les logiciels peuvent ensuite déterminer les
informations auxquelles le microprocesseur peut accéder.
adresse E/S — Adresse RAM associée à un périphérique
spécifique (un connecteur série, un connecteur parallèle
ou une baie d'extension) et qui permet au
microprocesseur de communiquer avec ce périphérique.
adresse mémoire — Emplacement spécifique où les
données sont stockées temporairement dans la mémoire
RAM.
AGP — Accelerated Graphics Port — Port graphique
dédié allouant de la mémoire système à utiliser pour les
tâches liées à la vidéo. Le port AGP permet d'obtenir une
image vidéo de haute qualité avec des couleurs fidèles
grâce à une interface très rapide entre le circuit vidéo et la
mémoire de l'ordinateur.
ALS — Capteur d'éclairage ambiant.
APR — Advanced Port Replicator — Station d'accueil qui
permet d'utiliser aisément un moniteur externe, un
clavier, une souris ou d'autres périphériques avec
l'ordinateur portable.
arrêt — Processus consistant à fermer les fenêtres et les
programmes, à quitter le système d'exploitation et à
éteindre l'ordinateur. Vous pouvez perdre des données si
vous éteignez l'ordinateur sans effectuer la procédure
d'arrêt.
ASF — Alert Standards Format — Standard permettant
de définir un mécanisme pour signaler les alertes
matérielles et logicielles à une console de gestion. La
norme ASF est conçue pour être indépendante des platesformes et des systèmes d'exploitation.
autonomie de la batterie — Nombre de minutes ou
d'heures durant lesquelles la batterie d'un ordinateur
portable peut alimenter l'ordinateur.
B
baie modulaire — Logement qui prend en charge des
périphériques, tels qu'un lecteur optique, une seconde
batterie ou un module TravelLite™ de Dell.
barre d'état système — La barre d'état système du bureau
Windows contient des icônes permettant d'accéder
rapidement aux programmes et aux fonctions de
l'ordinateur, notamment à l'horloge, au contrôle du
volume et à l'état de l'imprimante. Appelée également
Zone de notification.
batterie — Source d'énergie interne rechargeable qui
permet d'alimenter des ordinateurs portables lorsqu'ils ne
sont pas raccordés à un adaptateur secteur et une prise
secteur.
BIOS — Basic Input/Output System — Programme (ou
utilitaire) qui joue le rôle d'interface entre le matériel
informatique et le système d'exploitation. Ne modifiez les
paramètres de ce programme que si vous connaissez avec
exactitude les effets de chacun d'eux sur l'ordinateur.
Appelé également programme de configuration du système.
bit — L'unité de donnée la plus petite pouvant être
interprétée par l'ordinateur.172 Glossaire
bps — Bits per second (bits par seconde) — Unité
standard de mesure de la vitesse de transmission de
données.
BTU — British Thermal Unit (unité thermique
britannique) — Mesure de sortie de chaleur.
bus — Passerelle pour les communications entre les
composants de votre ordinateur.
bus local — Bus de données permettant une transmission
rapide des données entre les périphériques et le
microprocesseur.
C
C — Celsius — Système de mesure des températures où
0 ° est le point de congélation et 100 ° le point d'ébullition
de l'eau.
CA— Courant alternatif — Forme d'électricité qui
alimente votre ordinateur lorsque vous branchez le câble
d'alimentation de l'adaptateur secteur sur une prise
électrique.
capteur infrarouge — Port permettant de transférer des
données entre l'ordinateur et des périphériques
compatibles infrarouge sans utiliser de connexion câblée.
carnet — Document international des douanes qui
facilite les importations temporaires dans les pays
étrangers. Appelé également passeport de marchandises.
carte à puce — Carte qui incorpore un microprocesseur et
une puce mémoire. Les cartes à puce permettent
d'identifier un utilisateur sur des ordinateurs équipés de
telles cartes.
carte d'extension — Carte installée dans un logement
d'extension sur la carte système de certains ordinateurs et
qui permet d'augmenter les capacités de l'ordinateur. Il
peut s'agir d'une carte vidéo, modem ou son.
carte ExpressCard — Carte d'E/S amovible conforme à la
norme PCMCIA. Les cartes modem et les cartes réseau
sont des cartes ExpressCard courantes. Les cartes
ExpressCard prennent en charge les standards PCI
Express et USB 2.0.
carte PC — Carte d'E/S amovible conforme à la norme
PCMCIA. Les cartes modem et les cartes réseau sont des
cartes PC courantes.
carte PC étendue — Carte PC qui dépasse du logement
de carte PC lorsqu'elle est installée.
carte réseau — Puce qui offre des fonctions réseau. Un
ordinateur peut comprendre une carte réseau sur sa carte
système ou il peut contenir une carte PC sur laquelle se
trouve un adaptateur intégré. Une carte réseau est aussi
appelée NIC (Network Interface Controller [contrôleur
d'interface réseau]).
carte système — Carte à circuit imprimé principale de
votre ordinateur. Appelée également carte mère.
CD — Compact Disc — Support de stockage optique,
souvent utilisé pour les logiciels et les programmes audio.
CD amorçable — CD pouvant être utilisé pour démarrer
votre ordinateur. Au cas où votre disque dur serait
endommagé ou votre ordinateur infecté par un virus,
assurez-vous d'avoir toujours à disposition un CD ou une
disquette amorçable. Le CD Drivers and Utilities ou
ResourceCD est un CD amorçable.
CD-R — CD Recordable — Version enregistrable d'un
CD. Des données ne peuvent être enregistrées qu'une
seule fois sur un CD enregistrable. Une fois enregistrées,
les données ne peuvent être ni effacées ni écrasées.
CD-RW — CD ReWritable — Version réinscriptible d'un
CD. Vous pouvez enregistrer des données sur un CD-RW,
puis les effacer et les réécrire.
COA — Certificate of Authenticity (certificat
d'authenticité) — Code alphanumérique Windows inscrit
sur une étiquette sur votre ordinateur. Appelé également
Product Key (Clé de produit) ou Product ID
(Identification produit).
code de service express — Code numérique inscrit sur
une étiquette sur votre ordinateur Dell™. Utilisez le code
de service express lorsque vous contactez Dell pour
obtenir une assistance technique. Le code de service
express n'est pas nécessairement disponible dans tous les
pays.
combinaison de touches — Commande nécessitant une
pression simultanée sur plusieurs touches.
connecteur DIN — Connecteur rond à 6 broches
conforme aux normes DIN (Deutsche Industrie-Norm),
généralement utilisé pour connecter des connecteurs de
câbles de souris ou de clavier PS/2.Glossaire 173
connecteur parallèle — Port d'E/S souvent utilisé pour
connecter une imprimante parallèle à l'ordinateur. Appelé
également port LPT.
connecteur série — Port d'E/S souvent utilisé pour
connecter des périphériques comme des organiseurs ou
des appareils photo numériques sur votre ordinateur.
contrôleur — Puce qui contrôle le transfert de données
entre le microprocesseur et la mémoire ou entre le
microprocesseur et les périphériques.
contrôleur vidéo — Circuits de la carte vidéo ou de la
carte système (sur les ordinateurs dotés d'un contrôleur
vidéo intégré) qui fournissent, en association avec l'écran
ou un moniteur externe, les fonctions vidéo, de votre
ordinateur.
CRIMM — Continuity Rambus In-line Memory
Module — Module ne disposant pas de puces de
mémoire, utilisé pour remplir les emplacements RIMM
inutilisés.
curseur — Marqueur sur l'écran qui indique
l'emplacement de la prochaine action du clavier, de la
tablette tactile ou de la souris. Il s'agit généralement d'une
ligne clignotante, d'un caractère de soulignement ou
d'une petite flèche.
D
disquette — Type de support de stockage
électromagnétique. Également appelé disquette floppy ou
disque floppy.
disquette amorçable — Disquette pouvant être utilisée
pour démarrer votre ordinateur. Au cas où votre disque
dur serait endommagé ou votre ordinateur infecté par un
virus, assurez-vous d'avoir toujours à disposition un CD
ou une disquette amorçable.
dissipateur de chaleur — Plaque en métal sur certains
microprocesseurs qui permet de dissiper la chaleur.
DMA — Direct Memory Access (accès direct à la
mémoire) — Canal permettant à certains types de
transferts de données entre la mémoire RAM et un
périphérique d'éviter de passer par le microprocesseur.
DMTF — Distributed Management Task Force —
Consortium de compagnies représentant des fournisseurs
de matériel et de logiciel développant des normes de
gestion pour les environnements réseau, Internet, de
bureau et d'entreprise distribués.
domaine — Groupe d'ordinateurs, de programmes et de
périphériques sur un réseau administrés en tant qu'unité
avec des règles et des procédures communes afin d'être
utilisés par un groupe d'utilisateurs donné. Les utilisateurs
doivent se connecter au domaine pour avoir accès aux
ressources.
dossier — Terme utilisé pour décrire l'espace sur une
disquette ou un disque dur sur lequel des fichiers sont
organisés et regroupés. Les fichiers d'un dossier peuvent
être affichés et classés de différentes façons, par exemple
par ordre alphabétique, par date ou par taille.
DRAM — Dynamic Random Access Memory (mémoire
dynamique à accès aléatoire) — Mémoire qui stocke des
informations dans les circuits intégrés contenant des
condensateurs.
DSL — Digital Subscriber Line — Technologie offrant
une connexion Internet constante et à haute vitesse par
l'intermédiaire d'une ligne téléphonique analogique.
durée de vie d'une batterie — Nombre d'années durant
lesquelles la batterie d'un ordinateur portable peut être
rechargée.
DVD — digital versatile disc (disque polyvalent
numérique) — Disque à grande capacité généralement
utilisé pour stocker des films. Les lecteurs de DVD lisent
également la plupart des CD.
DVD-R — DVD recordable (DVD enregistrable) —
Version enregistrable d'un DVD. Des données ne peuvent
être enregistrées qu'une seule fois sur un DVD
enregistrable. Une fois enregistrées, les données ne
peuvent être ni effacées ni écrasées.
DVD+RW — DVD réinscriptible — Version
réinscriptible d'un DVD. Vous pouvez enregistrer des
données sur un DVD+RW, puis les effacer et les réécrire.
(La technologie DVD+RW diffère de la technologie
DVD-RW.)
DVI — digital video interface (interface vidéo
numérique) — Norme de transmission numérique entre
un ordinateur et un écran vidéo numérique.174 Glossaire
E
ECC — Error Checking and Correction (code de
vérification et de correction d'erreur) — Type de mémoire
qui inclut des circuits spéciaux pour tester l'exactitude des
données lorsqu'elles passent par la mémoire.
ECP — Extended Capabilities Port — Connecteur
parallèle permettant de transmettre des données de
manière bidirectionnelle. Similaire à EPP, le port ECP
utilise l'accès direct à la mémoire pour transférer des
données et améliore généralement les performances.
éditeur de texte — Programme utilisé pour créer et
modifier les fichiers contenant uniquement du texte ; par
exemple, le Bloc-notes de Windows utilise un éditeur de
texte. En général, les éditeurs de texte n'offrent pas les
fonctions de renvoi à la ligne automatique ou de mise en
forme (option permettant de souligner, de changer les
polices, etc.).
EIDE — Enhanced Integrated Device Electronics
(électronique de périphérique intégré améliorée) —
Version améliorée de l'interface IDE pour les disques durs
et les lecteurs de CD.
EMI — Electromagnetic Interference (interférence
électromagnétique) — Interférences électriques causées
par radiation électromagnétique.
emplacement d'extension — Connecteur de la carte
système (sur certains ordinateurs) dans lequel vous
insérez une carte d'extension pour la connecter au bus
système.
ENERGY STAR® — Exigences de l'agence EPA
(Environmental Protection Agency) permettant de
diminuer la consommation globale d'électricité.
EPP — Enhanced Parallel Port — Connecteur parallèle
permettant de transmettre des données de manière
bidirectionnelle.
E/S — Entrée/Sortie — Opération ou périphérique
entrant et extrayant des données de votre ordinateur. Les
claviers et les imprimantes sont des périphériques d'E/S.
ESD — ElectroStatic Discharge (décharge
électrostatique) — Brève décharge d'électricité statique.
Ce type de décharge peut endommager les circuits
intégrés du matériel informatique et de communication.
F
Fahrenheit — Système de mesure des températures où
32 ° correspond au point de congélation et 212 ° au point
d'ébullition de l'eau.
FCC — Federal Communications Commission
(Commission fédérale des communications, aux ÉtatsUnis) — Bureau américain responsable de l'application de
réglementations relatives aux communications qui évalue
la quantité de radiations pouvant être émise par les
ordinateurs et autres équipements électroniques.
fichier d'aide — Fichier qui contient des descriptions ou
des instructions relatives à un produit. Certains fichiers
d'aide sont associés à un programme particulier, par
exemple Aide de Microsoft Word. D'autres fichiers d'aide
fonctionnent comme sources de référence autonomes. Les
fichiers d'aide portent généralement l'extension .hlp ou
.chm.
fichier « Lisez-moi » — Fichier texte livré avec un logiciel
ou du matériel. En général, les fichiers « Lisez-moi »
fournissent des informations sur l'installation et décrivent
les améliorations ou corrections apportées au produit qui
n'ont pas encore été documentées.
formatage — Processus qui prépare un disque pour le
stockage des fichiers. Lorsqu'un lecteur ou disque est
formaté, les informations existantes sur ce lecteur ou
disque sont perdues.
FSB — Front Side Bus (bus frontal) — Canal de données
et interface physique entre le microprocesseur et la
mémoire RAM.
FTP — File Transfer Protocol (protocole de transfert de
fichiers) — Protocole Internet standard utilisé pour
échanger des fichiers entre des ordinateurs connectés à
Internet.
G
G — Gravité — Mesure de poids et de force.
GHz — Gigahertz — Unité de mesure de fréquence égale
à un milliard de Hz ou à mille MHz. La vitesse des
microprocesseurs, des bus et des interfaces des
ordinateurs est généralement mesurée en GHz.Glossaire 175
Go — Giga-octet — Unité de stockage de données égale à
1024 Mo (1 073 741 824 octets). Ce terme est souvent
arrondi à 1 000 000 000 octets lorsqu'il fait référence à la
capacité de stockage d'un disque dur.
GUI — Graphical User Interface (interface graphique
utilisateur) — Logiciel interagissant avec l'utilisateur à
l'aide de menus, de fenêtres et d'icônes. La plupart des
programmes fonctionnant avec les systèmes d'exploitation
Microsoft Windows ont des interfaces graphiques
utilisateur.
H
unité de disque dur — Lecteur permettant de lire et
d'écrire des données sur un disque dur. Les termes lecteur
de disque dur et disque dur sont souvent utilisés
indifféremment.
mode Mise en veille prolongée — Mode de gestion de
l'alimentation électrique qui enregistre le contenu de la
mémoire dans un espace réservé du disque dur, puis arrête
l'ordinateur. Quand vous redémarrez l'ordinateur, les
informations de la mémoire qui ont été enregistrées sur le
disque dur sont automatiquement restaurées.
HTML — Hypertext Markup Language — Ensemble de
codes insérés dans une page Web afin de s'afficher dans
un navigateur Internet.
HTTP — Hypertext Transfer Protocol — Protocole
d'échange de fichiers entre des ordinateurs connectés à
Internet.
Hz — Hertz — Unité de mesure de fréquence égale à 1
cycle par seconde. La vitesse de fonctionnement des
ordinateurs et des périphériques électroniques est souvent
mesurée en kilohertz (kHz), mégahertz (MHz), gigahertz
(GHz) ou térahertz (THz).
I
IC — circuit intégré — Semi-conducteur ou puce sur
lesquels sont fabriqués des milliers ou des millions de
minuscules composants électroniques destinés aux
équipements informatiques, audio et vidéo.
IDE — Integrated Drive Electronics (électronique d'unité
intégrée) — Interface pour les périphériques de stockage
en masse dans laquelle le contrôleur est intégré à l'unité
de disque dur ou au lecteur de CD.
IEEE 1394 — Institute of Electrical and Electronics
Engineers, Inc. — Bus série à hautes performances utilisé
pour connecter des périphériques compatibles IEEE 1394
tels que les appareils numériques et les lecteurs DVD à
l'ordinateur.
intégré — Fait généralement référence aux composants
physiquement situés sur la carte système de l'ordinateur.
Synonyme d'incorporé.
IrDA — Infrared Data Association — Organisme en
charge de la création de normes internationales pour les
communications infrarouge.
IRQ — Interrupt Request (requête d'interruption) —
Passerelle électronique associée à un périphérique
spécifique et qui permet à ce dernier de communiquer
avec le microprocesseur. Une IRQ doit être attribuée à
chaque périphérique. Bien que deux périphériques
puissent partager la même affectation d'IRQ, ils ne
peuvent pas fonctionner simultanément.
ISP — Internet service provider (fournisseur d'accès
Internet) — Société qui vous permet d'accéder à son
serveur hôte afin de vous connecter directement à
Internet, d'envoyer et de recevoir des messages
électroniques et d'accéder à des sites Web. Le fournisseur
d'accès Internet (FAI) vous attribue un progiciel, un nom
d'utilisateur et des numéros de téléphone d'accès contre
un paiement.
K
Kb — Kilobit — Unité de données égale à 1024 bits.
Mesure de la capacité des circuits intégrés de mémoire.
kHz — Kilohertz — Unité de mesure de fréquence égale à
1000 Hz.
Ko — Kilo-octet — Unité de données égale à 1024 octets
mais souvent considérée comme étant égale à 1000 octets.
L
LAN — Local Area Network (réseau local) — Réseau
informatique couvrant une petite zone. Un réseau local
est généralement limité à un seul bâtiment ou à plusieurs
bâtiments avoisinants. Un LAN peut être connecté à un
autre réseau local sur n'importe quelle distance par des
lignes téléphoniques et des ondes radioélectriques pour
constituer un réseau étendu (WAN, Wide Area Network).176 Glossaire
LCD — Liquid Crystal Display (affichage à cristaux
liquides) — Technologie utilisée pour les écrans plats et
ceux des ordinateurs portables.
lecteur de CD — Lecteur utilisant la technologie optique
pour lire des données sur des CD.
lecteur de CD (CD player) — Logiciel utilisé pour lire les
CD musicaux. Le lecteur de CD affiche une fenêtre
comprenant des boutons qui permettent de lire un CD.
lecteur de CD-RW — Lecteur qui peut lire les CD et
écrire sur des disques réinscriptibles (CD-RW) et des
disques enregistrables (CD-R). On peut écrire plusieurs
fois sur des CD-RW, tandis que les CD-R ne permettent
qu'une seule inscription.
lecteur de CD-RW/DVD — Lecteur, parfois appelé
lecteur combiné, permettant de lire des CD et des DVD,
ainsi que d'écrire sur des disques réinscriptibles (CD-RW)
et des disques enregistrables (CD-R). On peut écrire
plusieurs fois sur des CD-RW, tandis que les CD-R ne
permettent qu'une seule inscription.
lecteur de disquette — Lecteur permettant de lire et
d'écrire sur des disquettes.
lecteur de DVD — Lecteur utilisant la technologie
optique pour lire des données sur les DVD et CD.
lecteur de DVD (DVD player) — Logiciel permettant de
visionner des films DVD. Le lecteur de DVD affiche une
fenêtre comprenant des boutons qui permettent de
visionner un film.
lecteur de DVD+RW — Lecteur permettant de lire les
DVD et la plupart des supports CD et d'écrire sur des
disques DVD+RW (DVD réinscriptibles).
lecteur optique — Lecteur qui utilise la technologie
optique pour lire ou écrire des données sur des CD, des
DVD ou des DVD+RW. Les lecteurs de CD, de DVD, de
CD-RW et les lecteurs combinés de CD-RW/DVD sont
des exemples de lecteurs optiques.
lecteur Zip — Lecteur de disquette à grande capacité
développé par Iomega Corporation qui utilise des
disquettes amovibles de 3,5 pouces appelées disquettes
Zip. Les disquettes Zip sont légèrement plus grandes que
les disquettes normales, à peu près deux fois plus épaisses
et peuvent contenir jusqu'à 100 Mo de données.
lecture seule — Données et/ou fichiers que vous pouvez
afficher, mais pas modifier ou supprimer. Un fichier peut
être en lecture seule si :
• Il se trouve sur une disquette physiquement protégée
en écriture, un CD ou un DVD.
• Il est situé sur un réseau dans un répertoire sur lequel
l'administrateur système n'a affecté des droits qu'à
certains individus.
LED — Light-Emitting Diode (diode
électroluminescente) — Composant électronique
émettant de la lumière pour indiquer l'état de l'ordinateur.
logiciel — Tout élément pouvant être stocké sous forme
électronique, comme des programmes ou des fichiers
informatiques.
logiciel antivirus — Programme spécialement conçu pour
identifier, isoler et/ou supprimer des virus de votre
ordinateur.
LPT — Line Print Terminal — Désignation d'une
connexion parallèle à une imprimante ou à un autre
périphérique parallèle.
M
Mb — Mégabit — Mesure de la capacité de la puce de
mémoire égale à 1024 Ko.
Mb/s — Mégabits par seconde — 1 million de bits par
seconde. Cette mesure est en règle générale utilisée pour
les vitesses de transmission des réseaux et des modems.
mémoire — Zone de stockage de données temporaire
dans l'ordinateur. Dans la mesure où les données en
mémoire ne sont pas permanentes, il vous est
recommandé d'enregistrer fréquemment vos fichiers
lorsque vous travaillez ainsi qu'avant d'éteindre
l'ordinateur. Un ordinateur peut avoir plusieurs formes de
mémoire : la mémoire RAM, la mémoire ROM et la
mémoire vidéo. Le terme mémoire est souvent synonyme
de mémoire RAM.
mémoire cache — Mécanisme de stockage à grande
vitesse spécifique. Il peut s'agir d'une section réservée de
la mémoire principale ou d'un périphérique de stockage
rapide indépendant. La mémoire cache permet
d'améliorer l'efficacité de nombreuses opérations du
microprocesseur.
mémoire cache L1 — Mémoire cache principale se Glossaire 177
trouvant dans le microprocesseur.
mémoire cache L2 — Mémoire cache secondaire pouvant
être externe au microprocesseur ou intégrée à
l'architecture de celui-ci.
mémoire vidéo — Mémoire composée de puces mémoire
dédiées aux fonctions vidéo. La mémoire vidéo est en
général plus rapide que la mémoire système. La quantité
de mémoire vidéo installée a principalement des effets sur
le nombre de couleurs qu'un programme peut afficher.
MHz — Mégahertz — Mesure de fréquence égale à
1 million de cycles par seconde. La vitesse des
microprocesseurs, des bus et des interfaces d'ordinateurs
est généralement mesurée en MHz.
microprocesseur — Puce d'ordinateur qui interprète et
exécute les instructions des programmes. Le
microprocesseur est parfois appelé processeur ou unité
centrale (UC).
Mo — Méga-octet — Unité de stockage de données égale
à 1 048 576 octets. 1 Mo est égal à 1024 Ko. Lorsque l'on
fait référence à la capacité de stockage d'un disque dur, le
terme est souvent arrondi à 1 000 000 octets.
mode de bureau étendu — Paramètre d'affichage
permettant d'utiliser un second moniteur. Appelé
également mode Double affichage.
mode Double affichage — Paramètre d'affichage qui
permet d'utiliser un second moniteur. Appelé également
mode de bureau étendu.
mode graphique — Mode vidéo qui peut être défini par le
nombre de pixels horizontaux x, le nombre de pixels
verticaux y et le nombre de couleurs z. Les modes
graphiques peuvent afficher un nombre illimité de formes
et de polices.
mode Veille — Mode d'économie d'énergie qui arrête
toutes les opérations inutiles de l'ordinateur pour
économiser de l'énergie.
mode vidéo — Mode qui décrit la façon dont le texte et
les graphiques sont affichés sur un moniteur. Les logiciels
à affichage graphique, tels que les systèmes d'exploitation
Windows, s'affichent en modes vidéo définis par le
nombre de pixels horizontaux x, le nombre de pixels
verticaux y et le nombre de couleurs z. Les logiciels à base
de caractères, comme les éditeurs de texte, s'affichent en
modes vidéo qui se définissent par le nombre de colonnes
x et par le nombre de rangées y.
module de mémoire — Petite carte à circuits imprimés,
contenant des puces de mémoire, qui se connecte à la
carte système.
module de voyage — Périphérique en plastique conçu
pour être inséré dans la baie modulaire de l'ordinateur
portable pour réduire le poids de ce dernier.
modem — Dispositif permettant à votre ordinateur de
communiquer avec d'autres ordinateurs par
l'intermédiaire de lignes téléphoniques analogiques. Il
existe trois types de modems : externe, carte PC et
interne. Généralement, vous utilisez un modem pour vous
connecter à Internet et échanger des messages
électroniques.
moniteur — Périphérique haute résolution ayant
l'apparence d'un téléviseur et affichant les données et les
images créées par l'ordinateur.
Mo/s — Méga-octets par seconde — 1 million d'octets par
seconde. Cette mesure est souvent utilisée pour les taux
de transfert de données.
ms — milliseconde — Mesure de temps égale à un
millième de seconde. Le temps d'accès des périphériques
de stockage est souvent mesuré en ms.
N
NIC — Voir carte réseau.
ns — nanoseconde — Mesure de temps égale à un
milliardième de seconde.
numéro de service — Étiquette de code-barres apposée
sur l'ordinateur permettant d'identifier ce dernier lorsque
vous accédez au support de Dell à l'adresse
support.dell.com ou lorsque vous appelez le service
clientèle ou le support technique de Dell.
NVRAM — Nonvolatile Random Access Memory
(mémoire rémanente à accès direct) — Type de mémoire
qui conserve des données lors de la mise hors tension de
l'ordinateur ou en cas de coupure d'alimentation
électrique. La mémoire NVRAM permet de conserver les
informations de configuration, comme la date, l'heure et
d'autres options de configuration du système que vous
pouvez définir.178 Glossaire
O
octet — Unité de stockage de données de base utilisée par
votre ordinateur. Un octet équivaut généralement à 8 bits.
onduleur — UPS, Uninterruptible Power Supply —
Source d'alimentation de secours utilisée lorsque
l'alimentation électrique est coupée ou descend à un
niveau de tension inacceptable. Un onduleur permet à
l'ordinateur de fonctionner pendant un temps limité en
cas de panne d'électricité. Les onduleurs sont en général
équipés d'un parasurtenseur et peuvent également offrir
des régulations de tension. Les petits systèmes UPS
proposent une alimentation par batterie de quelques
minutes pour vous permettre d'éteindre l'ordinateur
correctement.
P
Panneau de configuration — Utilitaire Windows
permettant de modifier les paramètres du système
d'exploitation et du matériel : les paramètres d'affichage,
par exemple.
papier peint — Motif ou image d'arrière-plan du bureau
Windows. Vous pouvez changer de papier peint en
utilisant le panneau de configuration Windows. Vous
pouvez également numériser votre photo préférée et en
faire un papier peint.
parasurtenseur — Dispositif qui empêche les sautes de
tension, pouvant survenir au cours d'orages, par exemple,
de pénétrer dans l'ordinateur par l'intermédiaire de la prise
secteur. Les parasurtenseurs ne protègent pas de la foudre
ou des baisses de tension qui se produisent lorsque la
tension descend à plus de 20 pour cent au-dessous du
niveau normal de tension de ligne à courant alternatif.
Les connexions réseau ne peuvent pas être protégées par
les parasurtenseurs. Vous devez toujours déconnecter le
câble de réseau du connecteur réseau pendant les orages.
partition — Zone de stockage physique sur un disque dur
affectée à une ou plusieurs zones de stockage logique
appelées unités logiques. Chaque partition peut contenir
plusieurs lecteurs logiques.
PCI — Peripheral Component Interconnect — Bus local
prenant en charge les chemins de données de 32 et
64 octets et fournissant un chemin de données haute
vitesse entre le microprocesseur et les périphériques
(vidéo, lecteur, réseau).
PCI Express — Type d'interface PCI qui accélère le taux
de transfert des données entre le processeur et ses
périphériques. Avec PCI Express, le taux de transfert des
données se situe entre 250 Mo/s et 4 Go/s. Si le jeu de
puces PCI Express et le périphérique tournent à des
vitesses différentes, ils fonctionnent à la vitesse la plus
basse.
PCMCIA — Personal Computer Memory Card
International Association — Organisme chargé d'établir
des normes pour les cartes PC.
périphérique — Matériel, tel qu'un lecteur de disque, une
imprimante ou un clavier, installé sur votre ordinateur ou
connecté à celui-ci.
pilote — Logiciel permettant au système d'exploitation
de contrôler un périphérique comme une imprimante. La
plupart des périphériques ne fonctionnent pas
correctement si le pilote approprié n'est pas installé sur
l'ordinateur.
pilote de périphérique — Voir pilote.
PIN — Personal Identification Number — Séquence de
nombres et/ou de lettres utilisée pour restreindre les accès
non autorisés aux réseaux informatiques ainsi qu'à
d'autres systèmes sécurisés.
PIO — Programmed Input/Output (Entrée/Sortie
programmée) — Méthode de transfert des données entre
deux périphériques utilisant le microprocesseur comme
partie du chemin de données.
pixel — Point unique sur un écran. Les pixels sont
disposés en rangs et en colonnes pour créer une image.
Une résolution vidéo, par exemple 800 sur 600, s'exprime
en nombre de pixels en largeur sur le nombre de pixels en
hauteur.
Plug-and-Play — Possibilité pour l'ordinateur de
configurer automatiquement les périphériques. La norme
Plug-and-Play permet d'installer et de configurer
automatiquement un périphérique et assure la
compatibilité avec le matériel existant si le BIOS, le
système d'exploitation et tous les périphériques sont
compatibles Plug-and-Play.
POST — Power-On Self-Test (autotest de démarrage) —
Programmes de diagnostic, chargés automatiquement par
le BIOS, qui effectuent des tests de base sur la plupart des
composants de l'ordinateur, comme la mémoire, les unités
de disque dur, etc. Si aucun problème n'est détecté au
cours de l'autotest de démarrage, l'ordinateur continue
son démarrage.Glossaire 179
programme — Logiciel permettant de traiter des données,
comme un tableur, un traitement de texte, une base de
données ou un jeu. Vous devez disposer d'un système
d'exploitation pour exécuter des programmes.
programme de configuration — Programme utilisé pour
installer et configurer le matériel et le logiciel. Le
programme setup.exe ou install.exe est généralement livré
avec la plupart des progiciels Windows. Il ne faut pas
confondre programme de configuration et programme de
configuration du système.
programme de configuration du système — Utilitaire qui
joue le rôle d'interface entre le matériel informatique et le
système d'exploitation. Le programme de configuration du
système vous permet de configurer les options
sélectionnables par l'utilisateur dans le BIOS, comme la
date et l'heure ou le mot de passe système. Ne modifiez les
paramètres de ce programme que si vous connaissez avec
exactitude les effets de chacun des paramètres sur
l'ordinateur.
protection en écriture — Fichiers ou supports ne pouvant
pas être modifiés. Utilisez la protection en écriture lorsque
vous voulez empêcher la modification ou la destruction
des données. Pour protéger contre l'écriture une disquette
de 3,5 pouces, faites glisser la languette de protection en
écriture en position ouverte.
PS/2 — Personal System/2 — Type de connecteur
permettant de relier un clavier, une souris ou un pavé
numérique compatible PS/2.
PXE — Pre-boot execution Environment — Norme WfM
(Wired for Management) permettant à des ordinateurs en
réseau sans système d'exploitation d'être configurés et
démarrés à distance.
R
raccourci —Icône permettant d'accéder rapidement à un
programme, fichier, dossier ou lecteur fréquemment
utilisé. En double-cliquant sur un raccourci placé sur
votre bureau Windows, vous pouvez ouvrir le dossier ou le
fichier correspondant sans avoir à le rechercher au
préalable. Les raccourcis ne modifient pas l'emplacement
des fichiers. Si vous supprimez un raccourci, le fichier
original n'est pas affecté. Vous pouvez également
renommer un raccourci.
RAID — Ensemble redondant de disques
indépendants — Méthode assurant la redondance des
données. Parmi les implémentations courantes de RAID :
RAID 0, RAID 1, RAID 5, RAID 10 et RAID 50.
RAM — Random-Access Memory — Zone principale de
stockage temporaire pour les instructions et les données
des programmes. Toute information stockée dans la RAM
est définitivement perdue lorsque vous éteignez
l'ordinateur.
résolution — Netteté et clarté d'une image produite par
une imprimante ou affichée sur un moniteur. Plus la
résolution est élevée, plus l'image est nette.
résolution vidéo — Voir résolution.
RFI — Radio Frequency Interference (interférence de
fréquence radio) — Interférence générée à des fréquences
radio caractéristiques, entre 10 kHz et 100 000 MHz. Les
fréquences radio se trouvent à l'extrémité inférieure du
spectre de fréquences électromagnétiques et sont plus
susceptibles de présenter des perturbations que les
radiations de plus haute fréquence, telles que les
infrarouges et la lumière.
ROM — Read-Only Memory (mémoire morte) —
Mémoire qui stocke des données et programmes que
l'ordinateur ne peut pas supprimer ou dans laquelle il ne
peut pas écrire. À la différence de la mémoire RAM, la
mémoire ROM conserve son contenu même après l'arrêt
de l'ordinateur. Certains programmes essentiels au
fonctionnement de l'ordinateur se trouvent dans la
mémoire morte.
RPM — Revolutions Per Minute (tours par minute) —
Mesure le nombre de rotations effectuées par minute. La
vitesse des disques durs est souvent mesurée en RPM.
RTC — Real Time Clock (horloge temps réel) — Horloge
alimentée par pile, située sur la carte système, qui
conserve la date et l'heure après l'arrêt de l'ordinateur.
RTCRST — Real Time Clock Reset — Cavalier sur la
carte système de certains ordinateurs pouvant souvent
être utilisé pour résoudre les problèmes.
S
sauvegarde — Copie d'un programme ou d'un fichier de
données sur une disquette, un CD ou un disque dur. Il est
prudent de sauvegarder régulièrement les fichiers de
données de votre disque dur.180 Glossaire
ScanDisk — Utilitaire Microsoft qui recherche les erreurs
présentes dans les fichiers et les dossiers, ainsi que sur la
surface du disque dur. ScanDisk s'exécute souvent lorsque
vous redémarrez l'ordinateur après un blocage.
SDRAM — Synchronous Dynamic Random-Access
Memory — Type de mémoire vive dynamique (DRAM)
synchronisée avec la vitesse d'horloge optimale du
microprocesseur.
SDRAM DDR — SDRAM à double débit de données —
Type de SDRAM doublant les cycles de données en rafale
et améliorant les performances du système.
SDRAM DDR2 — SDRAM à double débit de
données 2 — Type de SDRAM DDR qui utilise une pré-
extraction de 4 bits et d'autres modifications
architecturales pour passer la vitesse de la mémoire à plus
de 400 MHz.
segmentation des données — Technique de répartition
des données sur plusieurs lecteurs de disque. La
segmentation des données peut accélérer les opérations de
récupération des données sur les disques. Les ordinateurs
utilisant la segmentation des données permettent
généralement à l'utilisateur de sélectionner la taille des
unités de données ou la taille des segments.
séquence d'amorçage — Précise l'ordre des périphériques
à partir desquels l'ordinateur tente de s'amorcer.
station d'accueil — Voir APR.
SIM — Module d'identité d'abonné. Une carte SIM
contient une micropuce qui crypte les transmissions
vocales et de données. Les cartes SIM peuvent être
utilisées avec des téléphones ou des ordinateurs portables.
sortie TV S-vidéo — Connecteur permettant de relier des
périphériques audio numériques ou un téléviseur à
l'ordinateur.
souris — Dispositif de pointage qui contrôle le
mouvement du curseur à l'écran. Il suffit de faire glisser la
souris sur une surface plane et rigide pour déplacer le
pointeur ou le curseur à l'écran.
S/PDIF — Sony/Philips Digital Interface — Format de
fichier de transfert audio permettant de transférer des
données audio entre deux fichiers sans conversion
préalable au format analogique, ce qui pourrait dégrader
la qualité du fichier.
Strike Zone™ — Zone renforcée de la base de la plateforme qui offre une protection au disque dur en servant
d'amortisseur en cas de choc résonnant ou de chute de
l'ordinateur (allumé ou éteint).
SVGA — Super-Video Graphics Array — Norme utilisée
pour les cartes et les contrôleurs vidéo. Les résolutions
SVGA types sont de 800 sur 600 et 1024 sur 768.
Le nombre de couleurs et la résolution affichés par un
programme dépendent des capacités du moniteur, du
contrôleur vidéo et de ses pilotes, ainsi que de la quantité
de mémoire vidéo installée dans l'ordinateur.
SXGA — Super-extended Graphics Array — Norme
utilisée pour les cartes et les contrôleurs vidéo qui prend
en charge les résolutions allant jusqu'à 1280 sur 1024.
SXGA+ — Super-extended Graphics Array plus —
Norme utilisée pour les cartes et les contrôleurs vidéo qui
prend en charge les résolutions allant jusqu'à 1400 sur
1050.
T
TAPI — Telephony Application Programming
Interface — Permet aux programmes Microsoft Windows
de fonctionner avec de nombreux périphériques de
téléphonie (voix, données, télécopie et vidéo).
taux de rafraîchissement — Fréquence, mesurée en Hz, à
laquelle les lignes horizontales de l'écran sont rechargées
(on parle parfois aussi de fréquence verticale). Plus le taux
de rafraîchissement est élevé, moins le scintillement vidéo
est perceptible à l'œil nu.
Technologie sans fil Bluetooth® — Norme technologique
sans fil pour les périphériques de mise en réseau de courte
portée (9 m [29 pieds]) permettant aux périphériques
activés de se reconnaître automatiquement.
U
UMA — allocation de mémoire unifiée — Mémoire
système allouée de manière dynamique à la mémoire
vidéo.Glossaire 181
USB — Universal Serial Bus — Interface matérielle pour
les périphériques lents comme un clavier, une souris, une
manette de jeu, un scanner, un jeu de haut-parleurs, une
imprimante, des périphériques large bande (DSL et
modems par câble), des périphériques d'imagerie ou de
stockage compatibles USB. Les périphériques sont
branchés directement à un support à 4 broches de votre
ordinateur, ou à un concentrateur à plusieurs ports qui se
raccorde à votre ordinateur. Les périphériques USB
peuvent être connectés et déconnectés lorsque
l'ordinateur est sous tension et peuvent également être
connectés en guirlande.
UTP — Unshielded Twisted Pair (paire torsadée non
blindée) — Type de câble utilisé dans la plupart des
réseaux téléphoniques et dans certains réseaux
informatiques. Les paires de câbles non blindés sont
torsadées afin de les protéger contre les interférences
électromagnétiques et sont utilisées à la place des câbles
comportant une gaine métallique autour de chaque paire
de fils.
UXGA — Ultra-extended Graphics Array — Norme
utilisée pour les cartes et les contrôleurs vidéo qui prend
en charge les résolutions allant jusqu'à 1600 sur 1200.
V
V — Volt — Unité de mesure de la puissance électrique
ou de la force électromotrice. Un V est mesuré sur une
résistance de 1 ohm lorsqu'elle est traversée par un
courant de 1 ampère.
virus — Programme conçu pour nuire ou détruire les
données stockées sur votre ordinateur. Un virus se déplace
d'un ordinateur à un autre par l'intermédiaire d'une
disquette infectée, d'un logiciel téléchargé à partir
d'Internet ou de pièces jointes à des messages
électroniques. Lorsque vous démarrez un programme
infecté, le virus intégré démarre lui aussi.
Un type courant de virus est le virus d'amorçage, qui est
stocké dans les secteurs d'amorçage d'une disquette. Si
vous laissez la disquette dans le lecteur lorsque vous
éteignez puis rallumez l'ordinateur, celui-ci est infecté lors
de la lecture des secteurs d'amorçage de la disquette, à la
recherche du système d'exploitation. Si l'ordinateur est
infecté, le virus d'amorçage peut se reproduire sur toutes
les disquettes lues ou écrites sur cet ordinateur jusqu'à son
éradication.
vitesse de bus — Vitesse, en MHz, qui indique la rapidité
avec laquelle un bus peut transférer des informations.
vitesse d'horloge — Vitesse, en MHz, qui indique la
rapidité avec laquelle les composants de l'ordinateur
connectés au bus système fonctionnent.
W
W — Watt — Mesure du courant électrique. Un watt est
1 ampère de courant dont le débit est de 1 volt.
Wh — Wattheure — Unité de mesure utilisée
couramment pour indiquer la capacité approximative
d'une batterie. Par exemple, une batterie de 66 Wh peut
fournir 66 W de courant pendant 1 heure ou 33 W
pendant 2 heures.
WLAN — réseau local sans fil. Ensemble d'ordinateurs
interconnectés qui communiquent entre eux par les ondes
aériennes et qui utilisent des points d'accès ou des
routeurs pour fournir un accès Internet.
WWAN — réseau étendu sans fil. Réseau de données haut
débit sans fil utilisant la technologie cellulaire et couvrant
une zone géographique plus grande que celle couverte par
le WLAN.
WXGA — wide-aspect extended graphics array — Norme
utilisée pour les cartes et les contrôleurs vidéo qui prend
en charge les résolutions allant jusqu'à 1280 sur 800.
X
XGA — Extended Graphics Array —Norme utilisée pour
les cartes et les contrôleurs vidéo qui prend en charge les
résolutions allant jusqu'à 1024 sur 768.182 Glossaire
Z
ZIF — Zero Insertion Force — Type de connecteur ou de
support permettant l'installation ou le retrait d'une puce
sans forcer sur la puce ou le support.
Zip — Format courant de compression des données. Les
fichiers compressés au format Zip sont appelés fichiers
Zip et portent en général l'extension .zip. Un type spécial
de fichier zippé/compressé est un fichier à extraction
automatique, dont l'extension est .exe. Pour décompresser
un fichier à extraction automatique, double-cliquez
dessus.
zone de notification — Voir barre d'état système.Index 183
Index
A
Aide QuickSet, 14
alimentation
filtres de ligne, 30
mode Mise en veille
prolongée, 40
mode Veille, 40
modes de gestion de
l'alimentation, 38
parasurtenseurs, 30
périphériques de
protection, 30
problèmes, 97
UPS, 30
alimentation sans
interruption. Voir UPS
Assistant Transfert de fichiers
et de paramètres, 26
assistants
Assistant Compatibilité des
programmes, 94
Assistant Transfert de fichiers
et de paramètres, 26
audio numérique S/PDIF
activation, 62
audio. Voir son
B
baie modulaire
permutation des
périphériques, 116
vis de fixation de
périphérique, 116
barre des tâches
icône QuickSet, 133
barres d'outils
réglage de la taille, 133
batterie
chargement, 41
description, 23
indicateur de charge, 38
jauge, 38
performances, 37
préservation de
l'alimentation, 39
retrait, 41
stockage, 42
vérification de la charge, 38
bouton d'éjection du plateau
du lecteur optique
description, 21
boutons de commande
multimédia
bouton Dell MediaDirect, 46
description, 17
lecture/pause/Dell
MediaDirect, 17
C
cache de la charnière
retrait, 127
cache du modem
description, 24
cache du module de
mémoire, 23
caches
ExpressCard, 65
retrait, 67, 70
caractéristiques, 157
carnet, 136
carte dotée de la technologie
sans fil Bluetooth
installation, 130
voyant d'état de l'appareil, 18
cartes ExpressCard
caches, 67
installation, 65
retrait, 67
cartes mémoire multimédia
caches, 70
installation, 69
logements, 68
retrait, 70
technologie CardBus, 68
types, 68
casque Dolby,
configuration, 62184 Index
184 Index
CD
lecture, 43
système d'exploitation, 14
CD Drivers and Utilities, 103
CD Operating System, 14
CD ResourceCD
Dell Diagnostics, 81, 84
Centre d'aide et de
support, 14
clavier
description, 17
pavé numérique, 33
problèmes, 92
raccourcis, 34
retrait, 129
conflits
incompatibilités logicielles et
matérielles, 104
conflits de requête
d'interruption, 104
connecteur de sortie TV Svidéo
description, 20
connecteur IEEE 1394
description, 20
problèmes, 92
connecteur modem
description, 21
connecteur réseau
description, 22
connecteur vidéo
description, 22
connecteurs audio, 20
connecteurs USB
description, 21-22
connexion
périphérique audio, 50
réseau large bande mobile, 76
téléviseur, 50
WLAN, 72
connexion Internet
à propos de, 25
configuration, 25
options, 25
consignes de sécurité, 11
contrat de licence pour
utilisateur final, 11
D
Dell
contacter, 137, 170
politique de support, 169
site de support, 13
Dell Diagnostics
à propos de, 81, 84
démarrage à partir du disque
dur, 81
Démarrage de Dell Diagnostics
à partir du CD Drivers and
Utilities, 82
Dell MediaDirect, 17
à propos de, 46
problèmes, 95
dépannage
Centre d'aide et de support, 14
conflits, 104
Dell Diagnostics, 81, 84
Dépanneur des conflits
matériels, 104
problèmes de clavier
externe, 92
restauration de l'état de
fonctionnement précédent
de l'ordinateur, 105
Dépanneur des conflits
matériels, 104
diagnostics
Dell, 81, 84
disque dur
description, 24
problèmes, 86
remplacement, 113
retour à Dell, 115
documentation
contrat de licence pour
utilisateur final, 11
en ligne, 13
ergonomie, 11
garantie, 11
guide d'information sur le
produit, 11
réglementaire, 11
sécurité, 11
DVD
lecture, 43
E
écran
basculement de l'image
vidéo, 31
description, 16
réglage de la luminosité, 31
réglage de la taille des barres
d'outils, 133Index 185
réglage de la taille des
icônes, 133
résolution, 31
écran. Reportez-vous à
moniteur
emplacement pour câble de
sécurité
description, 19
étiquette Microsoft
Windows, 12
étiquettes
Microsoft Windows, 12
numéro de service, 12
ExpressCard
caches, 65
étendue, 65
logements, 65
technologie CardBus, 65
types, 65
F
fichier d'aide
Centre d'aide et de support de
Windows, 14
fixation
vis de fixation de
périphérique, 116
G
gestion de l'alimentation
préservation de l'alimentation
par batterie, 39
QuickSet, 133
réglage des paramètres, 133
guide d'information sur le
produit, 11
H
haut-parleur
problèmes, 99
volume, 99
haut-parleurs
description, 17
I
icônes
réglage de la taille, 133
imprimante
câble, 29
configuration, 28
connexion, 28
problèmes, 98
USB, 29
informations
réglementaires, 11
informations relatives à
l'ergonomie, 11
informations sur la
garantie, 11
L
large bande mobile (WWAN)
connexions réseau, 76
lecteur de carte mémoire
multimédia 5 en 1, 68
lecteur de CD
problèmes, 85
lecteur de CD-RW
problèmes, 85
lecteur de disquette
branchement sur un
connecteur USB, 21-22
lecteur de DVD
problèmes, 85
lecteur optique
description, 21
lecteurs
problèmes, 85
Voir disque dur
lecture de CD, 43
lecture de DVD, 43
log, 104
logement de carte
ExpressCard
description, 20
logiciel
problèmes, 95
logiciel de suivi
protection de votre
ordinateur, 80
logiciel espion, 87, 96
logiciels
problèmes, 94
loquet de fermeture de la baie
de batterie, 23
loquet de l'écran, 18
luminosité
réglage, 31186 Index
186 Index
M
matériel
conflits, 104
Dell Diagnostics, 81, 84
mémoire
ajout, 118, 120
installation, 117
retrait, 118, 121
messages
erreur, 87
messages d'erreur, 87
mode Mise en veille
prolongée, 40
mode Veille
à propos de, 40
modem
installation, 123
moniteur
basculement de l'image
vidéo, 31
problèmes, 100
mots de passe
à propos de, 79
oubli, 80
N
nettoyage
tablette tactile, 167
numéro de service, 12
O
ordinateur
blocage, 94
blocages, 94
caractéristiques, 157
faibles performances, 87, 96
ne répond plus, 94
protection, 80
restauration de l'état de
fonctionnement
précédent, 105
ordinateur perdu, 80
ordinateur volé, 80
P
pavé
numérique, 33
PC Restore, 107
périphérique audio
activation, 62
connexion, 50
pilotes
à propos de, 102
identification, 102
réinstallation, 102
problème
scanner, 98
problèmes
alimentation, 97
blocage de l'ordinateur, 94
blocages, 94
blocages de l'ordinateur, 94
blocages répétés de
l'ordinateur, 94
clavier, 92
compatibilité des programmes
et de Windows, 94
conditions du voyant
d'alimentation, 97
connecteur IEEE 1394, 92
Dell Diagnostics, 81, 84
Dell MediaDirect, 95
disque dur, 86
écran bleu, 94
faibles performances de
l'ordinateur, 87, 96
haut-parleurs, 99
imprimante, 98
l'ordinateur ne répond plus, 94
lecteur de CD, 85
lecteur de CD-RW, 85
lecteur de DVD, 85
lecteurs, 85
logiciel, 94-95
logiciel espion, 87, 96
logiciels, 94
messages d'erreur, 87
non démarrage de
l'ordinateur, 94
réseau, 96
restauration de l'état précédent
du système
d'exploitation, 105
support technique, 169
vidéo et moniteur, 100
programme de configuration
du système
affichage, 165
écrans, 165
options fréquemment
utilisées, 166
protection de votre
ordinateur, 79Index 187
Q
QuickSet, 34, 46, 133
R
RAM. Voir mémoire
réinstallation
Windows XP, 105
réseau
problèmes, 96
QuickSet, 133
résolution
réglage, 31
Restauration du système, 105
restauration du système, 105
S
sans fil
marche/arrêt, 133
scanner
problèmes, 98
séquence d'amorçage, 166
site Web de support, 13
Site Web Premier Support de
Dell, 11
son
problèmes, 99
volume, 99
support
contacter Dell, 137, 170
politique, 169
support technique
politique, 169
système d'exploitation
CD, 14
réinstallation, 14
réinstallation de Windows
XP, 105
T
tablette tactile
description, 17
nettoyage, 167
personnalisation, 36
technologie CardBus
cartes mémoire
multimédia, 68
ExpressCard, 65
téléviseur
connexion, 50
transfert d'informations vers
un nouvel ordinateur, 26
U
UPS, 30
V
ventilateur
description, 19, 24
Vérifier disque, 86
vidéo
problèmes, 100
vis de fixation de
périphérique
à propos de, 116
volume
réglage, 99
voyager avec l'ordinateur
avion, 136
conseils, 136
emballage, 135
étiquette d'identification, 135
voyant d'alimentation
conditions, 97
voyants d'état de l'appareil, 16
voyants d'état du clavier
description, 18
W
Windows XP
Assistant Compatibilité des
programmes, 94
Assistant Transfert de fichiers
et de paramètres, 26
Centre d'aide et de support, 14
Dépanneur des conflits
matériels, 104
mode Mise en veille
prolongée, 40
mode Veille, 40
réinstallation, 14, 105
Restauration des pilotes de
périphériques, 103
Restauration du système, 105
restauration du système, 105
WLAN, 71188 Index
188 Index
Dellt Tower UPS
500W, 1000W, and 1920/1500W
Getting Started With
Your System
Démarrage avec votre système
Erste Schritte Mit Ihrem System
Начало работы c вашей системой
Inicio de su sistema
系统使用 入门指南
系統使用 入門指南
사용자의 시스템 시작하기
はじめに システムについて
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.comDellt Tower UPS
500W, 1000W, and 1920/1500W
Getting Started
With Your System
Démarrage avec votre système
Erste Schritte Mit Ihrem System
Начало работы c вашей системой
Inicio de su sistema
系统使用 入门指南
系統使用 入門指南
사용자의 시스템 시작하기
はじめに システムについて
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.comNotes and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your software.
CAUTION: A CAUTION indicates a potentially hazardous situation which, if not avoided, may result in minor or
moderate injury or in property damage incidents.
WARNING: A WARNING indicates a potentially hazardous situation which, if not avoided, could result in death or
injury.
DANGER: A DANGER indicates an imminently hazardous situation which, if not avoided, will result in death or
serious injury.
DANGER: Observe the following instruction to help prevent an imminently hazardous situation which, if not
avoided, will result in death or serious injury:
S This UPS contains LETHAL VOLTAGES. All repairs and service should be performed by
AUTHORIZED SERVICE PERSONNEL ONLY. There are NO USER SERVICEABLE PARTS
inside the UPS.
Information in this document is subject to change without notice.
E 2009 Dell Inc. All rights reserved.
Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell and the DELL logo are trademarks of Dell Inc.; Phillipsis a registered trademark of Phillips Screw
Company.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their
products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
July 2009System Features |
1
System Features
Providing outstanding performance and reliability, the UPS's unique benefits include:
S Buck and Boost voltage regulation that ensures regulated voltage to your load by correcting voltage
fluctuations.
S Start-on-battery capability for powering up the UPS even if utility power is not available.
S Extended runtime with an optional External Battery Module (EBM) for 1000–1920W UPS
models.
S Two standard communication ports (USB and DB-9 serial port).
S Optional Dell Network Management Card with enhanced communication capabilities for
increased power protection and control.
S Network transient protector that guards your network communications equipment from surges.
S Advanced power management with the Dell UPS Management Software for graceful shutdowns
and power monitoring.
S Sequential shutdown and load management through separate receptacle groups called load
segments.
S Firmware that is easily upgradable without a service call.
S Backed by worldwide agency approvals.2 |
Finding Information
Finding Information
CAUTION: The Safety, Environmental, and Regulatory Information document provides important safety and
regulatory information.
What are You Looking For? Find It Here
S The user's guide for my UPS
S The user's guide for the Dell Network Management
Card
S Dell UPS Management Software
NOTE:Documentation and software updates can be
found at support.dell.com.
Dell UPS Disc
S Specifications
S How to configure UPS settings
S How to troubleshoot and solve problems
Dell UPS User's Guide
The user's guide is available on the Dell UPS disc and
on support.dell.com.
S Safety instructions
S Regulatory information
S Recycling information
Safety, Environmental, and Regulatory Information
S Warranty information
S Terms and Conditions (U.S. only)
S End User License Agreement
Dell Warranty and Support Information
S Support information Dell Support Website — support.dell.com
NOTE: Select your region or business segment to view
the appropriate support site.Installation and Startup |
3
Installation and Startup
CAUTION: Before performing the procedures in this document, read and follow the safety instructions and
important regulatory information in your Safety, Environmental, and Regulatory Information document.
CAUTION: The cabinet is heavy [500W: 11.6 kg (25.6 lb); 1000W: 18.3 kg (40.3 lb); 1920/1500W: 30.5 kg (67.2 lb)].
Use caution to unpack and move the cabinet.
This section describes the steps to set up your system for the first time.
Unpacking the System
1 Unpack your system and identify each item.
2 Discard or recycle the packaging in a responsible manner, or store it for future use.4 |
Installation and Startup
Identifying the UPS
This section shows a front and rear panel of the Dell Tower UPS. Refer to the Dell Line-Interactive
Tower UPS 500W, 1000W, and 1920/1500W User's Guide for all rear panel details.
Cover Latch
Cover Latch
LCD Panel
Scroll Button (Up or Back)
Select Button
Scroll Button (Down or Forward)
Figure 1. The Dell Tower UPS
Communication Port
Six 5-15 Receptacles
(Load Segment 1)
Network Transient
Protector
USB Port
UPS Communication Bay
On/Off Button
IEC-C14 Input
Connector
Two 5-15 Receptacles
(Load Segment 2)
EBM Connector
Figure 2. UPS Rear Panel (1000W, 120V Rear Panel)Installation and Startup |
5
Removing the UPS Front Cover
3 Remove the UPS front cover.
Push the two cover latches to release the front cover and pull up.
Removing the Battery Cover
4 Unscrew the thumbscrew on the the metal battery cover and lift up to remove the cover.6 |
Installation and Startup
Connecting the Internal Battery Connector
5 Connect the internal battery connector.
6 Replace the metal battery cover.
Torque the screw to 0.7 Nm (6.2 lb in).
7 Replace the UPS front cover.Installation and Startup |
7
Connecting the Equipment
9
Connect equipment to UPS
Connect communication cable from
computer to UPS (optional)
8
8 If you plan to use Dell UPS Management Software, connect your computer to the USB port or
RS-232 port using the supplied cable.
9 Plug the equipment to be protected into the UPS output receptacles, but do not turn on the
protected equipment.
NOTE: Verify that the total equipment ratings do not exceed the UPS capacity to prevent an overload alarm.8 |
Installation and Startup
Connecting the Power Cord
10 Verify that the power input to the UPS has adequate upstream overcurrent protection:
Table 1. Minimum Upstream Circuit Breaker Rating
UPS Output Power 120V 208V 230V
500W 15A — 15A
1000W 15A — 15A
1500W (at 100V)
1920W
20A — 15A
11 Plug the UPS power cord into a power outlet.
NOTE: For 1920/1500W models. There are two power cords in the box, one with BSMI and PSE certified
markings that can be used in Taiwan and Japan, another cord is for regions other than Taiwan and Japan.Installation and Startup |
9
Starting the UPS
12 Press the button on the UPS rear panel.
Completing the Startup
13 Verify that the Normal icon appears on the UPS status summary screen, indicating that the
UPS is operating normally and any loads are powered.
14 On the UPS status summary screen, press the button to check for active alarms or notices.
Resolve any active alarms before continuing. See “Troubleshooting” in the Dell Line-Interactive
Tower UPS 500W, 1000W, and 1920/1500W User's Guide.
If there are no active alarms, a “No Active Alarms” message appears.
15 To change other factory-set defaults, see “Operation” in the Dell Line-Interactive Tower UPS
500W, 1000W, and 1920/1500W User's Guide.10 |
Installation and StartupOnduleur Tour Dellt
500 W, 1000 W et 1920/1500 W
Démarrage
avec votre système
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.comRemarques et avertissements
REMARQUE : Une REMARQUE indique des informations importantes qui vous aident à mieux utiliser votre logiciel.
DANGER : Un DANGER indique une situation dangereuse imminente qui, si elle n'est pas évitée, provoquera la
mort ou une blessure grave.
AVERTISSEMENT : Un AVERTISSEMENT indique une situation dangereuse potentielle qui, si elle n'est pas évitée,
pourrait provoquer la mort ou une blessure.
ATTENTION : Une ATTENTION indique une situation dangereuse potentielle qui, si elle n'est pas évitée, peut
provoquer une blessure mineure ou légère ou des dommages matériels.
DANGER : Respectez les instructions suivantes pour aider à empêcher une situation dangereuse imminente qui, si
elle n'est pas évitée, peut provoquer la mort ou des blessures graves :
S Cet onduleur contient desTENSIONS MORTELLES. Toutes les réparations et tous
les entretiens devront être effectués UNIQUEMENT PAR UN PERSONNEL
D’ENTRETIEN AGRÉÉ. Aucune pièce à l’intérieur de cet onduleur NE PEUT
ÊTRE ENTRETENUE PAR L’UTILISATEUR.
Les informations dans ce document sont soumises à modifications sans préavis.
E 2009 Dell Inc. Tous droits réservés.
La reproduction de quelque manière que ce soit sans autorisation écrite de Dell Inc. est strictement interdite.
Marques commerciales utilisées dans ce texte : Dell et le logo DELL sont des marques commerciales de Dell Inc. ; Phillips est une marque
déposée de Phillips Screw Company.
D’autres marques commerciales et noms commerciaux peuvent être utilisés dans ce document pour se référer à des entités revendiquant les
marques et les noms ou leurs produits. Dell Inc. rejette tout intérêt propriétaire dans les marques commerciales et les noms commerciaux ne
lui appartenant pas.
Julliet 2009Caractéristiques du système |
13
Caractéristiques du système
Offrant une fiabilité et des performances remarquables, les avantages uniques de l'onduleur
comprennent :
S La régulation de tension Buck and Boost qui assure une tension régulée à votre charge en
corrigeant les fluctuations de tension.
S La capacité de démarrage-sur-batterie pour alimenter l'onduleur même si le courant du secteur
n'est pas disponible.
S Temps d'exécution prolongé avec un Module de batterie externe (EBM) en option pour les
modèles d'onduleur 1000–1920 W.
S Deux ports de communication standards (port série DB-9 et USB).
S Carte de gestion de réseau Dell optionnelle avec capacités de communication améliorées pour une
protection et un contrôle accrus de l'alimentation électrique.
S Protecteur de réseau contre les phénomènes transitoires qui protège votre équipement de
communication réseau contre les surtensions.
S Gestion avancée de l'alimentation électrique avec le Logiciel de gestion d'onduleur Dell pour des
coupures progressives et une surveillance de l'alimentation.
S Arrêt séquentiel et gestion de charge par des groupes de prises séparés appelés « segments de
charge ».
S Micrologiciel qui peut être facilement mis à niveau sans appeler le service technique.
S Soutenu par des approbations d'organismes dans le monde entier.14 |
Trouver des informations
Trouver des informations
ATTENTION! Le document Informations sur la sécurité, l'environnement et la réglementation fournit des
informations importantes sur la sécurité et la réglementation.
Que recherchez-vous ? Trouvez-le ici
S Le guide d'utilisation de mon onduleur
S Le guide d'utilisation de ma Carte de gestion de
réseau Dell
S Logiciel de gestion d'onduleur Dell
REMARQUE : Les mises à jour des documents et des
logiciels se trouvent sur support.dell.com.
Disque de l'onduleur Dell
S Spécifications
S Comment configurer les paramètres de l'onduleur
S Comment identifier et résoudre les problèmes
Guide d'utilisation de l'onduleur Dell
Le guide d'utilisation est disponible sur le disque de
l'onduleur Dell et sursupport.dell.com.
S Instructions sur la sécurit
S Informations sur la réglementation
S Informations sur le recyclage
Informations sur la sécurité, l'environnement et la
réglementation
S Informations sur la garantie
S Termes et conditions (États-Unis uniquement)
S Contrat de licence de l'utilisateur final
Informations sur l'assistance et la garantie Dell
S Informations sur l'assistance Site Internet d'assistance Dell — support.dell.com
REMARQUE : Sélectionnez votre région ou votre segment
commercial pour voir le site d'assistance approprié.Installation et démarrage |
15
Installation et démarrage
ATTENTION! Avant de réaliser les procédures de ce document, lisez et suivez les instructions de sécurité et
les informations importantes sur la réglementation qui figurent dans votre document Informations sur la
sécurité, l'environnement et la réglementation.
ATTENTION! Le module est lourd [500 W : 11,6 kg (25,6 lb) ; 1000 W : 18,3 kg (40,3 lb) ; 1920/1500 W :
30,5 kg (67,2 lb)]. Prenez toutes les précautions nécessaires pour déballer et déplacer le module.
Cette section décrit les étapes de configuration de votre système pour la première fois.
Déballage du système
1 Déballez votre système et identifiez chaque élément.
2 Jetez ou recyclez l'emballage d'une façon responsable, ou conservez-le pour une utilisation
ultérieure.16 |
Installation et démarrage
Identification de l'onduleur
Cette section montre un panneau avant et arrière de l'onduleur Tour Dell. Reportez-vous au Guide
d'utilisation de l'onduleur en baie Line-Interactive 500 W, 1000 W et 1920/1500 W pour tous les détails
sur le panneau arrière.
Loquet du couvercle
Loquet du couvercle
Panneau LCD
Bouton de défilement
(haut ou arrière)
Bouton de sélection
Bouton de défilement (bas ou avant)
Figure 1. Onduleur Tour Dell
Port de communication
Six prises 5-15
(Segment de charge 1)
Protecteur de réseau contre les
phénomènes transitoires
Port USB
Baie de communication de
l'onduleur
Bouton Marche/Arrêt
Connecteur d'entrée
CEI-C14
Deux prises 5-15
(Segment de charge 2)
Connecteur de l'EBM
Figure 2. Panneau arrière de l'onduleur (panneau arrière du 1000 W, 120 V)Installation et démarrage |
17
Retrait du couvercle avant de l'onduleur
3 Retirez le couvercle avant de l'onduleur.
Poussez les deux loquets du couvercle pour libérer le couvercle avant et levez.
Retrait du couvercle des batteries
4 Dévissez la vis à oreilles sur le couvercle métallique des batteries et levez pour retirer le couvercle.18 |
Installation et démarrage
Connexion du connecteur interne des batteries
5 Branchez le connecteur interne des batteries.
6 Remettez en place le couvercle métallique des batteries.
Serrez la vis à un couple de 0,7 N·m (6,2 lb in).
7 Remettez en place le couvercle avant de l'onduleur.Installation et démarrage |
19
Connexion de l'équipement
9
Connectez l'équipement à l'onduleur
Connectez le câble de communication de
l'ordinateur à l'onduleur (en option)
8
8 Si vous prévoyez d'utiliser le Logiciel de gestion d'onduleur Dell, connectez votre ordinateur au
port USB ou RS-232 en utilisant le câble fourni.
9 Branchez l'équipement à protéger sur les prises de sortie de l'onduleur, mais ne mettez pas
l'équipement à protéger sous tension.
REMARQUE: Pour éviter une alarme de surcharge, vérifiez que les valeurs nominales totales de l'équipement
ne dépassent pas la capacité de l'onduleur.20 |
Installation et démarrage
Connexion du cordon d'alimentation
10 Vérifiez que l'entrée d'alimentation de l'onduleur possède une protection contre les surintensités
montantes compatible avec la valeur nominale de l'intensité pouvant être acheminée par le
cordon d'alimentation.
11 Vérifiez que l'entrée d'alimentation vers l'onduleur possède une protection adéquate contre des
surintensités montantes :
Tableau 1. Valeur nominale minimale du disjoncteur amont
Puissance de sortie de l'onduleur 120 V 208 V 230 V
500 W 15 A — 15 A
1000 W 15 A — 15 A
1500 W (à 100 V)
1920 W
20 A — 15 A
12 Branchez le cordon d'alimentation de l'onduleur à une prise secteur.Installation et démarrage |
21
Démarrage de l'onduleur
13 Appuyez sur le bouton sur le panneau arrière de l'onduleur.
Achèvement du démarrage
14 Vérifiez que l'icône Normal apparaît sur l'écran de résumé d'état de l'onduleur, indiquant que
l'onduleur fonctionne normalement et que toutes les charges sont alimentées.
15 Sur l'écran de résumé d'état de l'onduleur, appuyez sur le bouton pour vérifier les avis et les
alarmes actives. Résolvez toutes les alarmes actives avant de continuer. Voir « Dépannage » dans le
Guide d'utilisation de l'onduleur en baie Line-Interactive 500 W, 1000 W et 1920/1500 W.
Si aucune alarme n'est activée, un message « Aucune alarme active » apparaît.
16 Pour changer d'autres valeurs d'usine par défaut, voir « Fonctionnement » dans le Guide
d'utilisation de l'onduleur en baie Line-Interactive 500 W, 1000 W et 1920/1500 W.22 |
Installation et démarrageDellt Tower USV
500 W, 1000 W, und 1920/1500 W
Erste Schritte
Mit Ihrem System
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.comHinweise und Warnungen
HINWEIS: Ein HINWEIS macht auf eine wichtige Information aufmerksam, mit deren Hilfe Sie Ihre Software optimal
nutzen können.
GEFAHR: GEFAHR macht auf eine unmittelbar gefährliche Situation aufmerksam, die zum Tod oder schweren
Verletzungen führt, wenn sie nicht vermieden wird.
WARNUNG: Eine WARNUNG macht auf eine potenziell gefährliche Situation aufmerksam, die zum Tod oder zu
Verletzungen führt, wenn sie nicht vermieden wird.
ACHTUNG: ACHTUNG macht auf eine potenziell gefährliche Situation aufmerksam, die zu geringen oder mäßigen
Verletzungen oder Sachschäden führen kann, wenn sie nicht vermieden wird.
GEFAHR: Beachten Sie den folgenden Hinweis, um eine unmittelbar gefährliche Situation zu vermeiden, die zum
Tod oder zu schweren Verletzungen führen könnte:
S Diese USV führt LEBENSGEFÄHRLICHE SPANNUNG. Sämtliche Reparatur--
und Wartungsarbeiten dürfen NUR VON
AUTORISIERTEM WARTUNGSPERSONAL durchgeführt werden. Im Inneren
der USV sind KEINE VOM BENUTZER WARTBAREN TEILEvorhanden.
Unangekündigte Änderungen der Angaben in diesem Dokument vorbehalten.
E 2009 Dell Inc. Alle Rechte vorbehalten.
Die Vervielfältigung, gleich welcher Art, ist ohne schriftliche Genehmigung von Dell Inc. strengstens untersagt.
In diesem Text verwendete Marken: Dell und das DELL--Logo sind Marken von Dell Inc.; Phillipsist eine eingetragene Marke von Phillips
Screw Company.
In diesem Dokument können weitere Marken und Handelsnamen verwendet werden, die sich entweder auf die Personen beziehen, die diese
Marken und Namen für sich beanspruchen , oder auf deren Produkte. Dell Inc. verzichtet auf sämtliche gewerblichen Eigentumsrechte an
Marken und Handelsnamen, bei denen es sich nicht um eigene Marken und Handelsnamen handelt.
Juli 2009Systemmerkmale |
25
Systemmerkmale
Die herausragende Leistung und Zuverlässigkeit sind nur einige der Vorteile der USV-Anlagen. Sie
bieten zudem:
S Spannungsregulierung durch das „Buck and Boost“-Verfahren. Dies gewährleistet durch die
Korrektur von Unregelmäßigkeiten einen gleichbleibenden Spannungswert für Ihre Anlagen.
S Starten der Anlage im Batteriebetrieb zum Versorgen der USV mit Strom, selbst wenn kein
Netzstrom zur Verfügung steht.
S Erweiterte Laufzeit mit optionalem Externes Batteriemodul (EBM) für USV-Modelle für
1000-1920 W.
S Serienmäßige Ausstattung mit zwei Kommunikationsschnittstellen (USV-Schnittstelle und serielle
DB-9-Schnittstelle).
S Optionale Dell Netzwerkmanagementkarte mit erweiterten Kommunikationsmöglichkeiten für
verbesserten Leistungsschutz und Kontrolle.
S Netzwerkschutzeinrichtungen schützen Ihre Anlage für Netzwerkkommunikation vor
Spannungsspitzen.
S Fortgeschrittene Stromüberwachung mit der Dell USV Management Software für sicheres
Herunterfahren und Stromüberwachung.
S Abschaltsequenz und Lastenmanagement durch separate Anschlussgruppen (sogenannte
Lastsegmente).
S Firmware, die sich einfach und ohne Wartungsdienst aktualisieren lässt.
S Entspricht einschlägigen Normen auf der ganzen Welt.26 |
Auffinden von Informationen
Auffinden von Informationen
ACHTUNG: Im Dokument Informationen zu Sicherheit, Umweltschutz und Ordnungsvorschriften finden Sie
wichtige Sicherheitshinweise und Informationen zu gesetzlichen Bestimmungen.
Was suchen Sie? Hier finden Sie es
S Die Benutzeranleitung für meine USV
S Die Benutzeranleitung für die Dell
Netzwerkmanagementkarte
S Dell USV Management Software
HINWEIS:Dokumente und Softwareaktualisierungen
finden Sie unter support.dell.com.
Die Disk für die Dell USV
S Spezifikationen
S Anleitung zum Konfigurieren der
USV-Einstellungen
S Behebung von Fehlern und Lösung von Problemen
Benutzeranleitung der Dell USV
Die Benutzeranleitung finden Sie auf der Disk zu der
Dell USV und auch untersupport.dell.com.
S Sicherheitshinweise
S Informationen über Ordnungsvorschriften
S Recycling-Informationen
Informationen zu Sicherheit, Umweltschutz und
Ordnungsvorschriften
S Garantieerklärung
S AGB (nur USA)
S Lizenzvereinbarung für Endbenutzer
Informationen zu Garantie und Support von Dell
S Supportinformationen Support-Website von Dell – support.dell.com
HINWEIS: Wählen Sie Ihre Region bzw. Ihre Branche
aus, um die geeignete Support-Website aufzurufen.Installation und Inbetriebnahme |
27
Installation und Inbetriebnahme
ACHTUNG: Vor der Ausführung der Verfahren in diesem Dokument lesen Sie bitte die Sicherheitshinweise
und wichtigen Informationen zu Ordnungsvorschriften in Ihrem Dokument überInformationen zu Sicherheit,
Umweltschutz und Ordnungsvorschriften und halten Sie diese unbedingt ein.
:ACHTUNG: Das Gehäuse ist schwer [500 W: 11,6 kg (25,6 lb); 1000 W: 18,3 kg (40,3 lb); 1920/1500 W: 30,5 kg
(67,2 lb)]. Beim Auspacken und Transportieren des Gehäuses ist Vorsicht geboten.
In diesem Abschnitt werden die Schritte für die Erstkonfiguration Ihres Systems beschrieben.
Auspacken des Systems
1 Packen Sie das System aus und identifizieren Sie die einzelnen Komponenten.
2 Entsorgen oder recyceln Sie die Verpackung in umweltbewusster Weise, oder bewahren Sie sie für
den späteren Gebrauch auf.28 |
Installation und Inbetriebnahme
Beschreibung der USV
In diesem Abschnitt wird die Vorder- und Rückansicht der Dell Tower USV angezeigt. Alle
Einzelheiten zur Rückseite finden Sie in der Dell Line-Interactive Tower USV 500 W, 1000 W, und
1920/1500 W Benutzeranleitung.
Abdeckungslasche
Abdeckungslasche
LCD-Anzeigen
Bildlauftaste (aufwärts oder rückwärts)
Auswahltaste
Bildlauftaste (abwärts oder vorwärts)
Abbildung 1. Die Dell Tower USV
Kommunikationsschnittstelle
Sechs 5-15-Anschlussdosen
(Lastsegment 1)
Netzwerk-Transienten
Schutz
USB-Schnittstelle
Kommunikationssteckplatz der USV
Ein-/Ausschalttaste
IEC-C14-Eingangsanschluss
Zwei 5-15-Anschlussdosen
(Lastsegment 2)
EBM-Anschluss
Abbildung 2. Rückseite der USV (1000 W, 120 V)Installation und Inbetriebnahme |
29
Entfernen der vorderen USV-Abdeckung
3 Entfernen Sie die vordere USV-Abdeckung.
Drücken Sie auf die beiden Abdeckungslaschen, um die vordere Abdeckung zu lösen, und
ziehen Sie diese hoch.
Entfernen der Batterieabdeckung
4 Lösen Sie die Rändelschraube auf der metallenen Batterieabdeckung und heben Sie die
Abdeckung hoch, um sie zu entfernen.30 |
Installation und Inbetriebnahme
Anklemmen des Anschlusses im Inneren der Batterie
5 Klemmen Sie den Anschluss im Inneren der Batterie an.
6 Setzen Sie die die Batterieabdeckung aus Metall wieder ein.
Drehen Sie die Schraube mit einem Drehmoment von 0,7 Nm (6,2 lb in) wieder ein.
7 Bringen Sie die vordere Abdeckung der USV wieder an.Installation und Inbetriebnahme |
31
Anschließen der Anlage
9
Schließen Sie die Anlage an die USV an
Schließen Sie das Kommunikationskabel vom
Computer an die USV an (optional)
8
8 Sofern Sie die Benutzung der Dell USV Management Software planen, schließen Sie Ihren
Computer mit dem beiliegenden Kabel an die USB-Schnittstelle oder an die RS-232-Schnittstelle
an.
9 Stecken Sie Stecker der zu schützenden Geräte in die Ausgangsanschlüsse der USV ein, aber
schalten Sie die geschützten Geräte noch nicht ein.
HINWEIS: Vergewissern Sie sich, dass die Gesamtnennleistung aller angeschlossenen Geräte die Kapazität
der USV nicht überschreitet, um einen Überlastalarm zu vermeiden.32 |
Installation und Inbetriebnahme
Anschließen des Netzkabels
10 Vergewissern Sie sich, dass der Stromeingang der USV entsprechend dem Nennstrom des
Netzkabels mit einem Schutz gegen Spannungsspitzen ausgestattet ist.
11 Vergewissern Sie sich, dass der Stromeingang der USV mit einem angemessenen Schutz gegen
Spannungsspitzen ausgestattet ist:
Tabelle 1. Mindestnennstrom der Überstromsicherung
USV-Ausgangsleistung 120 V 208 V 230 V
500 W 15 A — 15 A
1000 W 15 A — 15 A
1500 W (bei 100 V)
1920 W
20 A — 15 A
12 Stecken Sie das Netzkabel der USV in eine Netzsteckdose.Installation und Inbetriebnahme |
33
Starten der USV
13 Drücken Sie die Taste auf der Rückseite der USV.
Abschluss des Startvorgangs
14 Vergewissern Sie sich, dass das Symbol für „Normal“ auf dem Bildschirm der
USV-Statusübersicht angezeigt wird. Hierdurch wird angezeigt, dass die USV ordnungsgemäß
funktioniert und dass alle angeschlossenen Lasten mit Strom versorgt werden.34 |
Installation und Inbetriebnahme
15 Wählen Sie im Bildschirm mit der USV-Statusübersicht die Schaltfläche , um zu prüfen ob eine
aktive Warnmeldung oder ein aktiver Hinweis vorliegt. Lösen Sie alle aktiven Warnmeldungen,
bevor Sie den Vorgang fortsetzen. Siehe „Fehlerbehebung“ in der Dell Line-Interactive Tower USV
500 W, 1000 W, und 1920/1500 W Benutzeranleitung.
Falls keine Warnmeldungen aktiv sind, wird die Meldung „Keine aktiven
Warnmeldungen“ angezeigt.
16 Für die Änderung anderer werkseitiger Standardeinstellungen siehe „Betrieb“ in der Dell
Line-Interactive Tower USV 500 W, 1000 W, und 1920/1500 W Benutzeranleitung.ИБП башенного типа Dellt
500 Вт, 1000 Вт и 1920/1500 Вт
Начало работы
c вашей системой
www.dell.com | support.dell.comПримечания и предупреждения
ПРИМЕЧАНИЕ: Пометка ПРИМЕЧАНИЕ указывает на важную информацию, которая поможет
вам более эффективно использовать свое программное обеспечение.
ОПАСНОСТЬ: Пометка ОПАСНОСТЬ указывает на ситуации, в которых существует
непосредственная угроза, которая, если ее не избежать, приведет к серьезной травме или
летальному исходу.
ПРЕДУПРЕЖДЕНИЕ: Пометка ПРЕДУПРЕЖДЕНИЕ указывает на потенциально опасную
ситуацию, которая, если ее не избежать, может привести к травме или летальному исходу.
ВНИМАНИЕ: Пометка ВНИМАНИЕ указывает на потенциально опасную ситуацию, которая,
если ее не избежать, может привести к травмам легкой и средней степени тяжести или к
повреждению имущества.
ОПАСНОСТЬ: Следуйте приведенным ниже инструкциям, позволяющим предупредить
непосредственную угрозу, которая, если ее не избежать, приведет к серьезной травме или
летальному исходу:
S В устройстве ИБП некоторые узлы находятся под СМЕРТЕЛЬНО ОПАСНЫМ
НАПРЯЖЕНИЕМ. Все работы по ремонту и обслуживанию должны выполняться
ТОЛЬКО УПОЛНОМОЧЕННЫМ ОБСЛУЖИВАЮЩИМ ПЕРСОНАЛОМ. В ИБП НЕТ
УЗЛОВ, ОБСЛУЖИВАЕМЫХ ПОЛЬЗОВАТЕЛЕМ.
Информация в настоящем документе может быть изменена без предварительного уведомления.
E 2009 Dell Inc. Все права защищены.
Воспроизведение данного документа любым способом безписьменного разрешения компании Dell Inc. категорически
запрещено.
Торговые знаки, используемые в данном тексте: Логотипы Dell и DELL являются торговыми знаками компании Dell
Inc.; Phillips является зарегистрированным торговым знаком компании Phillips Screw Company.
Прочие торговые знаки и торговые марки могут использоваться в данном документе для ссылки на организации,
предъявляющие права на эти знаки и марки, или на их товары. Dell Inc. отказывается от любого права собственности
на какие-либо торговые знаки или торговые марки, кроме своих собственных.
Июль 2009 г.Функции системы |
37
Функции системы
Вот уникальные преимущества, обеспечивающие исключительную эффективность и
надежность ИБП:
S Понижающая и повышающая регулировка напряжения обеспечивает подачу
стабильного напряжения на нагрузку путем коррекции колебаний напряжения.
S Функция запуска от батареи используется для питания ИБП даже при отсутствии
питания от электросети.
S Увеличенное время работы при помощи дополнительного модуля Модуль внешней
батареи (EBM) для моделей ИБП 1000 - 1920 Вт.
S Два стандартных коммуникационных порта (USB и последовательный порт DB-9).
S Дополнительная Карта сетевого управления Dell с усовершенствованными
коммуникационными возможностями улучшает защиту питания и его мониторинг.
S Защита от сетевых переходных процессов, которая предохраняет устройства
сетевой связи от скачков.
S Усовершенствованное управление питанием при помощи Программа управления ИБП
Dell обеспечивает корректное выключение нагрузки и мониторинг электропитания.
S Последовательное выключение и управление нагрузкой при помощи раздельных
групп разъемов, называемых сегментами нагрузки.
S Легко обновляемое аппаратно-программное обеспечение; для обновления нет
необходимости обращаться в службу технической поддержки.
S Утверждены международными организациями.38 |
Поиск информации
Поиск информации
ВНИМАНИЕ: Документ Информация о технике безопасности, охране окружающей
среды и нормативная информация содержит важную информацию о технике
безопасности и нормативную информацию.
Что вы ищите? Вы найдете это здесь
S Руководство пользователя для моего ИБП
S Руководство пользователя для карты Карта
сетевого управления Dell
S Программа управления ИБП Dell
ПРИМЕЧАНИЕ: Документация и обновленные
версии ПО можно найти на сайте
support.dell.com.
Диск ИБП Dell
S Спецификации
S Как конфигурировать настройки ИБП
S Как находить и устранять неисправности и
решать проблемы
Руководство пользователя ИБП Dell
Руководство пользователя доступно на диске
ИБП Dell и на сайте support.dell.com.
S Инструкции по технике безопасности
S Нормативная информация
S Информация об утилизации
Информация о технике безопасности, охране
окружающей среды и нормативная
информация
S Информация о гарантии
S Сроки и условия (только для США)
S Лицензионное соглашение с конечным
пользователем
Информация о гарантии и поддержке Dell
S Информация о поддержке Веб-сайт поддержки Dell — support.dell.com
ПРИМЕЧАНИЕ: Выберите свой регион или
сегмент бизнеса, чтобы увидеть
соответствующий сайт поддержки.Установка и запуск |
39
Установка и запуск
ВНИМАНИЕ: Перед выполнением процедуры, описанной в данной документации,
прочтите и выполните инструкции по технике безопасности и ознакомьтесь с важной
нормативной информацией, которая содержится в документе Информация о технике
безопасности, охране окружающей среды и нормативная информация.
ВНИМАНИЕ: ВНИМАНИЕ: Корпустяжелый (500 Вт: 11,6 кг; 1000 Вт: 18,3 кг; 1920/1500
Вт: 30,5 кг]. Проявляйте осторожность при распаковке и перемещении корпуса.
В данном разделе описываются этапы настройки системы в первый раз.
Распаковка системы
1 Распакуйте систему и проверьте каждый элемент.
2 Выбросьте или утилизируйте упаковку согласно правилам или сохраните ее для
будущего использования.40 |
Установка и запуск
Описание ИБП
В данном разделе показаны передняя и задняя панели ИБП «Башня» Dell. См.
Руководство пользователя линейно-интерактивного ИБП башенного типа 500 Вт, 1000 Вт
и 1920/1500 Вт Dell, чтобы получить подробную информацию о задней панели.
Защелка крышки
Защелка крышки
Жидкокристаллическая панель
Кнопка пролистывания
(вверх или назад)
Кнопка выбора
Кнопка пролистывания
(внизили вперед)
Рис. 1. ИБП «Башня» Dell
Коммуникационный порт
Шесть гнезд 5-15
(Сегмент нагрузки 1)
Устройство защиты от
переходных процессов в
коммуникационной сети Порт USB
Коммуникационного отсека блока
бесперебойного питания
Кнопка Вкл./Выкл
Входной разъем IEC-C14
Два гнезда 5-15
(Сегмент нагрузки 2) Разъем EBM
Рис. 2. Задняя панель ИБП (задняя панель 1000 Вт, 120 В)Установка и запуск |
41
Снятие передней крышки ИБП
3 Снимите переднюю крышку ИБП.
Нажмите на две защелки крышки, чтобы освободить переднюю крышку, и потяните
вверх.
Снятие крышки батарей
4 Отвинтите винты на металлической крышке батарей и поднимите ее, чтобы снять.42 |
Установка и запуск
Подключение разъема внутренней батареи
5 Подключите разъем внутренней батареи.
6 Установите на место металлическую крышку батарей.
Затяните винт с усилием 0,7 Нм (6,2 фунта на дюйм).
7 Установите на место переднюю крышку ИБП.Установка и запуск |
43
Подключение оборудования
9
Присоедините свое оборудование к ИБП
Подключите кабель связи от
компьютера к ИБП (факультативно)
8
8 Если вы планируете использовать Программа управления ИБП Dell, подключите свой
компьютер к USB-порту или порту RS-232 при помощи прилагающегося кабеля.
9 Подключите оборудование, которое необходимо предохранить от скачков
напряжения, к выходным гнездам ИБП, но не включайте это оборудование.
Примечание: Убедитесь, что общая паспортная мощность потребителей не превышает
мощность ИБП во избежание сигнала перегрузки.44 |
Установка и запуск
Подключение шнура питания
10 Убедитесь, что вход питания на ИБП имеет защиту от верхней перегрузки по току
согласно номинальному току шнура питания.
11 Убедитесь, что вход питания ИБП имеет соответствующую защиту от верхней
перегрузки по току:
Таблица 1. Минимальный номинал вышестоящего выключателя
Выходная мощность
ИБП
120 В 208 В 230 В
500 Вт 15 A — 15 A
1000 Вт 15 A — 15 A
1500 Вт (на 100 В)
1920 Вт
20 A — 15 A
12 Вставьте шнур питания ИБП в розетку электросети.Установка и запуск |
45
Включение ИБП
13 Нажмите кнопку на задней панели ИБП.
Завершение запуска
14 Убедитесь, что на итоговом экране состояния ИБП появилась пиктограмма обычного
режима , обозначающая, что ИБП работает нормально и подает электропитание
на существующие нагрузки.46 |
Установка и запуск
15 На итоговом экране состояния ИБП нажмите кнопку , чтобы проверить, активны ли
аварийные сигналы или извещения. Отреагируйте на все активные сигналы, прежде
чем продолжить. См. Руководство пользователя линейно-интерактивного ИБП
башенного типа 500 Вт, 1000 Вт и 1920/1500 Вт Dell, раздел «Поиск и устранение
неисправностей».
При отсутствии активных аварийных сигналов появится сообщение «Активные
аварийные сигналы отсутствуют».
16 Чтобы изменить прочие заводские настройки по умолчанию см. Руководство
пользователя линейно-интерактивного ИБП башенного типа 500 Вт, 1000 Вт и
, раздел «Эксплуатация».UPS de la torre de Dellt
500 W, 1000 W y 1920/1500 W
Inicio de
su sistema
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.comNotas y advertencias
NOTA: Una NOTA indica información importante que lo ayuda a utilizar mejor el software.
PELIGRO: Un PELIGRO indica una situación inminentemente peligrosa que, si no se evita, dará como resultado la
muerte o una lesión grave.
AVISO: Una ADVERTENCIA indica una situación potencialmente peligrosa que, si no se evita, podría dar como
resultado la muerte o una lesión.
PRECAUCIÓN: Una PRECAUCIÓN indica una situación potencialmente peligrosa que, si no se evita, puede dar
como resultado una lesión moderada o menor, o en incidentes de daño de la propiedad.
PELIGRO: Cumpla con la siguiente instrucción para evitar una situación inminentemente peligrosa que, de no
evitarse, dará como resultado la muerte o una lesión grave:
S Esta UPS contiene VOLTAJES LETALES. SÓLO EL PERSONAL DE SERVICIO AUTORIZADO
debe realizar las reparaciones y el servicio. SÓLO EL PERSONAL DE SERVICIO AUTORIZADO
dentro de la UPS.
La información de este documento se encuentra sujeta a cambios sin previo aviso.
E 2009 Dell Inc. Todos los derechos reservados.
Queda estrictamente prohibida cualquier forma de reproducción sin el previo consentimiento de Dell Inc. por escrito.
Marcas comerciales utilizadas en este texto: Dell y el logotipo de DELL son marcas comerciales de Dell Inc.; Phillips es una marca
comercial registrada de Phillips Screw Company.
Es posible que en este documento se utilicen otras marcas y nombres comerciales para hacer referencia a las entidades que responden a
dichas marcas y nombres o a sus productos. Dell Inc. niega cualquier interés en la propiedad de las marcas y nombres comerciales de
terceros.
julio de 2009Características del sistema |
49
Características del sistema
Al brindar rendimiento y confiabilidad sobresalientes, los beneficios exclusivos de la UPS incluyen:
S Regulación del aumento y la reducción de voltaje que garantiza un voltaje constante para la carga,
corrigiendo así las fluctuaciones.
S Capacidad de arranque en batería para poner en funcionamiento la UPS aun cuando el suministro
eléctrico no esté disponible.
S Tiempo de ejecución con un Módulo de batería externa opcional (EBM) para los modelos de UPS
1000-1920 W.
S Dos puertos de comunicación estándar (USB y puerto serie).
S Tarjetas opcionales Tarjeta de gestión de red de Dell con capacidades de comunicación mejoradas
para lograr mayor control y protección del suministro eléctrico.
S Protector transitorio de redes que preserva a su equipo de comunicaciones en red de las
sobretensiones.
S El manejo avanzado del suministro eléctrico con Software de Gestión de UPS de Dell permite el
apagado ordenado y la supervisión del suministro eléctrico.
S El apagado secuencial y la gestión de carga mediante grupos de receptáculos separados que se
denominan segmentos de carga.
S Firmware que se actualiza fácilmente sin necesidad de llamar al cliente.
S Respaldado por las aprobaciones de agencias a nivel mundial.50 |
Búsqueda de información
Búsqueda de información
PRECAUCIÓN: El documento Información Ambiental, Regulatoria y de Seguridad brinda información
regulatoria y sobre seguridad importante.
¿Qué está buscando? Encuéntrelo aqu
S La guía del usuario para mi UPS
S La guía del usuario para la Tarjeta de gestión de red
de Dell
S Software de Gestión de UPS de Dell
NOTA:La documentación y la actualización de software se
pueden encontrar en support.dell.com.
Disco de la UPS de Dell
S Especificaciones
S Cómo configurar los valores de la UPS
S Cómo diagnosticar las fallas y resolver problemas
Guía del usuario de la UPS de Dell
La guía del usuario está disponible en el disco de la
UPS de Dell y en support.dell.com.
S Instrucciones de seguridad
S Información regulatoria
S Información sobre reciclado
Información Ambiental, Regulatoria y de Seguridad
S Información sobre seguridad
S Términos y condiciones (sólo EE. UU.)
S Acuerdo de licencia del usuario final
Información sobre soporte y garantía de Dell
S Información sobre soporte Sitio web de soporte de Dell — support.dell.com
NOTA: Seleccione su región o segmento de negocio para
visualizar el sitio de soporte correspondiente.Instalación y arranque |
51
Instalación y arranque
PRECAUCIÓN: Antes de realizar los procedimientos que se describen en este documento, lea y cumpla con
las instrucciones de seguridad y la información regulatoria importante en su documento Información
Ambiental, Regulatoria y de Seguridad.
PRECAUCIÓN: El gabinete es pesado [500 W: 11,6 kg (25,6 lb); 1000 W: 18,3 kg (40,3 lb); 1920/1500 W: 30,5 kg
(67,2 lb)]. Tenga precaución al desembalar y trasladar el gabinete.
En la presente sección, se describen los pasos para configurar su sistema por primera vez.
Cómo desembalar el sistema
1 Desembale el sistema e identifique cada elemento.
2 Deseche o recicle el embalaje de una manera responsable o guárdelo para un uso futuro.52 |
Instalación y arranque
Identificación de la UPS
En la presente sección, se muestra un panel frontal y posterior de la UPS de la Torre de Dell. Consulte
la Guía del usuario de la UPS de la torre de la línea interactiva de Dell 500 W, 1000 W y 1920/1500 W
para obtener todos los detalles del panel posterior.
Pestillo de la
Pestillo de la cubierta
cubierta
Panel LCD
Botón de desplazamiento
(hacia arriba o hacia atrás)
Botón de selección
Botón de desplazamiento
(hacia abajo o hacia delante)
Figure 1. La UPS de la Torre de Dell
Puerto de comunicaciones
Seis receptáculos de 5-15
(Segmento de carga 1)
Protector de red a
transitorios
Puerto USB
Compartimiento de
comunicación de la UPS
Botón de
Encendido/Apagado
Conector de entrada
IEC-C14
Dos receptáculos de 5-15
(Segmento de carga 2)
Conector EBM
Figure 2. Panel posterior de la UPS (panel posterior 1000 W, 120 V)Instalación y arranque |
53
Cómo retirar la cubierta frontal de la UPS
3 Extraiga la cubierta frontal de la UPS.
Empuje las dos pestillas de la cubierta para liberar la cubierta frontal y levantarla.
Cómo extraer la cubierta de la batería
4 Desatornille el tornillo de apriete manual de la cubierta metálica de la batería y levante para
extraer la cubierta.54 |
Instalación y arranque
Cómo conectar el conector de la batería interna
5 Conecte el conector de la batería interna.
6 Vuelva a colocar la cubierta metálica de la batería.
Apriete el tornillo a 0,7 N·m (6,2 lb pulg.).
7 Vuelva a colocar la cubierta frontal de la UPS.Instalación y arranque |
55
Conectar el equipo
9
Conecte el equipamiento a la UPS
Conecte el cable de comunicación de
la computadora a la UPS (opcional)
8
8 Si planea utilizar el Software de Gestión de UPS de Dell, conecte su equipo al puerto USB o el
puerto RS-232 mediante el uso del cable suministrado.
9 Enchufe el equipo para que esté protegido en los receptáculos exteriores de la UPS, pero no
encienda el equipo protegido.
NOTA: Verifique que los regímenes totales del equipo no excedan la capacidad de la UPS para prevenir una
alarma de sobrecarga.56 |
Instalación y arranque
Conexión del cable de energía
10 Verifique que la entrada de energía a la UPS tenga protección de sobrecarga de corriente
ascendente de acuerdo con el régimen de corriente del cable de energía.
11 Verifique que la entrada de energía a la UPS tenga protección de sobrecarga de corriente
ascendente adecuada:
Table 1. Régimen mínimo del disyuntor ascendente
Potencia de salida de la UPS 120 V 208 V 230 V
500 W 15 A — 15 A
1000W 15 A — 15 A
1500 W (a 100 V)
1920 W
20 A — 15 A
12 Conecte el cable de alimentación de la UPS a un tomacorriente.Instalación y arranque |
57
Inicio de la UPS
13 Presione el botón del panel posterior de la UPS.
Cómo completar el arranque
14 Verifique que el ícono Normal aparezca en la pantalla de resumen del estado UPS, que indica
que la UPS funciona normalmente y todas las cargas están energizadas.58 |
Instalación y arranque
15 En la pantalla de resumen de estado de UPS, presione el botón para comprobar las
notificaciones y las alarmas activas. Solucione todas las alarmas activas antes de continuar.
Consulte el “Diagnóstico de fallas” en la Guía del usuario de la UPS de la torre de la línea
interactiva de Dell 500 W, 1000 W y 1920/1500 W.
Si no hay ninguna alarma activa, se muestra el mensaje “Ninguna alarma activa”.
16 Para cambiar otros valores predeterminados establecidos de fábrica, consulte “Funcionamiento”
en la Guía del usuario de la UPS de la torre de la línea interactiva de Dell 500 W, 1000 W
y 1920/1500 W.Dellt 塔式 UPS
500W, 1000W, 和 1920/1500W
系统使用
入门指南
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.com注意和警告
注意: “注意”表示可帮助您更好使用本软件的重要信息。
危险:“危险”表示紧急危险情况,如果不加以避免,将导致死亡或严重的伤害。
警告:“警告”表示潜在危险情况,如果不加以避免,将会导致死亡或伤害。
小心:“小心”表示潜在危险情况,如果不加以避免,可能导致轻度或中度伤害,或财产损失事故。
危险: 遵守下列须知有助于防止紧急危险情况,其若不加以避免,将导致死亡或严重的伤害:
S 本 UPS 包含危险致命的电压。所有维修和服务都只能由经过授权的维修人员进行。UPS
中没有用户可自行维修的部件。
本文档所含信息如有更改,恕不另行通知。
E 2009 Dell Inc. 保留所有权利。
未经 Dell Inc. 书面允许,严禁以任何形式进行复制。
本文中使用的商标:Dell和DELL 徽标为 Dell Inc.的商标;Phillips 为 Phillips Screw Company 的注册商标。
本文件中可能会使用其它商标或商业名称来指称拥有该商标或名称权利的实体或其产品。Dell Inc.
对不属于自己的商标和商品名称,不拥有任何产权利益。
2009 年 7 月系统性能 |
61
系统性能
该 UPS 可提供杰出的性能与可靠性,其独特优势包括:
S 降压与升压调节,通过调节电压波动确保您的负荷电压稳定。
S 即使没有公用电源,电池启动功能也能给 UPS 供电。
S 对 1000–1920W UPS 型号,通过可选的外部电池模块(EBM)延长运行时间。
S 两个标准通信端口(USB 和 DB-9 串行口)。
S 为了加强电源保护和控制,可选择增强通信能力的 Dell 网络管理卡。
S 网络抗瞬变装置可保护您的网络通信设备免受电涌的损害。
S 高级电源管理,用Dell UPS 管理软件进行平滑关机和电力监控。
S 通过称为载入段的单独插座组进行顺序关机和负荷管理。
S 不必拨打服务电话,即可自行对固件进行方便升级。
S 全球代理认证提供支持。62 |
查找信息
查找信息
CAUTION:安全、环保和法规信息文件提供了重要的安全和法规信息。
您正在寻找什么? 在此查找
S 我的 UPS 的用户指南
S Dell 网络管理卡 用户指南
S Dell UPS 管理软件
注意:文件和软件更新可在 support.dell.com
找到。
Dell UPS 光盘
S 规格
S 如何配置 UPS 设置
S 如何排查故障和解决问题
Dell UPS 用户指南
用户指南可从 Dell UPS 光盘和 support.dell.com
上找到。
S 安全操作说明
S 行政法规信息
S 回收信息
安全、环保和法规信息
S 保修信息
S 条款和条件(仅限美国)
S 最终用户许可协议
Dell 保修和支持信息
S 支持信息 Dell 支持网站 — support.dell.com
注意:选择您的区域或业务部门,以查看合适的支
持网站。安装和启动 |
63
安装和启动
CAUTION: 在进行本文件中的步骤之前,请先阅读和遵循 安全、环保和法规信息
文件中的安全操作说明和重要法规信息。
CAUTION:小心:机箱较重 [500W: 11.6 千克(25.6 磅);1000W:18.3 千克(40.3
磅);1920/1500W: 30.5 千克 (67.2 磅)]。请在拆开包装和搬动机箱时特别小心。
本节描述首次安装系统的步骤。
打开系统
1 打开系统,查看每个物品项目。
2 以负责任的方式处理包装材料或回收循环利用,或者收起存放以备将来使用。64 |
安装和启动
UPS 识别
本节介绍 Dell 塔式 UPS 的前面板和后面板。后面板详细情况请参见 Dell 在线互动塔式 UPS
500W, 1000W, 和 1920/1500W 用户指南 。
外盖闩锁
外盖闩锁
LCD 显示面板
滚动按钮(向上或向后)
选择按钮
滚动按钮(向下或向前)
图 1. Dell 塔式 UPS
通信端口
六个 5-15 插座(载入段 1)
网络抗瞬变装置
USB 端口
UPS 通信槽
开/关按钮
IEC-C14
输入连接器
两个 5-15 插座(载入段 2) EBM 接线器
图 2. UPS 后面板(1000W (瓦),120V (伏)后面板)安装和启动 |
65
取下 UPS 前盖
3 取下 UPS 前盖。
推动两个外盖闩锁,以松开前盖,并拉起。
取下电池盖
4 松开电池金属盖上的翼形螺钉,并提起以取下外盖。66 |
安装和启动
连接内部电池连接器
5 连接内部电池接线器。
6 重新放回电池金属盖。
将螺钉拧至 0.7 牛米(N·m) (6.2 磅英寸(lb in))。
7 重新放回 UPS 前盖。安装和启动 |
67
连接设备
9
将设备连接到 UPS 上
将计算机的通信电缆连接到
UPS 上(可选)
8
8 如果您计划使用Dell UPS 管理软件,用提供的电缆将您的电脑连接到 USB 端口或 RS-232
端口。
9 将需要保护的设备插入 UPS 输出插座,但不要启动受保护的设备。
注意:确保全部设备的总额定值不超过 UPS 的负载能力,以防止出现过载警报。68 |
安装和启动
连接电源线
10 根据电源线额定电流验证 UPS 的功率输入具有上游过电流保护。
11 验证 UPS 的功率输入具有足够的上游过电流保护:
图 1. 最小上游断路器额定值
UPS 输出功率 120V(伏) 208V(伏) 230V(伏)
500W(瓦) 15A(安) — 15A(安)
1000W(瓦) 15A(安) — 15A(安)
1500W (瓦)
(在100V(伏)时)
1920W(瓦)
20A(安) — 15A(安)
12 将 UPS 电源线插入电源插座。安装和启动 |
69
启动 UPS
13 按下 UPS 后面板上的 按钮。
完成启动
14 确认“正常”(Normal)图标 显示在 UPS 状态概要屏幕上,这表明 UPS
运转正常,任何负荷都有动力供给。
15 在 UPS 状态屏上,按下 按钮,查看现有警报或通知。 解决所有警报问题,然后继续。
参见Dell 在线互动塔式 UPS 500W, 1000W, 和 1920/1500W 用户指南中的“故障处理”。
如果没有现有警报,会出现“无现有警报”(No Active Alarms)信息。
16 要更改其它出厂设置默认项,请参见Dell 在线互动塔式 UPS 500W, 1000W, 和 1920/1500W
用户指南中的“操作”。70 |
安装和启动Dellt 塔式 UPS
500W、1000W 和 1920/1500W
系統使用
入門指南
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.com注意和警告
注意: 「注意」表示可幫助您更好地使用本軟體的重要資訊。
危險: 「危險」表示緊急危險情況,如果不加以避免,將導致死亡或嚴重的傷害。
警告: 「警告」表示潛在危險情況,如果不加以避免,將會導致死亡或嚴重的傷害。
小心:「小心」表示潛在危險情況,如果不加以避免,可能導致輕度或中度傷害,或財產損失事故。
危險: 遵守以下須知有助於防止緊急危險情況,其若不加以避免,將導致死亡或嚴重的傷害。
S 本 UPS 包含危險致命的電壓。所有維修和服務都只能由經過授權的維修人員進行。UPS
中沒有可由使用者自行維修的零件。
本文件所含資訊如有變更,恕不另行通知。
E 2009 Dell Inc. 保留所有權利。
未經 Dell Inc. 書面允許,嚴格禁止以任何形式進行複製。
本文中使用的商標:Dell和Dell 標誌為 Dell Inc.的商標;Phillips 為 Phillips Screw Company 的註冊商標。
本文件中可能會使用其他商標或商業名稱來指涉擁有該商標或名稱權利的實體或其產品。Dell Inc.
對不屬於自己的商標和商品名稱,不擁有任何產權利益。
2009 年 7 月系統性能 |
73
系統性能
該 UPS 可提供傑出的性能與可靠性,包括下列獨有優勢:
S 降壓與升壓調節,藉由調節電壓波動確保您的負載電壓穩定。
S 電池啟動功能使您能在沒有外部電源時,也能使 UPS 通電。
S 1000–1920W UPS 型號可藉由選配的 外部電池模組(EBM)延長運行時間。
S 兩個標準通信連接埠(USB 和 DB--9 序列埠)。
S 選配的 Dell 網路管理卡 具有增強通訊功能,可增加電源保護和控制。
S 網路瞬態過電保護裝置可保護您的網路通信設備免受電壓突波的損害。
S 使用Dell UPS 管理軟體的先進電源管理,進行平滑關機和電力監控。
S 藉由稱為負載區段的單獨插座組進行順序關機和負載管理。
S 不必撥打服務電話,即可自行輕鬆的升級韌體。
S 提供全球代理商認證支援。74 |
尋找資訊
尋找資訊
CAUTION: 安全、環保和法規資訊文件提供重要的安全和法規資訊。
您正在尋找什麼? 在此尋找
S 我的 UPS 的使用者指南
S Dell 網路管理卡 使用者指南
S Dell UPS 管理軟體
注意:文件和軟體更新可在 support.dell.com 找到。
Dell UPS 光碟
S 規格
S 如何進行 UPS 設定
S 如何排除故障和解決問題
Dell UPS 使用者指南
使用者指南可從 Dell UPS 光碟和 support.dell.com
上取得。
S 安全操作說明
S 行政法規資訊
S 回收資訊
安全、環保和法規資訊
S 保固資訊
S 條款與條件(僅限美國)
S 一般使用者授權協議
Dell 保固和支援資訊
S 支援資訊 Dell 支援網站 — support.dell.com
注意:選擇您的區域或業務部門,以查看合適的支援
網站。安裝和啟動 |
75
安裝和啟動
CAUTION: 在進行本文件中的步驟之前,請先閱讀和遵循 安全、環保和法規資訊
文件中的安全操作說明和重要法規資訊。
CAUTION:小心: 機箱較重 [500W; 11.6 公斤 (25.6 磅); 1000W; 18.3 公斤 (40.3 磅);
1920/1500W: 30.5 公斤 (67.2 磅)]。 在拆開包裝和搬動機箱時請特別小心。
本節描述首次安裝系統的步驟。
拆除系統包裝
1 拆除系統包裝,並檢查確定每個項目。
2 以負責任的方式棄置或回收包裝材料,或者將其存放以備將來使用。76 |
安裝和啟動
UPS 的識別
本節介紹 Dell 塔式 UPS 的前面板和後面板。後面板詳細情況請參見 Dell在線互動機架式 UPS
500W、1000W、和 1920/1500W使用者指南。
外蓋閂鎖
外蓋閂鎖
LCD 顯示面板
捲軸按鈕(向上或向後)
選擇按鈕
捲軸按鈕(向下或向前)
圖 1. Dell 塔式UPS
通信連接埠
六個 5-15 插座(負載區段 1)
網路瞬態過電保護裝置
USB 連接埠
UPS 通信槽
開/關按鈕
IEC--C14
輸入連接器
兩個 5-15 插座(負載區段 2) EBM 接線器
圖 2. UPS 後面板(1000W,120V 後面板)安裝和啟動 |
77
取下 UPS 前蓋
3 取下 UPS 前蓋。
推動兩個外蓋閂鎖,以鬆開前蓋並將其拉起。
取下電池蓋
4 鬆開電池金屬蓋上的翼形螺釘,提起以取下外蓋。78 |
安裝和啟動
連接內部電池連接器
5 連接內部電池接線器。
6 重新放囘電池金屬蓋。
將螺釘擰至 0.7 牛米(N·m)(6.2 磅吋(lb in))。
7 重新放囘 UPS 前蓋。安裝和啟動 |
79
連接設備
9
將設備連接到 UPS 上
將電腦的通信電纜連接
到 UPS 上(可選
8
8 如果您計劃使用Dell UPS 管理軟體,請使用提供的電纜將您的電腦連接到 USB連接埠或
RS--232 連接埠。
9 將要保護的設備插入 UPS 輸出插座,但不要開啟受保護設備的電源。
注意: 確保全部設備的縂額定值未超過 UPS 的負載能力,以防止出現過載警報。80 |
安裝和啟動
連接電源線
10 根據電源線額定電流驗證 UPS 的電源輸入具有上游過電保護。
11 驗證 UPS 的電源輸入具有足夠的上游過電保護:
表 1. 最小上游斷路器額定值
UPS 輸出功率 120V(伏) 208V(伏) 230V(伏)
500W(瓦) 15A(安) — 15A(安)
1000W(瓦) 15A(安) — 15A(安)
1500W(瓦)
(當100V(伏)時)
1920W(瓦)
20A(安) — 15A(安)
12 將 UPS 電源線插入電源插座。安裝和啟動 |
81
啟動 UPS
13 按下 UPS 後面板上的 按鈕。
完成啟動
14 確認「正常」(Normal)圖示 顯示在 UPS 狀態概要螢幕上,這表明 UPS 運作正常,
任何負載都有電力提供。
15 在 UPS 狀態概要螢幕上,按下 按鈕,查看作用中的警報或通知。解決所有警報問題,
然後繼續。 參見 Dell在線互動機架式 UPS 500W、1000W和 1920/1500W使用者指南
中的「故障處理」。
如果沒有作用中的警報,會出現「無作用中警報」(No Active Alarms)訊息。
16 若要變更其它出廠預設設定,請參見Dell在線互動塔式 UPS 500W, 1000W和 1920/1500W
使用者指南中的「操作」。82 |
安裝和啟動Dellt Tower UPS
500W, 1000W, 1920/1500W
사용자의 시스템
시작하기
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.com참고 및 경고
참고:"참고"는 소프트웨어를 더 잘 활용하는 데 도움이 되는 중요한 정보를 나타냅니다.
위험:"위험"은 피하지 않을 경우, 급박한 위험 상황이 사망이나 중상의 결과를 야기할 수 있음을
나타냅니다.
경고:"경고"는 피하지 않을 경우 죽음이나 상해를 야기할 수 있는 잠재적 위험 상황을 표시합니다.
주의:"주의"는 피하지 않을 경우 경미하거나 보통의 상해 또는 재산 손실 사고를 야기할 수 있는 잠재적
위험 상황을 표시합니다.
위험: 아래의 지시사항을 준수하여, 피하지 않을 경우 사망이나 중상의 결과를 야기할 수 있는 급박한 위험
상황을 방지하십시오.
S UPS는 사망에 이를 수 있는 전압을 갖고 있습니다. 모든 수리와 정비는 자격있는 서비스
요원만이 수행해야 합니다. UPS 내부에는 사용자가 정비할 수 없는 부품이 있습니다.
이 문서에 포함된 정보는 고지없이 변경될 수 있습니다.
E 2009 Dell Inc. All rights reserved.
Dell Inc.의 서면 허락 없이 어떤 방식으로든 복제를 하는 것은 엄격히 금지됩니다.
이 문서에서 사용된 상표 : Dell및DELL로고는 Dell Inc.의 상표입니다. Phillips는Phillips Screw Company 의 등록상표입니다.
기타 상표와 상호를 관련 상표 및 명칭 또는 관련 제품에 대한 권리를 가지는 당사자를 지칭하기 위해 이 문서에서 사용될 수
있습니다. Dell Inc.는 Dell Inc.가 소유하지 않은 상표 및 상호에 대한 재산적 이해관계를 부인합니다.
2009 년 7월시스템 기능 |
85
시스템 기능
탁월한 성능과 신뢰도를 제공하면서, 본 UPS는 다음과 같은 특유의 장점을 지닙니다.
S 전압 변동을 교정하여 사용자의 부하에 대한 조정 전압을 보장하는 승강압형 전압 조정.
S 상용 전력을 사용할 수 없는 경우에도 UPS에 전력을 공급하는 스타트온 배터리
(start--on--battery) 기능.
S 선택사양인 1000–1920W UPS 모델용 외장 배터리 모듈(EBM)을 갖춘 확장 런타임.
S 2개의 표준 통신 포트 (USB 및 DB--9 시리얼 포트).
S 전원 보호 및 제어 능력을 제고하기 위한 강화된 통신 기능을 갖춘 선택사양인
Dell Network Management Card.
S 네트워크 통신 장비를 서지(surge)로부터 보호하는 네트워크 과도전류(transient) 프로텍터.
S 안정적인 종료 및 전원 감시를 위한 Dell UPS Management Software로 수행되는 고급 전원
관리.
S 로드 세그먼트라고 하는 별도의 콘센트 그룹을 통한 순차적 종료 및 부하 관리.
S 서비스 요청 없이도 쉽게 업그레이드할 수 있는 펌웨어.
S 세계적인 인증기관의 각종 인증을 득함.86 |
정보 찾아보기
정보 찾아보기
주의:안전, 환경, 및 규제 관련 정보 문서는 중요한 안전 및 규제 정보를 제공합니다.
찾는 정보 항목 정보의 소재
S UPS용 사용자 설명서
S Dell Network Management Card용 사용자 설명서
S Dell UPS Management Software
참고: 문서 및 소프트웨어 업데이트는
support.dell.com에서 조회할 수 있습니다.
Dell UPS 디스크
S 사양
S UPS 설정 구성 방법
S 문제점 처리 및 해결 방법
Dell UPS 사용자 설명서
사용자 설명서는 Dell UPS 디스크 및
support.dell.com에서 조회할 수 있습니다.
S 안전 지침
S 규제 정보
S 재활용 정보
안전, 환경, 및 규제 관련 정보
S 보증 정보
S 약관 (미국만 해당)
S 최종사용자 라이센스 계약
Dell 보증 및 지원 정보
S 지원 정보 Dell 지원 웹사이트 — support.dell.com
참고:적절한 지원 사이트를 보려면 해당
지역이나 사업분야를 선택하십시오.설치 및 시동 |
87
설치 및 시동
주의:본 문서의 절차를 수행하기 전에 안전, 환경, 및 규제 관련 정보 문서에 있는 안전 지침 및 중요한
규제정보를 읽고 준수하십시오.
주의:캐비닛은 무겁습니다[500W : 11.6 kg (25.6 lb); 1000W : 18.3 kg (40.3 lb); 1920/1500W :
30.5 kg (67.2 lb)]. 주의하여 캐비닛의 포장을 풀고 캐비닛을 옮기십시오.
이 절은 귀하의 시스템을 처음 설치하는 절차를 설명합니다.
시스템 포장풀기
1 시스템 포장을 풀고 각 품목을 확인하십시오.
2 포장은 해당 처리방식에 따라 폐기하거나 재활용하십시오. 또는, 추후 사용하려면
보관하십시오.88 |
설치 및 시동
UPS 확인하기
이 절에서는 Dell Tower UPS의 앞면 패널과 뒷면 패널을 보여줍니다. 모든 뒷면 패널의 세부에
대해서는 Dell Line--Interactive Tower UPS 500W, 1000W, 1920/1500W 사용자 설명서를
참조하십시오.
덮개 걸쇠
덮개 걸쇠
LCD패널
스크롤 버튼(위로 또는 뒤로)
버튼 선택
스크롤 버튼(아래로 또는 앞으로)
그림 1. Dell Tower UPS
통신 포트
6개의5-15콘센트
(로드 세그먼트1)
네트워크 과도전류
프로텍터
USB포트
UPS통신 베이
ON/OFF버튼
IEC-C14입력
커넥터
2개의5-15콘센트
(로드 세그먼트 2)
EBM 커넥터
그림 2. UPS 뒷면 패널 (1000W, 120V 뒷면 패널)설치 및 시동 |
89
UPS 앞면 덮개 제거하기
3 UPS 앞면 덮개를 제거하십시오.
두 개의 덮개 걸쇠를 밀어서 앞면 덮개를 풀고 당겨 올리십시오.
배터리 덮개 제거하기
4 금속 배터리 덮개의 손나사를 풀고 들어올려 덮개를 제거하십시오.90 |
설치 및 시동
내부 배터리 커넥터 연결하기
5 내부 배터리 커넥터를 연결하십시오.
6 금속 배터리 덮개를 교체하십시오.
나사에 0.7 N·m (6.2 lb in)의 토크를 주십시오.
7 UPS 앞면 덮개를 교체하십시오.설치 및 시동 |
91
장비 연결하기
9
장비를UPS로 연결
컴퓨터에서UPS로 통신 케이블을
연결(선택사양)
8
8 Dell UPS Management Software를 사용하실 계획이라면, 제공된 케이블을 이용하여 컴퓨터를
USB 포트나 RS--232 포트로 연결하십시오.
9 보호할 장비를 UPS 출력 콘센트에 꽂되 켜지는 마십시오.
참고: 과부하 경보를 방지하려면 장비의 전체 정격사양이 UPS 용량을 초과하지 않도록 확인하십시오.92 |
설치 및 시동
전원 코드 연결하기
10 UPS로 입력되는 전원이 전원코드 전류 정격에 따라 업스트림 과전류 보호를 받고 있는지
확인하십시오.
11 UPS로 입력되는 전원이 적당한 업스트림 과전류에 대해 보호 받고 있는지 확인하십시오.
표 1. 최소 업스트림 회로차단기 정격
UPS 출력 전원 120V 208V 230V
500W 15A — 15A
1000W 15A — 15A
1500W (100V)
1920W
20A — 15A
12 UPS 전원코드를 전원 콘센트에 연결하십시오.설치 및 시동 |
93
UPS 시동하기
13 UPS 앞면 패널의 버튼을 누르십시오.
시동 완료하기
14 UPS가 정상적으로 작동하고 있고 모든 부하가 전력을 공급받고 있음을 표시하는, 정상
아이콘 이 UPS 상태 요약 화면에 나타나는지 확인하십시오.
15 UPS 상태 요약 화면에서, 활성 경보나 통지를 확인하려면 버튼을 누르십시오. 후속
작업을 계속하기 전에 활성 경보를 처리하십시오. Dell Line--Interactive Tower UPS 500W,
1000W, 1920/1500W 사용자 설명서의 "장애처리"를 참조하십시오.
활성 경보가 없을 경우, "활성 경보 없음" 메시지가 나타납니다.
16 기타 공장설정값을 변경하려면 Dell Line--Interactive Tower UPS 500W, 1000W, 1920/1500W
사용자 설명서의 "작동"을 참조하십시오.94 |
설치 및 시동Delltタワー型UPS
500W、1000W、および1920/1500W
はじめに
システムについて
H900N, J715N, K788N, H914N, J716N, K789N
www.dell.com | support.dell.com注意および警告
注記: 「注記」は、ソフトウェアを有効に利用するための重要な情報を示しています。
危険: 「危険」は、回避しないとほぼ確実に死亡、または重傷を招く危険な状況を示しています。
警告: 「警告」は、回避しないと死亡、または重傷を招く潜在的に危険な状況を示しています。
注意: 「注意」は、回避しないと軽傷、または中程度の傷害を招く恐れがある潜在的に危険な状況を示
しています。
危険:
避しないとほぼ確実に死亡、または重傷を招く危険な状況を防ぐため、以下の説明をよくお読みくだ
さい。
S このUPSの中には致死的な電圧が掛かっています。 すべての修理や点検は、公認のサービ
ススタッフのみが行わなければいけません。
当資料の情報は、予告なく変更されることがあります。
E 2009 Dell Inc.無断複写・転載を禁じます。
Dell Inc.の書面による許可のない複写は、いかなる形態においても厳重に禁じられています。.
DellおよびDELLのロゴは、Dell Inc.の登録商標です:Phillipsは、Phillips Screw Companyの登録商標です。
本書に使用されているその他の登録商標および商標名は、商標や名称を主張する事業体、あるいは製品のいずれかに言及しま
す。Dell Inc.は、Dell自身が所有する登録商標および商標権におけるいかなる所有権を一切放棄します。
2009年7月システムの特徴 |
97
システムの特徴
UPSは優れた性能や信頼性を提供し、以下のような独自の利点がございます:
S 電圧変動を修正することで、負荷への一貫した電圧を保証する「昇降圧」電圧調節。
S 外部電力がないときでもUPSの電力を入れることができる始動電池の能力。
S 拡張ランタイムおよびオプションとして1000--1920W UPS型用
の外付けバッテリーモジュール(外付けバッテリーモジュール)付き。
S 2つの標準通信ポート(USBおよびDB--9シリアルポート)。
S オプションとして、増加電力の保護や制御を行う高度通信機能付きDell
ネットワークマネージメントカード。
S サージからネットワーク通信装置を保護するネットワーク過度電流プロテクタ。
S スムースなシャットダウンや電力管理を行うDell UPS制御ソフトウェアおよび高度電力
管理。
S 負荷セグメントと呼ばれる個別のレセプタクルグループを通じた逐次シャットダウンおよび
負荷制御。
S カスタマーサービスに問い合わせる必要なく、
簡単にアップグレードができるファームウェア。
S 世界中の代理店の承認による支持。98 |
情報検出
情報検出
注意::
安全、環境、規則に関する情報資料には、安全および規定に関する重要情報が含まれています。
どんな情報をお探しですか? こちらでご覧いただけます
S UPSユーザーガイド
S Dellネットワークマネージメントカード用の
ユーザーガイド
S Dell UPS制御ソフトウェア
注記:説明書およびソフトウェアの更新情報
は、support.dell.comでご確認いただけます。
Dell UPS ディスク
S 仕様
S UPSの設定方法
S トラブルシューティングおよび問題の解決方法
Dell UPS ユーザーガイド
ユーザーガイドはDell UPSディスクおよび
support.dell.comで入手することができます。
S 安全に関する説明書
S 規則に関する情報
S リサイクルに関する情報
安全、環境、規則に関する情報
S 保証情報
S 使用上の条件(アメリカのみ)
S エンドユーザー使用許諾契約
Dell 保証およびサポート情報
S サポート情報 Dell サポート用ウェブサイト ‒
support.dell.com
注意:使用する地域や事業区分を選択し、
適切なサポートサイトをご覧ください。インストールおよび設定 |
99
インストールおよび設定
注意::
当資料の手順を実施する前に、安全、環境、規則に関する情報資料に記載されている安全に関す
る説明書および重要な規制情報をご覧いただき、これらの情報に従ってください。
注意:: キャビネットの重量[500W: 11.6 kg (25.6 lb); 1000W: 18.3 kg (40.3 lb); 1920/1500W: 30.5
kg (67.2 lb)] 注意して開梱し、キャビネットを移動します。
このセクションは、最初におけるシステムの設定方法について説明しています。
システムの開梱
1 システムを開梱し、各項目を識別します。
2 責任を持ってパッケージを処分、またはリサイクルし、あるいは将来使えるように保管し
ます。100 |
インストールおよび設定
UPSの識別
このセクションは、Dellタワー型UPSのフロントパネルおよびリヤパネルを示しています。
リヤパネルの詳細に関しましては、Dellラインインタラクティブ式ラック
500W、1000W、および1920/1500W ユーザーガイドをご参照ください。
カバー止め
カバー止め
LCDパネル
スクロールボタン
(上方向、または後方)
選択ボタン
スクロールボタン
(下方向、または前方)
図 1. Dellタワー型UPS
通信ポート
5-15レセプタクル 6個
(負荷セグメント1)
ネットワーク過度
電流プロテクタ USBポート
カバーを取り外します
オン/オフボタン
IEC-C14
入力コネクタ
5-15レセプタクル 2個 EMB コネクタ (負荷セグメント2)
図 2. UPSリヤパネル(1000W、120Vリヤパネル)インストールおよび設定 |
101
UPSのフロントカバーの取り外し方法
3 UPSのフロントカバーを取り外します。
2個のカバー止めを押し、フロントカバーを開放し、引き上げます。
バッテリーカバーの取り外し方
4 金属製バッテリーカバーの蝶ネジを外し、カバーを持ち上げて取り外します。102 |
インストールおよび設定
内臓バッテリーコネクタの接続方法
5 内臓バッテリーコネクタを接続します。
6 金属製バッテリーカバーを取り外します。
ネジを0.7 N·m (6.2 lb in)のトルクで締めます。
7 UPSフロントカバーを取り外します。インストールおよび設定 |
103
装置の接続方法
9
装置をUPSへ接続
コンピューターからUPSへの通信
ケーブルを接続(オプション)
8
8 Dell UPS制御ソフトウェアを使用する場合は、同梱のケーブルを使って、
コンピューターをUSBポートやRS--232ポートへ接続してください。
9 保護する装置をUPS出力レセプタクルに差し込みます。ただし保護装置の電源は入れない
でください。
注記::
過負荷アラームを防ぐため、装置の定格の合計がUPSの容量を超えていないか確認してください。104 |
インストールおよび設定
電源コードの接続方法
10 UPSへの電源入力には、電源コードの定格電流に従い、逆流過電流保護があるか確認して
ください。
11 UPSへの電源入力には、十分な逆流過電流保護があるか確認してください。
表 1. 上流遮断機最小定格
UPS出力 120V 208V 230V
500W 15A — 15A
1000W 15A — 15A
1500W (100V時)
1920W
20A — 15A
12 UPSの電源コードを電源コンセントに差し込みます。インストールおよび設定 |
105
UPSの起動方法
13 UPSのリヤパネルの ボタンを押します。
起動の完了
14 UPSが正常に動作し、負荷電力があることを示す「正常」アイコン がUPSのステータス
要約画面に現れていることをお確かめください。
15 アクティブになっているアラームや通知を確かめるには、UPSステータス要約画面の ボタ
ンを押します。 続ける前に、アクティブになっているアラームを解消してください。Dell
ラインインタラクティブ式ラック 500W、1000W、および1920/1500W ユーザーガイドの
「トラブルシューティング」をご参照ください。
アクティブになっているアラームがない場合は、「アクティブアラームなし」と表示され
たメッセージが現れます。
16 その他の工場出荷時設定の変更は、Dellラインインタラクティブ式ラック
500W、1000W、および1920/1500W ユーザーガイドの「操作方法」をご参照ください。106 |
インストールおよび設定*1642018091*
164201809 1
Dell PowerEdge T420
Guide de mise en route
Modèle réglementaire: E20S Series
Type réglementaire: E20S001Remarques, précautions et avertissements
REMARQUE: Une REMARQUE indique des informations importantes qui peuvent vous aider à mieux utiliser
l'ordinateur.
PRÉCAUTION: Une PRÉCAUTION indique un risque de dommage matériel ou de perte de données et vous indique
comment éviter le problème.
AVERTISSEMENT: Un AVERTISSEMENT indique un risque d'endommagement du matériel, de blessure corporelle
ou de mort.
© 2012 Dell Inc.
Marques commerciales utilisées dans ce document : Dell™, le logo Dell, Dell Precision™, OptiPlex™, Latitude™, PowerEdge™,
PowerVault™, PowerConnect™, OpenManage™, EqualLogic™, Compellent™, KACE™, FlexAddress™, Force10™ et Vostro™ sont des
marques de Dell Inc. Intel®, Pentium®, Xeon®, Core® et Celeron® sont des marques déposées d'Intel Corporation aux États-Unis et
dans d'autres pays. AMD® est une marque déposée, et AMD Opteron™, AMD Phenom™ et AMD Sempron™ sont des marques
d'Advanced Micro Devices, Inc. Microsoft®, Windows®, Windows Server®, Internet Explorer®, MS-DOS®, Windows Vista® et
Active Directory® sont des marques ou des marques déposées de Microsoft Corporation aux États-Unis et/ou dans d'autres pays.
Red Hat® et Red Hat® Enterprise Linux® sont des marques déposées de Red Hat, Inc. aux États-Unis et/ou dans d'autres pays. Novell®
et SUSE® sont des marques déposées de Novell Inc. aux États-Unis et dans d'autres pays. Oracle® est une marque déposée d'Oracle
Corporation et/ou de ses filiales. Citrix®, Xen®, XenServer® et XenMotion® sont des marques ou des marques déposées de Citrix
Systems, Inc. aux États-Unis et/ou dans d'autres pays. VMware®, Virtual SMP®, vMotion®, vCenter® et vSphere® sont des marques ou
des marques déposées de VMware, Inc. aux États-Unis ou dans d'autres pays. IBM® est une marque déposée d'International Business
Machines Corporation.
2012 - 05
Rev. A01Installation et configuration
AVERTISSEMENT: Avant d'exécuter la procédure suivante, lisez les consignes de sécurité fournies avec le
système.
Déballage du système
Sortez le système de son emballage et identifiez chaque élément.
Facultatif l— Configuration du rack
Si vous utilisez la du rack en option, assemblez les rails et installez le système dans le rack en suivant les consignes de
sécurité et les instructions d'installation en rack fournies avec le système.
Stabilisation d'un système en tour
AVERTISSEMENT: Le système en tour dispose de quatre pieds sur son panneau inférieur qui peuvent être réglés
pour aider à stabiliser correctement le système. S'il est impossible de régler les pieds, il y a un risque que le
système bascule, provoquant des blessures corporelles ou endommageant le système.
Figure 1. Réglage des pieds du système en tour
3En option : connexion du clavier, de la souris et du moniteur
Figure 2. Connexion du clavier, de la souris et du moniteur
Connectez le clavier, la souris et le moniteur (facultatif).
Les connecteurs à l'arrière du système sont assortis d'icônes indiquant quels câbles brancher à chaque connecteur.
Assurez-vous de serrer les vis (le cas échéant) sur le connecteur du câble du moniteur.
Branchement du ou des câbles d'alimentation
Figure 3. Branchement du ou des câbles d'alimentation
Connectez le ou les câbles d'alimentation au système et, si vous utilisez un moniteur, branchez son câble d'alimentation.
4Fixation du ou des câbles d'alimentation
Figure 4. Fixation du ou des câbles d'alimentation
Faites une boucle comme indiqué dans l'illustration, puis fixez-le à l'aide de la sangle fournie.
Branchez ensuite l'autre extrémité du ou des câbles sur une prise de courant mise à la terre ou sur une source
d'alimentation autonome (onduleur ou unité de distribution de l'alimentation [PDU]).
Mise sous tension du système
Figure 5. Mise sous tension du système
Retirez le cadre en option s'il est installé. Appuyez sur le bouton de mise sous tension. Le voyant d'alimentation s'allume.
5Installation du cadre en option
Figure 6. Installation du cadre
Installez le cadre (facultatif).
Finalisation de l'installation du système d'exploitation
Si un système d'exploitation était préinstallé sur votre ordinateur, reportez-vous à la documentation du système
d'exploitation livrée avec votre système. Pour une première installation du système d'exploitation, reportez-vous à la
documentation concernant l'installation et la configuration de votre système d'exploitation. Assurez-vous que le
système d'exploitation est bien installé avant d'installer du matériel ou logiciel n'ayant pas été fourni avec le système.
REMARQUE: Reportez-vous à l'adresse dell.com/ossupport pour obtenir les dernières informations sur les
systèmes d'exploitation pris en charge.
Contrat de licence des logiciels Dell
Avant d'utiliser votre système, veuillez lire le contrat de licence du logiciel Dell fourni avec celui-ci. Vous devez
considérer les CD, DVD, ou disquettes du logiciel installé par Dell comme étant des copies de SAUVEGARDE du logiciel
installé sur le disque dur de votre système. Si vous n'acceptez pas les termes du contrat, veuillez appeler le numéro
d'assistance client. Les clients aux États-Unis doivent appeler le 800-WWW-DELL (800-999-3355). Les clients en-dehors
des États-Unis doivent se rendre sur support.dell.com et sélectionner leur pays ou région en haut de la page.
Autres informations utiles
AVERTISSEMENT: Reportez-vous aux informations concernant la sécurité et les réglementations qui
accompagnent le système. Des informations sur la garantie peuvent être incluses à ce document ou à un
document séparé.
• Le Manuel de l'utilisateur fournit des informations concernant les fonctionnalités du système et décrit comment
dépanner le système et installer ou remplacer des composants système. Ce document est disponible en ligne à
l'adresse support.dell.com/manuals.
• La documentation fournie avec le rack indique comment installer le système dans un rack, le cas échéant.
• Tous les supports fournis avec le système contiennent de la documentation et des outils permettant de
configurer et de gérer le système, notamment les supports du système d'exploitation, du logiciel de gestion du
système, des mises à jour système et des composants système que vous avez achetés avec le système.
6REMARQUE: Vérifiez toujours si des mises à jour sont disponibles sur le site support.dell.com/manuals et lisez les
informations de mise à jour en premier, car elles remplacent souvent les informations que contiennent les autres
documents.
REMARQUE: Nous vous recommandons de télécharger et d'installer la dernière version du BIOS, du pilote et du
micrologiciel de gestion des systèmes sur votre système depuis support.dell.com.
Obtention d'une assistance technique
Si vous ne comprenez pas une procédure décrite dans ce guide ou si le système ne fonctionne pas comme prévu,
consultez votre Manuel du propriétaire. Dell offre des formations et certifications sur le matériel approfondies. Pour des
informations supplémentaires, voir dell.com/training. Ce service n'est pas offert dans toutes les régions.
Informations NOM
Les informations suivantes, qui s'appliquent à l'appareil décrit dans ce document, sont fournies conformément aux
exigences de la Norme Officielle Mexicaine (NOM) :
Importateur : Dell Inc. de México, S.A. de C.V.
Paseo de la Reforma 2620 -11º Piso
Col. Lomas Altas
11950 México, D.F.
Numéro de modèle : E20S
Tension d'alimentation : 100-240 V CA (avec bloc d'alimentation secteur de 495 W, 550 W, 750 W et
1 100 W)
Fréquence : 50 Hz/60 Hz (bloc d'alimentation secteur)
Consommation électrique : 12 A à 6,5 A (X2) (avec bloc d'alimentation secteur de 1 100 W)
10 A à 5 A (X2) (avec bloc d'alimentation secteur de 750 W)
6,5 A à 3 A (X2) (avec bloc d'alimentation secteur de 495 W)
7,4 A à 3,7 A (avec bloc d'alimentation secteur non redondant de 550 W)
Caractéristiques techniques
REMARQUE: Les caractéristiques suivantes se limitent à celles que la législation impose de fournir avec le
système. Pour une liste complète des caractéristiques actuelles de votre ordinateur, consultez le site Web
support.dell.com.
Alimentation
Bloc d'alimentation secteur (par bloc d'alimentation)
Puissance 495 W, 550 W, 750 W ou 1 100 W
Dissipation thermique
REMARQUE: La dissipation thermique est calculée
par rapport à la puissance nominale du bloc
d'alimentation.
1 908 BTU/h maximum (bloc d'alimentation 495 W)
2 891 BTU/h maximum (bloc d'alimentation 750 W)
4 100 BTU/h maximum (bloc d'alimentation 1 100 W)
2 317 BTU/h maximum (bloc d'alimentation non redondant
550 W)
7Alimentation
Tension
REMARQUE: Ce système est également conçu pour
être connecté aux systèmes d'alimentation
informatiques avec une tension phase à phase ne
dépassant pas 230 V.
de 100 à 240 VCA, réglage automatique, de 50 à 60 Hz
Batterie
Pile bouton Pile bouton 3 V CR2032 au lithium
Caractéristiques physiques
Tour
Hauteur 443,3 mm avec le pied
430,3 mm sans le pied
Largeur 304,5 mm avec le pied ouvert
218 mm avec le pied fermé
Profondeur 542,2 cm sans le cadre
558,6 cm avec le cadre
Rack
Hauteur 218 mm
Largeur 430,3 mm sans les pattes
482,4 mm avec les pattes
Profondeur (minimale) 538,4 mm depuis l'arrière des pattes et avec un module
de bloc d'alimentation câblé
Profondeur (maximale) 584,05 mm depuis l'arrière des pattes et avec un
ventilateur système externe
Poids de configuration maximale 30. 16 kg
Poids à vide 15,6 kg
Environnement
REMARQUE: Pour en savoir plus sur les mesures d'exploitation liées à différentes configurations particulières,
rendez-vous sur dell.com/environmental_datasheets.
Température
En fonctionnement Fonctionnement continu : 10 à 35 °C avec une humidité
relative (HR) de 10 à 80%, avec point de condensation
maximal de 26 °C. Réduction maximale admissible de la
température sèche de 1 °C/300 mètres au-dessus de
900 mètres.
8Environnement
REMARQUE: Pour plus d'informations sur la plage de
températures étendue et les configurations prises en
charge, voir support.dell.com/manuals.
Entreposage De -40 à 65 °C avec un gradient thermique maximal de
20 °C par heure
Humidité relative
Entreposage 5 à 95 % à une température dans un environnement
humide maximale de 38 °C.
Tolérance maximale aux vibrations
En fonctionnement 0,26 Grms de 5 à 350 Hz pendant 5 minutes (toutes
orientations de fonctionnement)
Entreposage 1,87 Grms de 10 à 500 Hz pendant 15 minutes (les
6 orientations de fonctionnement testées)
Choc maximal
En fonctionnement Un choc de 31 G pendant 2,6 ms sur l'axe z positif (une
impulsion de chaque côté du système) pour un système
installé dans la position de fonctionnement
Entreposage Six chocs consécutifs de 71 G pendant un maximum de
2 ms en positif et négatif sur les axes x, y et z (une
impulsion de chaque côté du système)
Six chocs consécutifs sur les axes x, y et z en positif et
négatif (une impulsion de chaque côté du système)
d'impulsion d'onde carrée de 27 G avec un changement
de vitesse de 597 cm/s.
Altitude:
En fonctionnement De –15,2 à 3 048 m
REMARQUE: Pour les altitudes supérieures à
900 mètres, la température maximale de
fonctionnement est réduite de 17,22 °C tous les
300 mètres.
Entreposage De –15,2 m à 10 668 m
Niveau de contamination aérienne
Classe G1 selon la norme ISA-S71.04-1985
9
Installing and Removing the Cable Management Arm
NOTE: You can attach the CMA to either the right or left mounting rail, depending on how you intend to route cables from
the system. Mounting the CMA on the side opposite of the power supplies is recommended; otherwise, the CMA must be
disconnected in order to remove the outer power supply. You mustremove the tray before removing the power supplies.
At the back of the system, fit the latch on the front end of the CMA on the innermost bracket of the slide assembly until the
latch engages (1). Fit the other latch on the end of the outermost bracket until the latch engages (2). To remove the CMA,
disengage both latches by pressing the CMA release buttons at the top of the inner and outer latch housings (3).
Installation et retrait du passe-câbles
REMARQUE : vous pouvez fixer le passe-câbles sur la gauche ou la droite du rail de montage, en fonction de la façon
dont vous voulez acheminer les câbles dans le système. Il est conseillé d'installer le passe-câbles du côté opposé aux
blocs d'alimentation. Dans le cas contraire, vous devrez le déconnecter en cas de retrait du bloc d'alimentation extérieur.
Vous devezretirer le plateau avant de retirer les blocs d'alimentation. À l'arrière du système, placez le loquet situé sur
la partie avant du passe-câbles sur le support interne du rail coulissant jusqu'à ce que le loquet s'enclenche (1). Placez
l'autre extrémité du loquet sur le support externe jusqu'à ce que le loquet s'enclenche (2). Pour retirer le passe-câbles,
dégagez les deux loquets en appuyant sur les boutons de dégagement du passe-câbles situés en haut des logements
des loquets interne et externe (3).
Installieren und Entfernen des Kabelführungsarms
ANMERKUNG: Sie können den Kabelführungsarm an der rechten oder der linken Montageschiene befestigen, je nachdem,
wie Sie die Systemkabel verlegen wollen. Empfohlen wird die Montage des Kabelführungsarms auf der den Netzteilen
gegenüberliegenden Seite; andernfalls muss zum Entfernen des äußeren Netzteils der Kabelführungsarm abgenommen
werden. Sie müssen vor dem Entfernen der Netzteile die Auflage entfernen. Befestigen Sie auf der Systemrückseite die
Raste am vorderen Ende des Kabelführungsarms an der inneren Halterung des Schienensatzes und lassen Sie die
Verbindung einrasten (1). Befestigen Sie die andere Raste am Ende der äußeren Halterung und lassen Sie die Verbindung
einrasten (2). Um den Kabelführungsarm zu entfernen, lösen Sie beide Verbindungen, indem Sie auf die Sperrklinken auf
der Oberseite der inneren und äußeren Halterungsabdeckung drücken (3).
1
2
Cable Management Arm Installation Installation du passe-câbles | Installation des Kabelführungsarms | | Instalación del brazo para tendido de cables
Moving the CMA Away from the CMA Tray
The CMA can be pulled away from the system and extended away from the tray for access and service (1). At the hinged
end, lift the CMA up and off of the tray to unseat it from the tray catch. Once it is unseated from the tray, swing the CMA
away from the system (2).
NOTE: You can also extend the CMA into the service position once it is cabled to access the back of the system.
Dégagement du passe-câbles hors du plateau
Vous pouvez dégager le passe-câbles du système et l'éloigner du plateau, si une intervention le nécessite (1). Sur la
charnière, soulevez le passe-câbles du plateau pour le dégager du cliquet. Une fois le passe-câbles dégagé du plateau,
faites-le pivoter pour l'éloigner du système (2).
REMARQUE : vous pouvez également faire pivoter le passe-câbles une fois qu'il est installé afin de le mettre en position
de maintenance et accéder à l'arrière du système.
Wegführen des Kabelführungsarms von der Auflage
Der Kabelführungsarm lässt sich für Zugang und Wartung vom System wegbewegen und ausziehen (1). Heben Sie
den Kabelführungsarm am Scharnierende nach oben und von der Auflage herunter, um ihn davon zu lösen. Sobald
er von der Auflage genommen ist, können Sie den Kabelführungsarm vom System weg schwenken (2).
ANMERKUNG: Auch um auf die Systemrückseite zuzugreifen, können Sie den Kabelführungsarm im verkabelten
Zustand in die Wartungsposition bringen.
Separación del brazo para tendido de cables y la bandeja del brazo para tendido
de cables
Se puede tirar del brazo para tendido de cables para separarlo de la bandeja a fin de facilitar el acceso y el mantenimiento (1). Desde el extremo con bisagra, levante el brazo para tendido de cables hacia arriba y hacia fuera para
desencajarlo del retén de la bandeja. Una vez desenganchado de la bandeja, haga rotar el brazo para tendido de cables
para alejarlo del sistema (2).
NOTA: También puede extender el brazo para tendido de cables en la posición de mantenimiento una vez que esté
cableado para acceder a la parte posterior del sistema.
Identifying the Cable Management Arm Kit Contents
Locate the components for installing the Cable Management Arm (CMA) assembly:
Cable Management Arm tray (1)
Cable Management Arm (2)
Nylon cable tie wraps (3)
NOTE: To secure the CMA for shipment in the rack, loop the tie wraps around both baskets and tray and cinch them firmly.
For larger CMAs, the tie wraps can be threaded through the inner and outer baskets and around the tray to secure them.
Securing the CMA in this manner will also secure your system in unstable environments.
Identification des composants du kit de passe-câbles
Identifiez les composants de l'assemblage de passe-câbles à installer :
Plateau du passe-câbles (1)
Passe-câbles (2)
Fixe-câbles en nylon (3)
REMARQUE : si vous devez expédier le rack avec le passe-câbles, fixez le passe-câbles en introduisant les fixe-câbles
à la fois dans le panier et dans le plateau, puis sanglez-les. Dans le cas de passe-câbles de plus grand format, vous
pouvez faire passer les fixe-câbles dans les paniers interne et externe et autour du plateau pour qu'ils ne bougent pas.
Ceci permet également de stabiliser le système si celui-ci se trouve dans un environnement instable.
Bestandteile des Kits für den Kabelführungsarm
Identifizieren Sie die Komponenten für die Installation des Kabelführungsarms:
Auflage für den Kabelführungsarm (1)
Kabelführungsarm (2)
Kabelbinder aus Kunststoff (3)
ANMERKUNG: Um den Kabelführungsarm zum Transport am Rack zu sichern, ziehen Sie die Kabelbinder um beide
Kabeltunnel und die Auflage. Bei größeren Kabelführungsarmen können die Kabelbinder durch die inneren und äußeren
Kabeltunnel und um die Auflage herum gefädelt und festgezogen werden. Ein derart gesicherter Kabelführungsarm kann
außerdem das System in instabilen Umgebungen schützen.
Installing and Removing the Cable Management Arm Tray
NOTE: The CMA tray provides support and acts as a retainer for the CMA.
Align and engage each side of the tray with the receiver brackets on the inner edges of the rails and push forward until
the tray clicks into place (1). To remove the tray, squeeze the latch-release buttons on both sides toward the center and
pull the tray out of the receiver brackets (2).
Installation et retrait du plateau du passe-câbles
REMARQUE : le plateau est un dispositif sur lequel repose le passe-câbles et le maintient en place.
Placez chaque côté du plateau en face des supports situés sur les bords internes des rails et poussez-les jusqu'à ce que
le plateau s'enclenche (1). Pour retirer le plateau, pincez les loquets de dégagement pour les ramener vers l'intérieur
et sortez le plateau des supports (2).
Installieren und Entfernen der Kabelführungsarm-Auflage
ANMERKUNG: Die Kabelführungsarm-Auflage dient als Unterstützung und als Rückhaltemechanismus für den Kabelführungsarm.
Führen Sie die Seiten der Auflage in die Aufnahmen auf den inneren Seiten der Schienen ein und drücken Sie die Auflage
bis zum Einrasten nach vorn (1). Um die Auflage zu entfernen, schieben Sie die Sperrklinken auf beiden Seiten zur Mitte hin,
und ziehen Sie die Auflage aus den Aufnahmen (2).
Instalación y extracción de la bandeja del brazo para tendido de cables
NOTA: La bandeja del brazo para tendido de cables actúa como pieza de soporte y de retención para el brazo para tendido
de cables.
Alinee y encaje cada lado de la bandeja con las guías en los extremos interiores de los rieles y empuje hacia delante hasta
que la bandeja encaje en su lugar (1). Para extraer la bandeja, apriete los botones de liberación del pestillo de ambos lados
hacia el centro y tire de la bandeja para extraerla de las guías (2).
3
4
3
1
2
1
2
3
1
2
2
1
Identificación del contenido del kit del brazo para tendido de cables
Localice los componentes para instalar el ensamblaje del brazo para tendido de cables (CMA):
Bandeja del brazo para tendido de cables (1)
Brazo para tendido de cables (2)
Abrazaderas de cable de nylon (3)
NOTA: Para fijar el brazo para tendido de cables para su envío con el rack, pase las abrazaderas
alrededor de los dos soportes y la bandeja y apriételas con fuerza. En el caso de brazos para tendido
de cables más grandes, puede fijar las abrazaderas pasándolas por los soportes interno y externo y
alrededor de la bandeja. Si fija el brazo para tendido de cables de este modo, el sistema también
quedará sujeto en entornos inestables.
Instalación y extracción del brazo para tendido de cables
NOTA: Puede instalar el brazo para tendido de cables en el riel de montaje de la derecha o de la
izquierda, según cómo tenga previsto colocar los cables desde el sistema. Se recomienda instalar el
brazo para tendido de cables en el lado opuesto a las fuentes de alimentación, ya que de lo contrario
deberá desconectarse para poder extraer la fuente de alimentación externa. Debe retirar la bandeja
antes de extraer las fuentes de alimentación. En la parte posterior del sistema, encaje el pestillo del
extremo frontal del brazo para tendido de cables en la guía más interna del ensamblaje deslizante hasta
que encaje en su sitio (1). Encaje el otro pestillo en el extremo de la guía más externa hasta que encaje
en su sitio (2). Para extraer el brazo para tendido de cables, desenganche los dos pestillos presionando
los botones de liberación del brazo para tendido de cables en la parte superior de los alojamientos de
pestillo interno y externo (3).
F880Kcc0.qxp 30/10/2008 15:13 Page 10F880KA00
CMA Installation Instructions
Printed in China.
Imprimé en Chine.
Gedruckt in China.
Impreso en China.
Printed on recycled paper.
Instructions d'installation
du passe-câbles
Installationsanweisungen
für den Kabelführungsarm
Instrucciones de instalación
del brazo para tendido de cables
Notes, Cautions and Warnings
A NOTE: indicates important information that helps you make better use of your computer.
A CAUTION: indicates potential damage to hardware or loss of data if instructions are not followed.
A WARNING: indicates a potential for property damage, personal injury, or death.
Remarques, Précautions et Avertissements
Une REMARQUE indique des informations importantes qui peuvent vous aider à mieux utiliser
votre ordinateur.
Une PRÉCAUTION vous avertit d'un risque de dommage matériel ou de perte de données en cas
de non-respect des instructions données.
Un AVERTISSEMENT vous avertit d'un risque d'endommagement du matériel, de blessure corporelle
ou de mort.
Anmerkungen, Vorsichtshinweise und Warnungen
Eine ANMERKUNG: macht auf wichtige Informationen aufmerksam, mit denen Sie das System besser
einsetzen können.
Ein VORSICHTSHINWEIS: warnt vor möglichen Beschädigungen der Hardware oder vor Datenverlust,
falls die Anweisungen nicht befolgt werden.
Eine WARNUNG: weist auf Gefahrenquellen hin, die materielle Schäden, Verletzungen oder sogar
den Tod von Personen zur Folge haben können.
Notas, precauciones y advertencias
Una NOTA: proporciona información importante que le ayudará a utilizar mejor el ordenador.
Un mensaje de PRECAUCIÓN: indica la posibilidad de daños en el hardware o la pérdida de datos
si no se siguen las instrucciones.
Un mensaje de ADVERTENCIA: indica el riesgo de daños materiales, lesiones o incluso la muerte.
WARNING: This is a condensed reference. Read the safety instructions in your Safety,
Environmental, and Regulatory Information booklet before you begin.
WARNING: Only trained service technicians are authorized to remove the system cover and
access any of the components inside the system. Before you begin, review the safety
instructions that came with the system.
NOTE: The illustrations in this document are not intended to represent a specific server. These
installation instructions show a 3U Cable Management Arm installation. Other CMAs may vary
slightly in appearance.
AVERTISSEMENT: ce document est uniquement un condensé. Veuillez lire le livret relatif à
la sécurité, l'environnement et les réglementations avant de commencer.
AVERTISSEMENT: seuls les techniciens de maintenance qualifiés sont habilités à retirer le capot
du système pour accéder aux composants internes. Veuillez lire les consignes de sécurité
fournies avec le système avant de commencer.
REMARQUE : les illustrations figurant dans ce document ne représentent pas de serveur
spécifique. Ces instructions présentent l'installation d'un passe-câbles pour un système
à 3 unités. L'apparence des passe-câbles peut varier selon les modèles.
WARNUNG: Dieses Dokument stellt eine Kurzanleitung dar. Bevor Sie mit der Montage beginnen,
lesen Sie bitte die Sicherheitshinweise in der Broschüre Sicherheits-, Umgebungs- und
Betriebsbestimmungen.
WARNUNG: Nur zugelassene Servicetechniker dürfen die Gehäuseabdeckung entfernen
und auf die Komponenten im Innern des Systems zugreifen. Bevor Sie beginnen, lesen Sie
die Sicherheitshinweise, die Sie zusammen mit Ihrem System erhalten haben.
ANMERKUNG: Die Abbildungen in diesem Dokument sollen keinen bestimmten Server darstellen.
Diese Anweisungen zeigen die Installation eines 3U-Kabelführungsarms. Andere Kabelführungsarme können im Erscheinungsbild leicht abweichen.
ADVERTENCIA: Este documento es una referencia resumida. Lea las instrucciones de seguridad
incluidas en el folleto Información sobre seguridad, medio ambiente y normativas antes
de empezar.
ADVERTENCIA: Los técnicos de servicio especializados son las únicas personas autorizadas
para retirar las cubiertas y acceder a los componentes internos del sistema. Antes de empezar,
revise las instrucciones de seguridad incluidas con el sistema.
NOTA: Las ilustraciones de este documento no representan un servidor específico. En estas
instrucciones se muestra la instalación de un brazo para tendido de cables 3U. Es posible que
otros brazos para tendido de cables tengan un aspecto ligeramente diferente.
Cabling the System Using the CMA
CAUTION: To avoid potential damage from protruding cables, secure any slack in the status indicator cable
before routing this cable through the CMA.
Using the tie wraps provided, bundle the cables together as they enter and exit the baskets so they do not
interfere with adjacent systems (1). With the CMA in the service position, route the cable bundle through the inner
and outer baskets (2). Use the preinstalled Velcro straps on either end of the baskets to secure the cables (3).
Adjust the cable slack as needed at the hinge postion (4). Swing the CMA back into place on the tray (5). Install
the status indicator cable at the back of the system and secure the cable by routing it through the CMA. Attach
the other end of this cable to the corner of the outer CMA basket. (6).
Câblage du système à l'aide du passe-câbles
PRÉCAUTION : pour éviter tout dommage dû à des câbles dépassant du système, le câble du voyant d'état
ne doit pas présenter de mou avant son acheminement via le passe-câbles.
À l'aide des fixe-câbles, regroupez les câbles et faites-les passer dans les paniers afin qu'ils n'interfèrent pas
avec les systèmes adjacents (1). Mettez le passe-câbles en position de service, puis faites passer le faisceau
de câbles dans les paniers interne et externe (2). À l'aide des bandes Velcro préinstallées sur l'une ou l'autre
extrémité des paniers, fixez les câbles (3). Ajustez les câbles pour qu'il n'y ait pas de mou au niveau de la
charnière (4). Faites pivoter le passe-câbles pour le replacer dans le fixe-câbles (5). Installez le câble du voyant
d'état à l'arrière du système et sécurisez-le en le glissant dans le passe-câbles. Fixez l'autre extrémité de câble
au coin du panier externe du passe-câbles. (6).
Verkabeln des Systems mit dem Kabelführungsarm
VORSICHT: Um mögliche Schäden an vorstehenden Kabeln zu vermeiden, sichern Sie eine etwaige Überlänge
des Statusanzeigekabels, bevor Sie dieses Kabel im Kabelführungsarm verlegen.
Bündeln Sie mit den Kabelbindern die Kabel beim Eintritt und Austritt an den Kabeltunneln, so dass sie nicht mit
benachbarten Systemen in Konflikt geraten (1). Verlegen Sie Kabel durch den inneren und äußeren Kabeltunnel,
wobei sich der Kabelführungsarm in der Wartungsposition befindet (2). Sichern Sie die Kabel an den Enden
der Kabeltunnel mit den vorinstallierten Klettbändern (3). Passen Sie das Kabelspiel an der Scharnierposition
nach Bedarf an (4). Schwenken Sie den Kabelführungsarm zurück auf die Auflage (5). Installieren Sie das
Statusanzeigekabel auf der Systemrückseite und sichern Sie das Kabel, indem Sie es im Kabelführungsarm
verlegen. Befestigen Sie das andere Ende des Kabels an der Ecke des äußeren Kabelführungstunnels (6).
5
1
4
2
5
3
6
Information in this document is subject to change without notice.
© 2008 Dell Inc. All rights reserved.
Dell and ReadyRails are trademarks of Dell Inc. Reproduction in any manner whatsoever without the
written permission of Dell Inc. is strictly prohibited. Dell disclaims proprietary interest in the marks
and names of others.
October 2008
Les informations contenues dans ce document peuvent être modifiées sans préavis.
© 2008 Dell Inc. Tous droits réservés.
Dell et ReadyRails sont des marques de Dell Inc. La reproduction de ce document de quelque manière
que ce soit sans l'autorisation écrite de Dell Inc. est strictement interdite. Dell ne revendique aucun
droit propriétaire sur les marques et noms des autres sociétés.
Octobre 2008
Die in diesem Dokument enthaltenen Informationen können ohne Vorankündigung geändert werden.
© 2008 Dell Inc. Alle Rechte vorbehalten.
Dell und ReadyRails sind Marken von Dell Inc. Die Reproduktion dieses Dokuments in jeglicher Form ist
ohne vorherige schriftliche Genehmigung von Dell Inc. streng verboten. Dell erhebt keinen Anspruch
auf die Warenzeichen und Handelsnamen anderer Hersteller.
Oktober 2008
La información contenida en este documento puede modificarse sin notificación previa.
© 2008 Dell Inc. Todos los derechos reservados.
Dell y ReadyRails son marcas comerciales de Dell Inc. Queda estrictamente prohibida la reproducción
de este documento en cualquier forma sin la autorización por escrito de Dell Inc. Dell renuncia a
cualquier interés sobre la propiedad de marcas y nombres de terceros.
Octubre de 2008
WARNING: This is a condensed
reference. Read the safety instructions
that ship with your system before
you begin.
AVERTISSEMENT : ce document est
uniquement un condensé. Veuillez lire
les consignes de sécurité fournies
avec le système avant de commencer.
WARNUNG: Dieses Dokument stellt eine
Kurzanleitung dar. Bevor Sie beginnen,
lesen Sie die im Lieferumfang Ihres
Systems enthaltenen Sicherheitshinweise.
ADVERTENCIA: Este documento es
una referencia resumida. Lea las
instrucciones de seguridad suministradas
con el sistema antes de empezar.
Cable Management Arm Installation (continued) Installation du passe-câbles (suite) | Installation des Kabelführungsarms (fortgesetzt) | | Instalación del brazo para tendido de cables (continuación)
Cableado del sistema mediante el brazo para tendido de cables
PRECAUCIÓN: Para evitar posibles daños debidos a cables que sobresalen, ajuste la holgura del
cable de indicador de estado antes de pasar este cable por el brazo para tendido de cables.
Mediante las abrazaderas proporcionadas, agrupe los cables al entrar y salir de los soportes de modo
que no interfieran con los sistemas adyacentes (1). Con el brazo para tendido de cables en la posición
de mantenimiento, pase el grupo de cables por los soportes interno y externo (2). Utilice las cintas de
velcro preinstaladas en cada extremo de los soportes para fijar los cables (3). Realice los ajustes de
holgura necesarios en los cables en las posiciones de las bisagras (4). Vuelva a girar el brazo para
tendido de cables para que encaje en la bandeja (5). Instale el cable de indicador de estado en la parte
posterior del sistema y fíjelo pasándolo por el brazo para tendido de cables. Fije el otro extremo de este
cable a la esquina del soporte externo del brazo para tendido de cables. (6).
F880Kcc0.qxp 30/10/2008 15:13 Page 2
Dell Glossary – Version 2
Glossary
Glossar
Glosario
Glossaire
用語集
용어집
Sözlük
词汇表Dell Glossary – Version 2
GlossaryGlossary
ACPI See advanced configuration and power interface.
active control module For Dell EqualLogic PS Series arrays in a dual-control module array, the control module that
is actively servicing I/O on a network. If it ceases to function, it fails over to the secondary
control module. See secondary control module.
active Controller The Dell AIM Controller that is actively managing the Dell AIM environment.
active space In Dell Compellent Storage Center, the amount of space that is used by a volume, excluding
replays. This amount does not include RAID overhead. See Replay.
actual space In Dell Compellent Storage Center, the amount of active space plus replay space for a
volume. See active space, Replay space.
advanced configuration
and power interface
(ACPI)
A standard interface for enabling the operating system to direct configuration and power
management.
agent In the Dell AIM environment (VMRacks based on Red Hat Xen and Microsoft Hyper-V, plus
personas), the optional software installed on elements that the Controller uses to manage
the elements and configure their networking properties.
agentless persona A Dell AIM persona that does not have the Dell AIM agent installed.
ambient temperature The temperature of the area or room where the system is located.
array member A Dell EqualLogic PS Series array configured into a PS Series group. Groups can have
several members.
array serial number In the Dell EqualLogic PS Series array environment, a unique Dell EqualLogic PS Series array
identification string that is encoded in the array's hardware. See service tag.
ASM/ME See Auto-Snapshot Manager/Microsoft Edition.
ASM/VE See Auto-Snapshot Manager/VMware Edition.
Asset Management
Appliance
A Dell KACE appliance-based asset management solution for IT professionals that tracks
software and license compliance. It automates the management of inventory, software
assets, versions, upgrades, and computers through a web-based dashboard.
asset tag An individual code assigned to a system, usually by an administrator, for security or tracking
purposes.
Assigned Disks In Dell Compellent Storage Center, physical storage media assigned to a disk folder in order
to become managed and used for storing volumes and replays. See disk folder, Storage
Pool.
assignment mode A mechanism to control how personas and VMRacks are assigned to hosts based on the
availability of HBAs in the host. See HBA.
async/asynchronous
replication
The process of writing data to local storage then queuing that data for storage on a remote
SAN. If the local SAN fails before a write is delivered, it is possible that the replication will
fail. See replication, synchronous replication, remote instant replay.
3automatic RAID
configuration
In the context of Dell EqualLogic PS Series groups, an internal process that configures the
user-selected RAID policy on the array.
Auto-Snapshot
Manager/Microsoft
Edition (ASM/ME)
A snap-in console application for the Microsoft Management Console that enables you to
administer Smart Copies.
Auto-Snapshot
Manager/VMware
Edition (ASM/VE)
A web-based application that works with VMware virtual environments to enable you to
administer Smart Copies.
available space Amount of total storage available on all drives.
back end In Dell Compellent Storage Center, an isolated and dedicated network that connects the
controller or storage cluster (e.g., redundant pair of controllers) to local disk enclosures.
back end network Connection between controller and disks in the Dell Compellent Storage Center Controller.
base volume (Dell
EqualLogic PS Series)
A volume mounted on the computer and reachable through its Windows-assigned drive
letter (such as G:) or mount point.
base volume (Dell
EqualLogic Group
Manager)
A volume that has snapshots. Snapshots depend on the base volume. If the base volume is
destroyed, the snapshots have been removed.
Baseboard
Management Controller
(BMC)
A server management module that implements the IPMI (Intelligent Platform Management
Interface) protocol. In the context of Dell AIM, the Controller uses the BMC to control some
models of servers remotely.
blade For the Dell AIM SDK, blade is an element of the host superclass. For Dell modular systems,
a blade refers to a modular server which is mounted into an enclosure.
BMC See Baseboard Management Controller.
Bootable media A CD, SD card, or USB memory key that is used to start your system if the system will not
boot from the hard drive.
cache A fast storage area that keeps a copy of data or instructions for quick data retrieval.
CHA See Compellent Host Adapter.
Challenge Handshake
Authentication Protocol
(CHAP)
Challenge Handshake Authentication Protocol, a network login protocol that uses an
encrypted challenge-response mechanism. Used to limit access to volumes and snapshots
to hosts that supply the correct account name and password. CHAP is also used for login/
administrator accounts.
channel In the Dell/AIM environment, one of up to eight physical connections you can assign to
switch ports and that you can connect to a persona using up to eight physical NICs. You can
configure a network to prefer one or two channels for its traffic, so if the preferred channel
fails traffic is transparently rerouted to the other channel.
CHAP See Challenge Handshake Authentication Protocol.
chassis switch In the context of Dell AIM, an Ethernet switch in a bay in a chassis. Chassis switches are
managed by the Controller.
client device
communication
certificate
In the context of EKM, a specialized encrypted key that allows a client to communicate with
the server.
4Cluster Node A physical member of a resource cluster, such as a host in a server cluster or a SAN in a
storage cluster.
collection In ASM/ME, a collection is related groups of storage objects such as volumes, snapshots, or
application components, and are represented by nodes in the ASM Console Tree under the
Collections master node. In Dell EqualLogic Group Manager, volume and replica collections
and custom snapshot collections appear in the hierarchy under the Volumes view.
Compellent Host
Adapter (CHA)
Internal cache card/battery seated in each Dell Compellent Storage Center controller. Write
cache memory is mirrored to the cache card. On a dual-controller Dell Compellent Storage
Center, the controller 1 cache card holds the mirror for controller 2, and the controller 2
cache card holds the mirror for controller 1. On a single-controller Dell Compellent Storage
Center, the cache card holds the mirror for the single controller.
configuration The database that describes the entire contents and configuration of the Dell AIM
environment.
Conservation Mode In Dell Compellent Storage Center, a data preservation mode that is reached when remaining
free space drops to a critical threshold (typically 10%, up to 32 GB). In conservation mode,
the Dell Compellent Storage Center generates an alert, prevents new volumes from being
created, and starts expiring replays at a faster rate to free up space. See Emergency Mode.
Console The web-based user interface that you use to monitor and work with the elements in the Dell
AIM environment. The Dell AIM Console is hosted by the Dell AIM Controller.
control module In Dell EqualLogic PS Series arrays, the physical processor and interface component. A
control module contains the Dell EqualLogic PS Series firmware in flash memory and
provides temporary power continuity for data sorted in cache memory. It has multiple
network interfaces and an optional serial port. An array can contain two hot-swappable,
dual redundant controllers. The active control module serves I/O, while the secondary
control module mirrors data in its cache.
control panel The part of the system that contains indicators and controls, such as the power button and
power indicator.
Control Port The destination iSCSI port to which iSCSI initiators (servers) connect in order to make
storage requests. In a Dell Compellent Storage Center configured for virtual port mode, a
control port is created for each iSCSI fault domain, to redirect iSCSI traffic to the appropriate
virtual port.
Controller (Dell AIM) Software that manages the physical and virtual hardware, software, and network
configurations and hosts the Dell AIM Console. In the context of a pair of resilient
Controllers, each Controller runs on a dedicated server but shares a configuration database
and other key files on a shared file system.
Controller (Dell
Compellent)
Provides disk aggregation (RAID), I/O routing, error detection, and data recovery. Provides
the intelligence for the entire Dell Compellent Storage Center subsystem. Every Storage
Center system contains at least one. Storage Center and recommend corrective actions to
improve performance and availability of the system.
Controller Services In the context of Dell AIM, the virtual IP address or addresses the Controller users for
communications with the System Control Network (SCN), managed switches, the Console
and CLI, and so on. By default, this is a single virtual IP address on the active Controller, but
you can specify unique addresses for the services SCN Services and SNMP Trap Collector.
5Copilot Services Within Dell Compellent Storage Center, the combination of centralized support, product
education and sales resources that proactively monitor the system and recommend
corrective actions to improve performance and availability of the system.
Copy-Mirror-Migrate A Dell Compellent Storage Center feature allowing volumes to be migrated between different
disk types and RAID levels.
credential store In the context of EKM, a repository that holds credential information across sessions.
Credential information is security data such as user names, passwords, and certificates.
Cryptographic Object A method of securing data.
Data Collector A Dell Compellent Enterprise Manager component that runs in the background on a server,
collecting information on all Dell Compellent Storage Center systems connected to the
server.
Data Instant Replay A Dell Compellent Storage Center feature that captures space-efficient point-in-time copies
(PITC) of a volume on the local SAN at defined intervals, providing the ability to roll back a
volume to a previous point in time. See Replay, snapshot.
Data Progression A Dell Compellent Storage Center feature that automatically migrates data pages to higher or
lower performance devices, based on the level of I/O activity (demand). See tiered storage.
DDR See Double-data Rate.
delegated space In the context of the Dell EqualLogic Group Manager, a space on a group set aside to store
received replicas for a partner.
Dell Encryption Key
Manager (EKM)
Dell Encryption Key Manager (EKM) secures the data stored on LTO tape cartridges by
managing encryption keys for Dell tape automation solutions.
Dell Remote Access
Controller (DRAC)
An interface card that provides out-of-band management facilities. The controller has its
own processor, memory, network connection, and access to the system bus, and allows
system administrators to control systems remotely across a network.
device driver A program that allows the operating system or some other program to interface correctly
with a peripheral.
DHCP See Dynamic Host Configuration Protocol.
Digital Versatile Disk Digital versatile disc or digital video disc (DVD).
disk folder In Dell Compellent Storage Center, a collection of physical storage media devices (disks,
SSDs) that can be viewed and managed by a user. Disk folders determine the storage
pool(s) from which volume storage space is allocated. Although disk folders can be
associated with multiple storage pools, Dell Compellent Storage Center performance is
maximized by assigning all disks to the same folder and storage pool.
Disk Position In Dell Compellent Storage Center, the slot position of a disk drive within its enclosure, in
row-column notation. For example, disk position 01-02 refers to the slot in the first row from
the top and second column from the left.
DNS See Domain Name System.
Domain Name System
(DNS)
A method of translating Internet domain names, such as www.example.com, into IP
addresses, such as 208.77.188.166.
dormant Persona In the AIM environment, a persona that is not currently running (or waiting to run) on a host.
6Double-data Rate (DDR) Double-data rate. A technology in memory modules that potentially doubles the data rate by
transferring data on both the rising and falling pulses of a clock cycle.
DRAC See Dell Remote Access Controller.
DRAM See Dynamic random-access memory.
Dual Redundant In Dell Compellent Storage Center, a storage profile option for protecting against the loss of
any two drives, typically by using RAID 10 and/or RAID 6.
DVD See Digital Versatile Disc.
Dynamic Host
Configuration Protocol
(DHCP)
A method of automatically assigning an IP address to a client system.
Dynamic randomaccess memory
(DRAM)
A system's RAM is usually made up entirely of DRAM chips.
EKM See Dell Encryption Key Manager.
EKM Administrator In the context of EKM, the super user who can create or delete users and groups.
EKM Encryption
Manager (tklmadmin)
In the context of EKM, the daily user who creates or deletes keys and devices.
Emergency Mode In Dell Compellent Storage Center, a mode that is reached when the system can no longer
operate because there is no more free space. In emergency mode, all server I/O is rejected
and all volumes are taken offline and cannot be brought back online until enough space is
freed to exit emergency mode. See Conservation Mode .
enclosure A physical enclosure that provides a single interface, power, and cooling to multiple disks or
blades.
environment In the context of Dell AIM, the collection of hardware, software, and network configurations
managed by a Dell AIM Controller.
Eth0 See Ethernet port 0.
Eth1 See Ethernet port 1.
Ethernet port 0 (Eth0) In Dell Compellent Storage Center, Eth0 is an Ethernet interface dedicated to management.
Ethernet port 1 (Eth1) In Dell Compellent Storage Center, Eth1 is an Ethernet interface dedicated to inter-process
communication between controllers, for clustering or remote replication.
external network In the context of the Dell AIM environment, a network that is not part of the Dell AIM
environment but is physically and logically connected to it.
external switch In the context of the Dell Aim environment, a switch that is not part of the Dell AIM
environment, but is physically and logically connected to it.
Fabric A combination of interconnected switches that act as a unified routing infrastructure. It
allows multiple connections among devices on a SAN and lets new devices enter
unobtrusively. A FC (or iSCSI) topology with at least one switch present on the network.
FastTrack An optional Dell Compellent Storage Center utility that dynamically places the most active
data on the outer (faster) disk tracks.
7FAT See File Allocation Table.
Fault Domain Within the Dell Compellent Storage Center environment, a Fault Domain identifies a failover
set. In Virtual Port mode, all front-end ports can be part of the one fault domain. In Legacy
Mode, each primary and reserved port creates one fault domain.
FC See Fibre Channel.
FE See Front End Network.
Fibre Channel (FC) A high-speed interconnect used to connect servers to controllers and back-end disk
enclosures. FC components include HBAs, hubs, switches, and cabling. The term FC also
refers to a high-speed, fully duplexed serial communication protocol permitting data transfer
rates of up to 10 Gigabit per second.
File Allocation Table
(FAT)
The file system structure used by MS-DOS to organize and keep track of file storage. The
Microsoft Windows operating systems can optionally use a FAT file system structure.
File Transfer Protocol
(FTP)
An application layer protocol used to transfer bulk-data files between machines or hosts.
Front End Network (FE) The component in the Dell Compellent Storage Center SAN flow of data writes (server to
switch to controller to disks) that initiates data writes. In general, servers (or switches) are
the front end of the controller. However, a Storage Center system that is replicating data to a
remote system is the front end of the remote system. See back end.
FTP See File Transfer Protocol.
GB See Gigabyte(s).
Gigabyte(s) (GB) 1024 megabytes or 1,073,741,824 bytes. However, when referring to hard-drive capacity; the
term is usually rounded to 1,000,000,000 bytes.
group See PS Series group.
HBA See Host Bus Adapter.
HIT/LE See Host Integration Tools for Linux.
HIT/ME See Host Integration Tools for Windows.
HIT/VM See Host Integration Tools for VMware.
host In the Dell AIM environment, a host may be a physical server (rack-mounted or blade) or
virtual machine. In the Dell AIM SDK, a superclass that includes blade servers, rackmounted servers, and virtual machines (VMs).
host adapter A controller that implements communication between the system's bus and the peripheral
device, typically a storage device.
Host Bus Adapter (HBA) A device, typically an add-on card, that connects a server to a SAN (Storage Area Network).
Each HBA is uniquely identified on the SAN by its WWPN (World Wide Port Number).
Common HBA types include Fiber Channel and iSCSI.
Host Integration Tools
for Linux (HIT/LE)
A suite of tools that integrate ESX systems with Dell EqualLogic PS Series storage arrays. It
includes the Auto Snapshot Manager/VMware Edition (ASM/VE), EqualLogic Datastore
Manager, and EqualLogic Virtual Desktop Deployment Utility.
Host Integration Tools
for Windows (HIT/ME)
A suite of applications that enable you to configure and manage an array. It includes ASM/
ME, DSM (Multipath I/O Device Specific Module), and RSW (Remote Setup Wizard).
8Host Integration Tools
for VMware (HIT/VM)
A suite of tools that integrate Linux systems with Dell EqualLogic PS Series storage arrays. It
includes the Remote Setup Wizard Command Line Interface (RSWCLI), the EqualLogic Host
Performance and Configuration Tuning Suite (eqltune), and EqualLogic Log Gathering Facility
(eqllog).
Hot Spare Disk In the Dell Compellent Storage Center environment, a Hot Spare disk is a backup disk. In the
event that an active array fails, the controller makes the Hot Spare part of the active array
and rebuilds data on the fly. Although the Hot Spare becomes an active disk without human
intervention, remember to replace the failed drive as soon as possible, so that the array is
again protected with a new Hot Spare. Hot spares can span multiple disk enclosures.
Storage Center Hot Spares can have a different capacity than the data drive it replaces.
hot-plug The ability to insert or install a device, typically a hard drive or an internal cooling fan, into
the host system while the system is powered on and running. Also referred to as hot-swap.
hot-swap See hot-plug.
I/O Input/Output. A keyboard is an input device, and a monitor is an output device. In general, I/
O activity can be differentiated from computational activity.
ID In the Dell AIM environment, a unique identifier for an element in the , assigned when it is
added to the environment.
iDRAC See integration Dell Remote Access Controller.
IKEv2-SCSI A protocol used for certificate creation.
image Specific to Dell AIM, the actual bits stored on a disk or storage array that a persona or
VMRack boots, along with information the Controller uses to boot that image on a specific
type of host. You can configure a persona or VMRack with more than one image, for
example, so the same persona can boot on either a physical server or a virtual machine.
infiniBand infiniBand offers point-to-point bidirectional serial links intended for connection of
processors and high-speed peripherals.
Instant Replay See Data Instant Replay.
integration Dell Remote
Access Controller
(iDRAC)
A remote access controller that uses the Internet SCSI protocol.
Intelligent Platform
Management Interface
(IPMI)
A protocol implemented by management modules in some servers, which is used to control
the servers remotely. The blade management modules in the Dell servers implement iPMI.
interconnect switch A switch in the Dell AIM environment, managed by the Controller, that you use to
interconnect elements such as chassis, vRacks, other interconnect switches, and external
switches.
internet SCSI (iSCSI) Internet SCSI (see SCSI). A protocol that encapsulates standard SCSI commands for
communication between client servers (iSCSI initiators) and network storage devices (iSCSI
targets) on IP networks.
IPMI See Intelligent Platform Management Interface.
iSCSI See Internet SCSI.
9Key Management
Interoperability
Protocol (KMIP)
Standards set up for the communication between enterprise key management systems and
encryption systems.
Key Serving Ports Ports used by the operating system to communicate in EKM.
Keygroup In EKM, a set of keys assigned to a specific department, area, or hardware type.
Keys An encrypted certificate used to protect data in EKM.
Keystore / Keygroup/
Master Keystore
A group of encrypted keys in EKM.
KMIP See Key Management Interoperability Protocol.
Java Database
Connectivity (JDBC)
An API for the Java programming language that defines how a client may access, query, and
update data in a database.
JDBC See Java Database Connectivity.
Leader Controller The primary controller in a dual controller Dell Compellent Storage Center. Normally, the
leader and peer controllers share the storage I/O load, essentially doubling throughput, but
only the leader controller performs external management functions. If one controller fails,
the remaining controller becomes or remains the leader and assumes the duties of both
controllers. See Peer Controller.
Legacy Mode In Dell Compellent Storage Center, fault domains are configured to dedicate pairs of primary
and reserved front end ports, connected through redundant equipment, as a mechanism to
protect storage traffic against a single point of failure. See Fault Domain, Virtual Port or
Virtual Port Mode.
Linear Tape-Open (LTO) An open standards tape format.
logical unit number
(LUN)
A logical unit is a conceptual division (a subunit) of a storage disk or a set of disks. Each
logical unit has an address, known as the logical unit number (LUN), which allows it to be
uniquely identified.
LTO See Linear Tape-Open.
LTO Key Group Rollover In EKM, a set of keys assigned to be used once the default keygroup is depleted.
LUN See logical unit number.
MAC address See Media Access Control address.
Managed Disks In Dell Compellent Storage Center, storage media devices (disks, SSDs) that are assigned to
a disk folder in order to associate those devices with a storage pool. See Storage Pool, disk
folder.
managed system A managed system is any system that is monitored and managed using Dell OpenManage
Server Administrator.
management IP
address
Address used to used to connect to an intelligent IP-enabled device in order to monitor or
manage that device. The address may be dedicated for exclusive use by management
applications or shared for use by management and service applications.
management network An optional management network separates iSCSI traffic (Volume I/O) from management
traffic (GUI and CLI sessions, and other group management communications and intergroup
operations).
10management station A system used to remotely manage one or more managed systems from a central location.
Manual Replay A Dell Compellent Storage Center feature that allows the user to manually create point in
time copies of volumes.
manual transfer
replication
Replication done through transportable media instead of over a network. Used in cases
where the network link between replication partners is too slow or otherwise unsuitable for
transferring large amounts of data.
Manual Transfer Utility A stand-alone utility from Dell EqualLogic that performs volume replication using
transportable media, instead of the network. The utility has both graphical and command line
user interfaces.
Media Access Control
address (MAC address)
Your system's unique hardware number on a network.
migrate volume A Dell Compellent Storage Center command to move data from one volume to another.
migration In the context of EKM, combining a keystore into an existing keystore during (not after) Dell
Encryption Key Manager 3.0 installation.
mirror volume A Dell Compellent Storage Center command to replicate a local volume onto a remote Dell
Compellent Storage Center and maintain updates between the local and remote volumes
until the mirror is manually broken.
mirroring A type of data redundancy in which a set of physical drives stores data and one or more sets
of additional drives stores duplicate copies of the data. Mirroring functionality is provided by
software. See striping, RAID.
NAS See Network-Attached Storage.
network connection An object that defines a persona's and VMRack's required network connectivity. A network
connection is created as the result of adding elements to a network, for example when you
add a persona to a network.
Network-Attached
Storage (NAS)
NAS is one of the concepts used for implementing shared storage on a network. NAS
systems have their own operating systems, integrated hardware, and software that are
optimized to serve specific storage needs.
NTP The Network Time Protocol (NTP) is a protocol for synchronizing the clocks of computer
systems over packet-switched, variable-latency data networks.
Oversubscribed space In a SAN that supports thin provisioning, the amount of storage space that is configured as
available but not physically present (i.e., configured space minus available space).
parity stripe In RAID arrays, a striped hard drive containing parity data.
partition A physical section of a hard drive created using the fdisk command. Partitions can then be
divided into multiple logical drives using the format command.
passive Controller The Dell AIM Controller that acts as a hot standby, ready to take over managing the
environment if the active Controller fails.
Peer Controller In a dual-controller Dell Compellent Storage Center, the peer controller shares the I/O load
with the leader controller but does not perform external management functions. If the leader
controller fails, the peer controller assumes the I/O and management duties of both
controllers. See Leader Controller.
11persona A server environment captured on disk: the operating system, optional Dell AIM agent
software, and the network and other settings required to run an application on a host in the
Dell AIM environment.
pool Storage space in a SAN available for use by volumes. In Dell Compellent Enterprise Storage
Manager and Dell Compellent Storage Center, this is equivalent to the total space in the
SAN. In Dell EqualLogic PS Series arrays, this is equivalent to the total space on the
members of the specific pool.
pool administrator An account on a Dell EqualLogic PS Series group that has permission to manage objects
only in a specific pool or set of pools for a group. Compare to group administrator.
primary group Within the Dell EqualLogic Group Manager environment, the group containing the original
volume in a replication partnership. See secondary group.
primary volume Within the Dell EqualLogic Group Manager environment, a volume configured for replication
to a replication partner.
PS Series array A single Dell EqualLogic iSCSI storage unit, usually configured as a Dell EqualLogic PS
Series group. You can join multiple PS Series arrays into a larger PS Series group and
manage them as a single iSCSI SAN.
PS Series group An iSCSI storage entity comprised of one or more Dell EqualLogic PS Series storage arrays
that you access through a single IP address and manage as a storage area network (SAN).
Public Services In the context of Dell AIM, the Controller Services virtual IP address that you use to connect
to the Console or CLI on the active Controller.
RAC Remote Access Controller.
RAID See Redundant Array of Independent Disks.
RAID 0 Data is striped across the available disks providing improved performance. RAID 0 does not
provide any data redundancy.
RAID 10 Data is striped across available disk drives and mirrored, providing data availability and
improved performance. Maintains a minimum of one full copy of all data on the volume. RAID
10 provides optimum Read / Write performance, increased probability of withstanding
multiple failures, and the quickest restoration of data.
RAID 5 Maintains a logical copy of the data using a mathematically derived rotating parity stripe.
The parity stripe is derived from the data stripes. This method has less overhead for the
redundant information than RAID 10 however write performance is slower than RAID 10 due
to the calculation of the parity stripe for every write. Read performance is similar to RAID 10.
RAID 50 RAID level 50 is a combination of RAID level 5 and RAID level 0. RAID 50 includes both parity
and disk striping across multiple drives.
recovery volume A volume created for the purpose of recovering data. In Dell EqualLogic PS Series arrays, a
recovery volume is created by promoting an inbound replica set as part of a failover
operation. You can also create recovery template volumes and recovery thin clones. In Dell
Compellent Storage Center, a view volume is created from a replay. See replica, View
Volume, Replay.
Redundancy The duplication of information or hardware equipment components to ensure that if a
primary resource fails, a secondary resource can take over its function. Dell Compellent
Storage Center provides redundancy for each component so that there is no single point of
12failure. Single Redundancy protects against loss of data if any one resource fails. Dual
Redundancy protects against data lost if any two resources fail.
Redundant Array of
Independent Disks
(RAID)
Redundant array of independent disks. A method of providing data redundancy. Some
common implementations of RAID including RAID 0, RAID 1, RAID 5, RAID 10, and RAID 50.
See mirroring, striping.
Remote Instant Replay A Dell Compellent Storage Center solution feature in which a replay is replicated to a remote
Dell Compellent Storage Center. The local and remote Dell Compellent Storage Centers are
active-active, and bidirectional replication can occur, synchronously or asynchronously, on
independent intervals. Dell Compellent Storage Center replication requires the Enterprise
Manager software application with a Replication license. See Replay, Remote System,
replication.
Remote Setup Wizard
(RSW)
A graphical user interface (GUI) that enables you to configure a Dell EqualLogic PS Series
array after you install the Host Integration Tools/Microsoft Edition.
Remote System In Dell Compellent Storage Center, a separate SAN configured to receive replication data
from an original volume on the local Dell Compellent Storage Center. Dell Compellent
Storage Center replication requires the Enterprise Manager software application with a
Replication license. See replication.
Replay In Dell Compellent Storage Center, a fully usable, point-in-time copy (PITC) of data that
contains an image of the data as it appeared at the point in time at which the copy was
initiated. The copy may be stored locally or on a remote Dell Compellent Storage Center.
See snapshot, Data Instant Replay, Remote Instant Replay.
Replay Profile In Dell Compellent Storage Center, a set of rules that determine when and how replays pointin-time copies will be taken and how long they will be saved. See Replay.
Replay space In Dell Compellent Storage Center, the amount of space that is automatically reserved and
used for replays. See active space, actual space.
replica A point-in-time representation of a Dell EqualLogic PS Series volume. The original volume
and its replica are located on different Dell EqualLogic PS Series groups (replication
partners) potentially separated at some geographical distance to facilitate disaster
tolerance.
replica collection In Dell EqualLogic Group Manager, the set of replicas resulting from each replication of a
volume collection.
replica collection set In Dell EqualLogic Group Manager, the set of replica collections for a volume collection.
replica reserve In Dell EqualLogic Group Manager, the portion of the delegated space on a replication
partner that is set aside for the replica sets for a specific volume. You configure the replica
reserve for the volume on the primary group, but the actual replica reserve is on the
secondary group.
replica set In Dell EqualLogic Group Manager, the set of complete replicas for a volume, template
volume, or thin clone volume.
replicating system A Dell Compellent Storage Center configured to send replication data from one or more local
volumes to a remote Storage Center. See replication, Remote System, Remote Instant
Replay.
13replication The process of copying volume data (only deltas) from the primary (local) SAN to a
secondary (remote) SAN, so that data can be recovered from either SAN if necessary. The
SANs can be an unlimited distance apart.
replication partner In Dell EqualLogic Group Manager, a group that is configured to send or receive replicas
from another partner.
RSW See Remote Setup Wizard.
runnable persona In the context of Dell AIM, a network-booted persona that is started and is waiting to be
assigned to a host.
SAN See Storage Area Network.
SAN HeadQuarters Enables you to monitor multiple Dell EqualLogic PS Series groups from a single graphical
interface. It gathers and formats performance data and other important group information.
SCN See System Control Network.
SCN Services The Controller Services virtual IP address that personas and VMRacks in the Dell AIM
environment use to communicate with the active Controller.
SCSI See Small Computer System Interface.
SDK See Software Development Kit.
secondary control
module
Within the Dell EqualLogic Group Manager environment, the secondary control module
mirrors cache data from the active control module. If the active control module ceases to
function, the secondary takes over network operations. See active control module.
secondary group In a Dell EqualLogic Group Manager replication configuration, the group that receives
replicas of a source volume. See primary group.
Server Cluster A group of independent servers working together as a single system to provide uninterrupted
service in the event of individual computer failures.
service tag A label on the system used to identify it when you call Dell for technical support.
Simple Mail Transfer
Protocol (SMTP)
Defines a message format and forwarding procedure to enable messages to be sent
between hosts on the Internet.
Simple Network
Management Protocol
(SNMP)
A standard interface that allows a network manager to remotely monitor and manage
workstations.
Simulator A component of the Dell AIM SDK that emulates a running Dell AIM environment, including
the Controller, the Console, and physical and virtual networks. See SDK.
Small Computer System
Interface (SCSI)
Small computer system interface. An I/O bus interface with faster data transmission rates
that standard ports.
SMART Self-Monitoring Analysis and Reporting Technology. Allows hard drives to report errors and
failures to the system BIOS and then display an error message on the screen.
Smart Copy An ASM/ME point-in-time, application-consistent copy of objects in a Dell EqualLogic PS
Series group. Smart Copies can be of type snapshot, clone, or replica depending on the
edition of Auto-Snapshot Manager that you are using.
SMP See symmetric multiprocessing.
14SMTP See Simple Mail Transfer Protocol.
snapshot A point-in-time copy (PITC) of a volume. See Replay.
snapshot collection A set of snapshots resulting from a snapshot operation on a volume collection. See volume
collection.
SNMP See Simple Network Management Protocol.
SNMP Trap Collector In the context of Dell AIM, the Controller Services virtual IP address that managed switches
and other devices use to send SNMP traps to the active Controller.
Software Development
Kit (SDK)
A set of development tools used to create applications for a specific software package,
software framework, hardware platform, computer system, video game console, operating
system, or similar platform.
Space Recovery A utility that recovers space that Windows reports as being used but is actually empty,
available space that can be used by Dell Compellent Storage Center.
spare disk A designated or unused drive in a SAN that is used automatically to replace a failed drive.
Storage Area Network
(SAN)
A storage area network (SAN) is a specialized network that provides access to high
performance and highly available storage subsystems using block storage protocols. The
SAN is made up of specific devices, such as host bus adapters (HBAs) in the host servers,
switches that help route storage traffic, and disk storage subsystems. The main
characteristic of a SAN is that the storage subsystems are generally available to multiple
hosts at the same time, which makes them scalable and flexible. Compare with NAS.
Storage Cluster In Dell Compellent Storage Center, multiple SAN controllers that are interconnected for the
purpose of improving reliability, availability, serviceability and performance (via load
balancing). Storage Center uses an active-active configuration to provide automatic
controller failover. A fully mirrored, battery-backed cache in each controller ensures data
reliability over a restart and allows volumes to migrate between controllers in the event of a
single controller failure.
Storage Clustering A Dell Compellent Storage Center feature that provides automatic controller failover through
multiple controllers in an active-active configuration. Fully mirrored, battery backup cache
provides fault tolerance and automatic restart/recovery in the event of a controller failure.
Storage Pool See pool.
Storage Profile In Dell Compellent Storage Center, a set of rules that define the drive types (tiers) on which
to store data and the RAID level to use for each tier.
Storage Type In Dell Compellent Storage Center, a set of attributes, including redundancy options and
block size, that control how space from a storage pool is allocated and protected.
striping Disk striping writes data across three or more disks in an array, but only uses a portion of the
space on each disk. The amount of space used by the "stripe" is the same on each disk
used. A virtual disk may use several stripes on the same set of disks in an array. See also
mirroring, and RAID.
symmetric
multiprocessing (SMP)
Used to describe a system that has two or more processors connected via a high-bandwidth
link and managed by an operating system, where each processor has equal access to I/O
devices.
synch See Synchronous Replication.
15Synchronous
Replication
Feature that atomically writes the same data to two separate volumes, stored on different
physical hardware, before the application receives an I/O complete message. Both writes
either complete or fail, so both volumes are fully synchronized at all times. However, the
feature can increase write latency for the application. See synch.
System Control
Network (SCN)
A private network that Dell AIM uses for communication between the Controller, personas,
and VMRacks. The Controller also uses this network to discover servers and to boot
personas and VMRacks on them.
System Setup program A BIOS-based program that allows configuration of a system's hardware and customization
of the system's operation by setting features such as password protection. Because the
System Setup program is stored in NVRAM, any settings remain in effect until changed.
Systems Deployment
Appliance
A Dell KACE appliance-based deployment management solution for IT professionals that
provides tools for disk imaging, user state migration, remote site management, system repair
and recovery, as well as computer inventory scanning and assessment. Additionally, it
automates pre-and post-deployment configuration tasks such as computer inventory
scanning and assessment; it also automates disk, BIOS, and RAID configuration, software
distribution, and configuration management.
Systems Management
Appliance
A Dell KACE appliance-based systems management solution for IT professionals that
streamlines tasks such as inventory management, software distribution, reporting, patch
management, asset management, scripting, and service desk support through a web-based
interface.
template In the context of Dell AIM, a dormant persona that you can clone to create other personas,
but which you can't run (to prevent changes to the template).
template volume Read-only volume from which you create thin clones.
thin clone Volume that shares space with a template volume. Thin clones provide an efficient use of
storage space for configurations with multiple volumes that have a large amount of common
data.
Thin Provisioning Feature that lets you over-provision (or over-subscribe) the space available in the SAN.
Storage objects (such as volumes) that use thin provisioning report their potential maximum
size to applications, but may actually use much less space. Thin provisioning allows
organizations to reduce their overall storage expenditures, increase availability and achieve
greater performance.
tiered storage Storage optimization strategy in which data required quickly and often is stored on
expensive, fast media types, and data required rarely is stored on less expensive, slower
media types.
unmanaged space In Dell EqualLogic PS Series arrays, delegated space capacity on the secondary group that
is no longer accessible from the primary group.
uplink port A port on a network hub or switch used to connect to other hubs or switches without
requiring a crossover cable.
vacate In Dell EqualLogic Group Manager, to remove a member from a group while the member
remains online.
View Volume In Dell Compellent Storage Center, a read-only volume that has been created from a previous
replay, for the primary purpose of recovering data. See Replay.
16Virtual Port or Virtual
Port Mode
In the context of Dell Compellent Storage Center, Virtual Ports eliminate the need for reserve
ports. When operating in Virtual Port mode, all front-end ports accept I/O and can be part of
one Fault Domain. For information on enabling Virtual Ports, refer to the Dell Compellent
Storage Center System Setup Guide.
virtual World Wide Port
Name (vWWPM)
A virtual World Wide Port Name used in Dell AIM for creating SAN-booted personas.
Virtualization The ability to use software to share the resources of a single computer or storage device
across multiple environments. A single physical system or device may appear to the user as
multiple virtual systems able to host multiple operating systems.
VMRack A rack of virtual machines (VMs) on a server that is running a combination of agent software
and Red Hat Xen, VMware ESX, or Microsoft Hyper-V.
volume A discrete unit of storage striped to a storage device or devices.
volume collection A number of volumes grouped together for purposes of performing operations on the
volumes simultaneously. See snapshot collection, replica collection.
volume reserve Amount of space allocated to a volume from free pool space. Without thin provisioning,
volume reserve is the same as reported size.
Volume Type In the context of Dell Compellent Storage Center, Volume Type: can be dynamic, Replay
enabled, or Replication. A volume is dynamic until at least one Replay has been taken of that
volume. Once a Replay has been taken of a volume, it becomes Replay Enabled. A
Replication volume is one that is being Replicated to another Dell Compellent Storage Center
system.
vRack In the context of Dell AIM, a logical group of hosts connected to a virtual switch (vRack
switch).
vRack switch In the context of Dell AIM, a virtual switch that connects hosts in a vRack.
vWWPN See virtual World Wide Port Name.
1718Dell Glossar – Version 2
GlossarGlossar
ACPI Siehe Advanced Configuration and Power Interface (Erweiterte Konfigurations-
und Stromverwaltungsschnittstelle).
Aktives Kontrollmodul Bei Dell EqualLogic PS-Series Arrays mit zwei Kontrollmodulen dasjenige
Kontrollmodul, das aktiv die E/A auf einem Netzwerk betreibt. Fällt es aus, wird
an das Sekundärkontrollmodul übergeben. Siehe Sekundärkontrollmodul.
Aktiver Controller Der Dell AIM Controller, der aktiv die Dell AIM Umgebung verwaltet.
Aktiver Speicherplatz Im Dell Compellent Storage Center die von einem Volume verwendete Menge
an Speicherplatz, ausgenommen Replays. Der RAID-Overhead ist nicht
enthalten. Siehe Replay.
Tatsächlicher Speicherplatz Im Dell Compellent Storage Center die Menge an aktivem Speicherplatz plus
dem Replay-Speicherplatz für ein Volume. Siehe aktiver Speicherplatz, ReplaySpeicherplatz.
Advanced Configuration and Power
Interface ACPI (Erweiterte
Konfigurations- und
Stromverwaltungsschnittstelle).
Eine Standardschnittstelle, die dem Betriebssystem die Steuerung der
Konfiguration und Energieverwaltung ermöglicht.
Agent In der Dell AIM Umgebung (VMRacks auf Basis von Red Hat Xen und Microsoft
Hyper-V sowie Personas) die optionale, auf Komponenten installierte Software,
mittels derer der Controller die Koponenten verwaltet und ihre
Netzwerkeigenschaften festlegt.
Agentenlose Persona Eine Dell AIM Persona ohne installierten Dell AIM Agent.
Umgebungstemperatur Die Temperatur in dem Bereich oder Raum, in dem sich das System befindet.
Array-Mitglied Ein in einer PS-Series Gruppe konfiguriertes Dell EqualLogic PS-Series Array.
Gruppen können mehrere Mitglieder besitzen.
Array-Seriennummer In der Dell EqualLogic PS-Series Arrayumgebung eine eindeutige
Identifikationszeichenkette für das Dell EqualLogic PS-Series Array, die auf der
Hardware des Arrays verschlüsselt ist. Siehe Service Tag.
ASM/ME Siehe Auto-Snapshot Manager/Microsoft Edition.
ASM/VE Siehe Auto-Snapshot Manager/VMware Edition.
Asset Management Appliance
(Appliance zur Systemverwaltung)
Eine Lösung zur Anlagenverwaltung für IT-Mitarbeiter auf Basis der Dell KACEAppliance, die Software und Lizenzen überwacht. Sie automatisiert die
Verwaltung von Bestandslisten, Softwareanlagen, Versionen, Upgrades und
Computern über eine webgestützte Anzeigetafel.
Bestands-Tag Ein individueller Code, der dem System aus Sicherheits- oder
Überwachungsgründen üblicherweise vom Systemadministrator zugewiesen
wird.
Zugewiesene Laufwerke Im Dell Compellent Storage Center die physischen Datenträger, die einem
Laufwerksordner zur Verwaltung zugewiesen und zur Speicherung von
3Volumes und Replays verwendet werden. Siehe Laufwerksordner,
Speicherpool.
Assignment Mode
(Zuweisungsmodus)
Ein Mechanismus zur Steuerung, wie Personas und VMRacks den Hosts auf
Basis der Verfügbarkeit von HBAs im Host zugewiesen werden. Siehe HBA.
async/Asynchrone Replikation Der Vorgang, bei dem Daten auf lokalen Speicher geschrieben werden und
dann in einer Warteschlange auf die Speicherung auf einem entfernten SAN
warten. Wenn das lokale SAN vor Durchführung des Schreibvorgangs ausfällt,
kann die Replikation möglicherweise fehlschlagen. Siehe Replikation,
synchrone Replikation, Remote Instant Replay.
Automatische RAID-Konfiguration Im Kontext von Dell EqualLogic PS-Series Gruppen ein interner Prozess, der
das benutzerdefinierte RAID-Verfahren auf dem Array konfiguiert.
Auto-Snapshot Manager/Microsoft
Edition (ASM/ME)
Eine Snap-in-Konsolenanwendung für die Microsoft Verwaltungskonsole, mit
der Smart Copies verwaltet werden können.
Auto-Snapshot Manager/VMware
Edition (ASM/VE)
Eine webgestützte Anwendung, die zusammen mit virtuellen VMwareUmgebungen die Verwaltung von Smart Copies ermöglicht.
Verfügbarer Speicherplatz Menge des gesamten Speicherplatzes auf allen Laufwerken.
Back-End Beim Dell Compellent Storage Center ein isoliertes und dediziertres Netzwerk,
das den Controller oder Speichercluster (bzw. ein redundantes Controllerpaar)
mit lokalen Laufwerkgehäusen verbindet.
Back-End-Netzwerk Verbindung zwischen Controller und Laufwerken im Dell Compellent Storage
Center Controller.
Basisvolume (Reihe Dell EqualLogic
PS-Series)
Ein auf dem Computer gemountetes und über seinen unter Windows
zugewiesenen Laufwerkbuchstaben (beispielsweise G:) oder Mount-Point
erreichbares Volume.
Basisvolume (Dell EqualLogic Group
Manager)
Ein Volume, das Snapshots aufweist. Snapshots hängen vom Basisvolume
ab. Ist das Basisvolume zerstört, wurden die Snapshots entfernt.
Baseboard Management Controller
(BMC)
Ein Modul für die Serververwaltung, welches das IPMI-Protokoll (Intelligent
Platform Management Interface) implementiert. Im Rahmen des Dell AIM
verwendet der Controller den BMC zur Remote-Steuerung einiger
Servermodelle.
Blade Beim Dell AIM SDK ist ein Blade ein Element der Host-Superklasse. Bei
modularen Dell-Systemen bezieht sich Blade auf einen modularen in ein
Gehäuse eingebauten Server.
BMC Siehe Baseboard Management Controller.
Startfähiger Datenträger Eine CD, SD-Karte oder ein USB-Speichermedium, mit dem das System
gestartet werden kann, wenn ein Start von der Festplatte nicht möglich ist.
Cache Schneller Speicherbereich, der eine Kopie von Daten oder Anleitungen enthält,
um die Zugriffszeiten auf Daten zu verkürzen.
CHA Siehe Compellent Host Adapter.
Challenge Handshake Authentication
Protocol (CHAP)
Ein Protokoll zur Netzwerkanmeldung mit einem verschlüsselten Anfrage- und
Antwort-Verfahren. Wird bei Hosts, die den korrekten Benutzernamen und das
4korrekte Kennwort angeben, zur Einschränkung des Zugriffs auf Volumes und
Snapshots verwendet. CHAP wird ebenfalls für Anmelde-/Administratorkonten
genutzt.
Kanal In der Dell/AIM-Umgebung eine von bis zu acht physischen Verbindungen, die
Switch-Ports zugewiesen werden können und über bis zu acht physische
Netzwerkkarten mit einer Persona verbunden werden können. Ein Netzwerk
kann mit ein oder zwei bevorzugten Kanälen für den Datenverkehr konfiguriert
werden, damit bei Ausfall des bevorzugten Kanals der Datenverkehr unsichtbar
zum anderen Kanal geleitet wird.
CHAP Siehe Challenge Handshake Authentication Protocol.
Gehäuse-Switch Im Kontext des Dell AIM ein Ethernet-Switch in einem
Gehäuseschacht. Gehäuse-Switches werden durch den Controller verwaltet.
Client Device Communication
Certificate
Im Kontext des EKM ein spezieller Verschlüsselungscode, durch den ein Client
mit dem Server kommunizieren kann.
Clusterknoten Ein physisches Mitglied eines Ressourcen-Clusters wie beispielsweise ein
Host in einem Servercluster oder ein SAN in einem Speichercluster.
Sammlung Beim ASM/ME sind Sammlungen zusammengehörige Gruppen von
Speicherobjekten wie Volumes, Snapshots oder Anwendungskomponenten
und werden im Baumdiagramm der ASM-Konsole durch Knoten unter dem
Masterknoten der jeweiligen Sammlung dargestellt. Beim Dell EqualLogic
Group Manager erscheinen Volume- und Replika-Sammlungen sowie
benutzerdefinierte Snapshot-Sammlungen in der Hierarchie unter der VolumeAnsicht.
Compellent Host Adapter (CHA) In jedem Controller eines Dell Compellent Storage Center befindliche Karte/
Akku für den internen Cache. Der Speicher des Schreibcache wird auf die
Cache-Karte gespiegelt. Auf einem Dell Compellent Storage Center mit zwei
Controllern enthält die Cache-Karte von Controller 1 die Spiegelung für
Controller 2 und die Cache-Karte von Controller 2 die Spiegelung für Controller
1. Auf einem Dell Compellent Storage Center mit einem Einzelcontroller enthält
die Cache-Karte die Spiegelung für den Einzelcontroller.
Konfiguration Die Datenbank, die den gesamten Inhalt und die Konfiguration der Dell AIM
Umgebung beschreibt.
Conservation Mode
(Erhaltungsmodus)
Ein Datenbewahrungsmodus des Dell Compellent Storage Center, der aktiviert
wird, wenn der verbleibende freie Speicherplatz unter einen kritischen
Schwellenwert sinkt (typischerweise 10%, bis zu 32 GB). Im ConservationModus gibt das Dell Compellent Storage Center eine Warnung aus, verhindert
die Erstellung neuer Volumes und gibt Replays schneller frei, um Speicherplatz
zu gewinnen. Siehe Notfallmodus.
Konsole Die webgestützte Benutzeroberfläche, mit der Elemente in der Dell AIM
Umgebung überwacht und bearbeitet werden können. Die Dell AIM Konsole
befindet sich im Dell AIM Controller.
Kontrollmodul In Dell EqualLogic PS-Series Arrays die physische Prozessor- und
Schnittstellenkomponente. Ein Kontrollmodul enthält in seinem Flash-Speicher
die Firmware der Dell EqualLogic PS-Series und sichert vorübergehend die
5unterbrechungsfreie Stromversorgung für Daten im Cachespeicher. Es verfügt
über mehrere Netzwerkschnittstellen und einen optionalen seriellen Port. Ein
Array kann zwei Hot-Swap-fähige, doppelt redundante Controller enthalten.
Dabei bedient das aktive Kontrollmodul die E/A, während das zweite
Kontrollmodul Daten in seinem Cache spiegelt.
Bedienfeld Teil des Systems, der die Anzeigen und Bedienelemente enthält, z.B. den
Netzschalter und die Betriebsanzeige.
Steuerungsport Der iSCSI-Zielport, mit dem iSCSI-Initiatoren (Server) für Speicherabfragen
verbunden werden. In einem für den Virtual-Port-Modus konfigurierten Dell
Compellent Storage Center wird für jede iSCSI-Fault-Domain ein
Steuerungsport erstellt, um den iSCSI-Datenverkehr zum entsprechenden
virtuellen Port zu leiten.
Controller (Dell AIM) Software, die die physische und virtuelle Hardware, Software und
Netzwerkkonfigurationen verwaltet und die Dell AIM Konsole beherbergt. Bei
einem Paar dynamischer Controller läuft jeder Controller auf einem dedizierten
Server, verfügt jedoch über eine gemeinsame Konfigurationsdatenbank und
weitere Schlüsseldateien in einem gemeinsamen Dateisystem.
Controller (Dell Compellent) Bietet Gruppierung von Festplatten (RAID), E/A-Routing, Fehlererkennung und
Datenwiederherstellung. Stellt die Intelligenz des gesamten Dell Compellent
Storage Center Untersystems dar. Jedes Storage-Center-System enthält
mindestens einen Controller. Storage Center und Controller empfehlen
Korrekturmaßnahmen zur Verbesserung der Leistung und Verfügbarkeit des
Systems.
Controller Services
(Controllerdienste)
Im Kontext des Dell AIM die virtuelle(n) IP-Adresse(n), die der Controller zur
Kommunikation mit dem System Control Network (SCN), verwalteten Switches,
der Konsole, der Befehlszeilenschnittstelle (CLI) etc. verwendet. In der
Standardeinstellung ist dies eine einzelne virtuelle IP-Adresse auf dem aktiven
Controller; es können jedoch auch eindeutige Adressen für die Dienste „SCN
Services“ und den SNMP Trap Collector festgelegt werden.
Copilot Services (Kopilotendienste) Innerhalb des Dell Compellent Storage Center die Kombination aus zentralen
Support-, Produktinformations- und Vertriebsressourcen, die das System
proaktiv überwachen und zur Steigerung der Leistung und Optimierung der
Systemverfügbarkeit korrigierende Maßnahmen einleiten.
Copy-Mirror-Migrate (KopierenSpiegeln-Migrieren)
Eine Funktion des Dell Compellent Storage Center, die das Migrieren von
Volumes zwischen unterschiedlichen Laufwerktypen und RAID-Levels
ermöglicht.
Credential Store Im Kontext des EKM eine Ablage, die Zugangsdaten von Sitzungen enthält.
Zugangsdaten sind sicherheitsrelevante Informationen wie Benutzernamen,
Kennwörter oder Zertifikate.
Cryptographic Object Ein Verfahren zur Sicherung von Daten.
Data Collector Komponente des Dell Compellent Enterprise Manager, die im Hintergrund auf
einem Server ausgeführt wird und Informationen zu allen Storage-CenterSystemen erfasst, die mit dem Server verbunden sind.
6Data Instant Replay Eine Funktion des Dell Compellent Storage Center, die in festgelegten
Intervallen speichereffiziente Point-in-Time-Kopien (PITC) eines Volumes auf
dem lokalen SAN anlegt, so dass ein Volume gegebenenfalls auf einen
früheren Zeitpunkt zurückgesetzt werden kann. Siehe Replay, Snapshot.
Data Progression Eine Funktion des Dell Compellent Storage Center, die Datenseiten auf Basis
der E/A-Aktivität (Nachfrage) automatisch auf Geräte mit höherer oder
niedrigerer Leistung transferiert. Siehe Tiered Storage (mehrstufige
Speicherung).
DDR Siehe Double-Data Rate.
Delegierter Speicherplatz Im Kontext des Dell EqualLogic Group Manager in einer Gruppe
zurückgehaltener Speicherplatz für die Speicherung empfangener Replika für
einen Partner.
Dell Encryption Key Manager (EKM) Der Dell Encryption Key Manager (EKM) sichert auf LTO-Bändern gespeicherte
Daten durch die Verwaltung von Verschlüsselungscodes für Dell-Lösungen für
die Bandautomation.
Dell Remote Access Controller
(DRAC)
Eine Schnittstellenkarte mit der Fähigkeit zur bandexternen Verwaltung. Der
Controller verfügt über einen eigenen Prozessor, Speicher,
Netzwerkverbindung und Zugang zum Systembus und ermöglicht
Systemadministratoren die Remote-Steuerung von Systemen in einem
Netzwerk.
Gerätetreiber Programm, über das die Kommunikation des Betriebssystems oder eines
anderen Programms mit einem Peripheriegerät gesteuert wird.
DHCP Siehe Dynamic Host Configuration Protocol.
Digital Versatile Disc Digital Versatile Disc oder Digital Video Disc (DVD).
Laufwerksordner Beim Dell Compellent Storage Center eine Sammlung physischer
Datenspeichergeräte (Laufwerke, SSDs), die von einem Benutzer angesehen
und verwaltet werden können. Laufwerksordner legen den/die Speicherpool(s)
fest, von denen Volume-Speicherplatz zugewiesen wird. Obwohl
Laufwerksordner mehreren Speicherpools zugeordnet werden können, ist die
Leistung des Dell Compellent Storage Center am höchsten, wenn alle
Laufwerke demselben Ordner und Speicherpool zugewiesen werden.
Laufwerksposition Beim Dell Compellent Storage Center die Position eines Laufwerkschachts
innerhalb seines Gehäuses in Zeilen-Spalten-Notation. So bezieht sich
beispielsweise die Laufwerksposition 01-02 auf den Schacht in der ersten
Reihe von oben und der zweiten Spalte von links.
DNS Siehe Domain Name System.
Domain Name System (DNS) Ein Verfahren zum Übersetzen von Internet-Domänennamen, wie z.B.
www.example.com, in IP-Adressen wie 208.77.188.166.
Ruhende Persona In der AIM-Umgebung eine Persona, die momentan weder auf einem Host läuft
noch darauf wartet.
Double-Data Rate (DDR) Eine Technologie in Speichermodulen zur potenziellen Verdoppelung der
Datenrate, indem Daten sowohl an der ansteigenden als auch der abfallenden
Flanke eines Taktzyklus übertragen werden.
7DRAC Dell Remote Access Controller (DRAC).
DRAM Siehe Dynamic Random-Access Memory.
Doppelt Redundant Beim Dell Compellent Storage Center eine Option von Speicherprofilen zum
Schutz gegen den Verlust jedes einzelnen von zwei Laufwerken; erfolgt
typischerweise durch die Verwendung von RAID 10 und/oder RAID 6.
DVD Siehe Digital Versatile Disc.
Dynamic Host Configuration Protocol
(DHCP)
Verfahren zur automatischen Zuweisung von IP-Adressen zu einem ClientSystem.
Dynamic Random-Access Memory
(DRAM)
Der RAM eines Systems besteht normalerweise ausschließlich aus DRAMChips.
EKM Siehe Dell Encryption Key Manager.
EKM Administrator Im Kontext des EKM der Superbenutzer, der Benutzer und Gruppen erstellen
und löschen kann.
EKM Encryption Manager
(tklmadmin)
Im Kontext des EKM der tägliche Benutzer, der Schlüssel und Geräte erstellt
oder löscht.
Emergency Mode (Notfallmodus) Beim Dell Compellent Storage Center ein Modus, der aktiviert wird, wenn das
System aufgrund fehlenden freien Speicherplatzes nicht mehr betriebsfähig
ist. Im Notfallmodus wird sämtliche Server-E/A abgelehnt, sämtliche Volumes
werden offline genommen und können nur dann wieder online gehen, wenn
genügend Speicherplatz für die Beendigung des Notfallmodus frei gemacht
wird. Siehe Conservation-Modus.
Gehäuse Ein physisches Gehäuse, das für mehrere Laufwerke eine gemeinsame
Schnittstelle für die Stromversorgung und die Kühlung bereitstellt.
Umgebung Im Kontext des Dell AIM der Bestand von Hardware, Software und
Netzwerkkonfigurationen, die durch einen Dell AIM Controller verwaltet
werden.
Eth0 Siehe Ethernet Port 0.
Eth1 Siehe Ethernet Port 1.
Ethernet Port 0 (Eth0) Beim Dell Compellent Storage Center ist Eth0 eine für die Verwaltung
reservierte Ethernet-Schnittstelle.
Ethernet Port 1 (Eth1) Beim Dell Compellent Storage Center ist Eth1 eine für die Kommunikation
zwischen Controller-Prozessen, das Clustering oder Fernreplikation reservierte
Ethernet-Schnittstelle.
Externes Netzwerk Im Kontext der Dell AIM Umgebung ein Netzwerk, das nicht Teil der Dell AIM
Umgebung, jedoch physisch und logisch mit ihr verbunden ist.
Externer Switch Im Kontext der Dell AIM Umgebung ein Switch, der nicht Teil der Dell AIM
Umgebung, jedoch physisch und logisch mit ihr verbunden ist.
Fabric Eine Kombination aus miteinander verbundenen Switches die als einheitliche
Routing-Infrastruktur fungieren. Sie ermöglicht mehrere Verbindungen
zwischen Geräten auf einem SAN und erlaubt die reibungslose Eingliederung
8neuer Geräte. Eine FC- (oder iSCSI-)Topologie mit mindestens einem auf dem
Netzwerk vorhandenen Switch.
FastTrack Ein optionales Storage-Center-Dienstprogramm, das die aktivsten Daten auf
den äußeren (schnelleren) Laufwerksspuren platziert.
FAT Siehe File Allocation Table.
Fault Domain Innerhalb der Dell Compellent Storage Center Umgebung bezeichnet eine Fault
Domain eine Ausfallgruppe. Im Virtual-Port-Modus können alle Front-End-Ports
Teil der einen Fault Domain sein. Im Legacy-Modus stellt jeder primäre und
reservierte Port eine Fault Domain dar.
FC Siehe Fibre Channel.
FE Siehe Front-End-Netzwerk.
Fibre Channel (FC) Eine Hochgeschwindigkeitsverbindung mit der Server mit Controllern und
Back-End-Laufwerkgehäusen verbunden werden. FC-Komponenten sind
beispielsweise HBAs, Hubs, Switches und die Verkabelung. Der Begriff FC
erstreckt sich auch auf ein serielles Vollduplex-Hochgeschwindigkeitsprotokoll
für die Kommunikation, das Datenübertragungsraten von bis zu 10 Gigabit pro
Sekunde ermöglicht.
File Allocation Table (FAT) Die Dateisystemstruktur, mittels derer MS-DOS die Dateispeicherung
organisiert und verfolgt. Unter dem Betriebssystem Microsoft Windows kann
optional ein FAT-Dateisystem verwendet werden.
File Transfer Protocol (FTP) Ein Protokoll auf Anwendungsebene, mit dem große Dateien zwischen
Rechnern oder Hosts transferiert werden.
Front-End-Netzwerk (FE) Die Komponente im SAN-Datenschreibfluss (Server zu Switch zu Controller zu
Laufwerken) des Dell Compellent Storage Center, die Schreibvorgänge von
Daten initiiert. Im Allgemeinen stellen Server (oder Switches) das Front-End
des Controllers dar. Ein Storage-Center-System, das Daten auf ein entferntes
System repliziert, stellt jedoch das Front-End des entfernten Systems dar.
Siehe Back-End.
FTP Siehe File Transfer Protocol.
GB Siehe Gigabyte.
Gigabyte (GB) 1024 Megabyte bzw. 1.073.741.824 Byte. In Bezug auf Festplattenkapazitäten
wird der Wert jedoch üblicherweise auf 1.000.000.000 Byte gerundet.
Gruppe Siehe PS-Series Gruppe.
HBA Siehe Host Bus Adapter.
HIT/LE Siehe Host Integration Tools für Linux.
HIT/ME Siehe Host Integration Tools für Windows.
HIT/VM Siehe Host Integration Tools für VMware
Host In der Dell AIM Umgebung kann ein Host ein physischer Server (rackmontiert
oder Blade) oder eine Virtual Machine sein. Beim Dell AIM SDK eine
Superklasse, die Bladeserver, rackmontierte Server und Virtual Machines
(VMs) umfasst.
9Host-Adapter Ein Controller, der die Kommunikation zwischen dem Systembus und dem
Peripheriegerät, typischerweise einem Speichergerät, regelt.
Host-Bus-Adapter (HBA) Ein Gerät (typischerweise eine Add-on-Karte), das einen Server mit einem SAN
(Storage Area Network) verbindet. Jeder HBA wird vom SAN anhand seiner
WWPN (World Wide Port Number) eindeutig identifiziert. Gebräuchliche HBATypen sind Fibre Channel und iSCSI.
Host Integration Tools für Linux (HIT/
LE)
Ein Satz von Werkzeugen zur Integration von ESX-Systemen in Dell EqualLogic
PS-Series Speicherarrays. Er enthält den Auto Snapshot Manager/VMware
Edition (ASM/VE), den EqualLogic Datastore Manager und das EqualLogic
Virtual Desktop Deployment Utility.
Host Integration Tools für Windows
(HIT/ME)
Ein Satz von Anwendungen zur Konfigurierung und Verwaltung von Arrays. Er
enthält den ASM/ME, das DSM (Multipath I/O Device Specific Module) und den
RSW (Remote Setup Wizard).
Host Integration Tools für VMware
(HIT/VM)
Ein Satz von Werkzeugen zur Integration von Linux-Systemen in Dell
EqualLogic PS-Series Speicherarrays. Er enthält das Remote Setup Wizard
Command Line Interface (RSWCLI), die EqualLogic Host Performance and
Configuration Tuning Suite (eqltune) und die EqualLogic Log Gathering Facility
(eqllog).
Hotspare-Laufwerk (Ersatzlaufwerk) In der Dell Compellent Storage Center Umgebung ist ein Hotspare-Laufwerk ein
Backup-Laufwerk für Sicherungskopien. Falls ein aktives Array ausfällt,
gliedert der Controller das Hotspare in das aktive Array ein und führt einen
fliegenden Neuaufbau der Daten durch. Während das Hotspare ohne
menschliches Zutun in ein aktives Laufwerk umgewandelt wird, sollten Sie
daran denken, das ausgefallene Laufwerk so bald wie möglich auszutauschen,
damit das Array wieder durch ein neues Hotspare geschützt ist. Hotspares
können sich über mehrere Laufwerkgehäuse erstrecken. Storage-CenterHotspares können eine andere Kapazität aufweisen als das Datenlaufwerk, das
sie ersetzen.
Hot-Plug Die Fähigkeit, ein Gerät in das Hostsystem einzusetzen oder zu installieren
(typischerweise eine Festplatte oder einen internen Lüfter) während das
System eingeschaltet und in Betrieb ist. Wird auch als Hot-Swap bezeichnet.
Hot-Swap Siehe hot-plug.
E/A Eingabe/Ausgabe. Ein Eingabegerät ist beispielsweise eine Tastatur, ein
Ausgabegerät ein Monitor. Im Allgemeinen kann die E/A-Aktivität von der
Rechenaktivität unterschieden werden.
ID In der Dell AIM Umgebung eine eindeutige Kennung für ein Element, die ihm
zugewiesen wird, wenn es zur Umgebung hinzugefügt wird.
iDRAC Siehe integration Dell Remote Access Controller
IKEv2-SCSI Ein Protokoll für die Zertifikaterstellung.
Image Speziell beim Dell AIM die Bits, die auf einem Laufwerk oder einem
Speicherarray gespeichert sind, das eine Persona oder VMRack startet, sowie
Informationen, die der Controller zum Starten dieses Image auf einem
bestimmten Hosttyp verwendet. Eine Persona oder ein VMRack kann
beispielsweise mit mehr als einem Image konfiguriert werden, so dass die
10Persona entweder auf einem physischen Server oder einer Virtual Machine
gestartet werden kann.
infiniBand infiniBand bietet bidirektionale serielle Punkt-zu-Punkt-Verbindungen für die
Verbindung von Prozessoren und Hochgeschwindigkeits-Peripheriegeräten.
Instant Replay Siehe Data Instant Replay.
integration Dell Remote Access
Controller (iDRAC)
Ein Remote-Access-Controller, der das Internet-SCSI-Protokoll verwendet.
Intelligent Platform Management
Interface IPMI (Intelligente PlattformVerwaltungsschnittstelle)
Ein in einigen Servern durch Verwaltungsmodule umgesetztes Protokoll, mit
dem die Server ferngesteuert werden. Die Blade-Verwaltungsmodule in DellServern implementieren iPMI.
Verbindungsswitch Ein durch den Controller verwalteter Switch in der Dell AIM Umgebung, durch
den Elemente wie Gehäuse, vRacks oder Verbindungsswitches und externe
Switches verbunden werden.
internet-SCSI (iSCSI) Internet-SCSI (siehe SCSI). Ein Protokoll, das Standard-SCSI-Befehle zur
Kommunikation zwischen Client-Servern (iSCSI-Initiatoren) und NetzwerkSpeichergeräten (iSCSI-Targets) auf IP-Netzwerken beinhaltet.
IPMI Siehe Intelligent Platform Management Interface.
iSCSI Siehe Internet SCSI.
Key Management Interoperability
Protocol (KMIP)
Standards für die Kommunikation zwischen EnterpriseSchlüsselverwaltungssystemen und Verschlüsselungssystemen.
Key Serving Ports Ports, die vom Betriebssystem für die Kommunikation im EKM verwendet
werden.
Schlüsselgruppe Im EKM ein Satz von Schlüsseln, die einer bestimmten Abteilung, Region oder
Hardwareart zugeordnet sind.
Schlüssel Ein verschlüsseltes Zertifikat, mit dem Daten im EKM geschützt werden.
Keystore / Keygroup / Master
Keystore
Eine Gruppe codierter Schlüssel im EKM.
KMIP Siehe Key Management Interoperability Protocol
Java Database Connectivity (JDBC) Eine Programmierschnittstelle (API) für die Programmiersprache Java, die
festlegt, wie ein Client auf Daten in einer Datenbank zugreifen, sie abfragen
und sie aktualisieren darf.
JDBC Siehe Java Database Connectivity.
Führungscontroller Der Primärcontroller in einem Dell Compellent Storage Center mit zwei
Controllern. Normalerweise teilen sich die Führungs- und Peer-Controller die
Speicher-E/A-Belastung, was den Durchsatz im Wesentlichen verdoppelt.
Externe Verwaltungsfunktionen werden jedoch nur vom Führungscontroller
durchgeführt. Fällt ein Controller aus, wird oder bleibt der übrige Controller der
Führungscontroller und übernimmt die Aufgaben der beiden Controller. Siehe
Peer-Controller.
Legacy-Modus Beim Dell Compellent Storage Center werden Fault Domains konfiguriert, um
Paare von primären und reservierten Front-End-Ports zuzuordnen, die
11redundant miteinander verbunden sind. Durch dieses Verfahren wird
Speicherdatenverkehr gegen Single Points of Failure geschützt (Komponenten,
deren Ausfall zum Ausfall eines Systems führen kann). Siehe Fault Domain,
Virtueller Port oder Virtual-Port-Modus.
Linear Tape-Open (LTO) Ein Format für Bandlaufwerke mit offenen Standards.
Logical Unit Number (LUN) Eine logische Einheit (Logical Unit) ist eine konzeptionelle Aufteilung (eine
Untereinheit) eines Speicherlaufwerks oder eines Satzes von
Speicherlaufwerken. Jede logische Einheit besitzt eine Adresse, die als Logical
Unit Number (LUN) bezeichnet wird und deren eindeutige Identifizierung
ermöglicht.
LTO Siehe Linear Tape-Open.
LTO Key Group Rollover (Rücksetzen
der Schlüsselgruppe)
Im EKM ein zugewiesener Schlüsselsatz, der benutzt wird, wenn die StandardSchlüsselgruppe beeinträchtigt ist.
LUN Siehe Logical Unit Number.
MAC-Adresse Siehe Media Access Control Adresse.
Verwaltete Laufwerke Beim Dell Compellent Storage Center Speichergeräte (Laufwerke, SSDs), die
einem Laufwerksordner zugewiesen werden, um die Geräte einem
Speicherpool zuzuordnen. Siehe Speicherpool, Laufwerksordner.
Verwaltetes System Ein verwaltetes System ist jedes System, das mithilfe von Dell OpenManage™
Server Administrator überwacht und verwaltet wird.
Verwaltungs-IP-Adresse Adresse für die Verbindung mit einem intelligenten IP-fähigen Gerät, um dieses
Gerät zu verwalten oder zu überwachen. Die Adresse kann für die
ausschließliche Verwendung durch Verwaltungsanwendungen reserviert oder
für die Verwendung durch Verwaltungsanwendungen und Dienste freigegeben
werden.
Verwaltungsnetzwerk Ein optionales Verwaltungsnetzwerk trennt iSCSI-Datenverkehr (E/A von
Volumes) von Verwaltungsdatenverkehr (GUI und CLI Sessions und andere
Kommunikation für die Gruppenverwaltung oder Vorgänge zwischen Gruppen).
Verwaltungsstation Ein System, mit dem ein oder mehrere verwaltete Systeme von einem zentralen
Standort aus fernverwaltet werden.
Manuelles Replay Eine Funktion des Dell Compellent Storage Center, die es dem Benutzer
ermöglicht, manuell Point-in-Time-Kopien der Daten von Volumes zu einem
bestimmten Zeitpunkt zu erstellen.
Replikation durch manuelle
Übertragung
Über transportable Datenträger statt über ein Netzwerk durchgeführte
Replikation. Wird in Fällen angewandt, in denen die Netzwerkverbindung
zwischen Replikationspartnern zu langsam oder auf andere Weise für den
Transfer großer Datenmengen ungeeignet ist.
Manual Transfer Utility
(Dienstprogramm für den manuellen
Transfer)
Ein einzelnes Dienstprogramm von Dell EqualLogic, das die Replikation von
Volumes mittels transportabler Datenträger anstelle des Netzwerkes
durchführt. Das Dienstprogramm verfügt sowohl über eine grafische
Benutzoberfläche (GUI) als auch eine Befehlszeilenschnittstelle (CLI).
12Media Access Control Address
(MAC-Adresse)
Die eindeutige Hardwarekennung des Systems in einem Netzwerk.
migrate volume (Volume Migrieren) Ein Befehl des Dell Compellent Storage Center, mit dem Daten von einem
Volume zum anderen transferiert werden.
Migration Im Kontext des EKM die Kombination eines Schlüsselspeichers mit einem
vorhandenen Schlüsselspeicher während (nicht nach) der Installation des Dell
Encryption Key Manager 3.0.
mirror volume (Volume spiegeln) Ein Befehl des Dell Compellent Storage Center, mit dem ein lokales Volume auf
ein entferntes Dell Compellent Storage Center repliziert und aktualisiert wird,
bis das Spiegeln manuell abgebrochen wird.
Spiegeln Eine Art der Datenredundanz, bei der Daten auf einem Satz physischer
Laufwerke und Duplikatkopien der Daten auf einem oder mehreren weiteren
Laufwerksätzen gespeichert werden. Die Spiegelungsfunktion wird durch eine
Software bereitgestellt. Siehe Striping, RAID.
NAS Siehe Network-Attached Storage.
Netzwerkanschluss Ein Objekt, das die erforderlichen Netzwerk-Anschlüsse einer Persona oder
eines VMRacks festlegt. Ein Netzwerkanschluss wird beispielsweise erstellt,
wenn eine Persona zu einem Netzwerk hinzugefügt wird.
Network-Attached Storage (NAS) NAS ist eines der Konzepte zur Implementierung gemeinsamer Speicherung
auf einem Netzwerk. NAS-Systeme besitzen ihre eigenen Betriebssysteme und
integrierte Hardware und Software, die auf bestimmte Speicheranforderungen
zugeschnitten sind.
NTP Das Network Time Protocol (NTP) ist ein Protokoll zur Synchronisierung der
Uhren von Computersystemen über paketvermittelte Datennetzwerke mit
variabler Latenz hinweg.
Überkonfigurierter Speicherplatz In einem SAN, das schlanke Provisionierung unterstützt, die Menge an
Speicherplatz, die als verfügbar konfiguriert, jedoch nicht physisch vorhanden
ist (d.h. konfigurierter Speicherplatz minus verfügbarem Speicherplatz).
Paritätsstripe In RAID-Arrays ein Festplattenlaufwerk mit Striping, das Paritätsdaten enthält.
Partition Eine physische, mithilfe des Befehls „fdisk“ entstandene Sektion einer
Festplatte. Partitionen können mit dem „format“-Befehl auf mehrere logische
Laufwerke aufgeteilt werden.
Passiver Controller Der Dell AIM Controller, der als Standby-Reservegerät fungiert und bei Ausfall
des aktiven Controllers für die Übernahme der Verwaltungsaufgaben
bereitsteht.
Peer-Controller In einem Dell Compellent Storage Center mit zwei Controllern teilt sich der
Peer-Controller die E/A-Belastung mit dem Führungscontroller, führt jedoch
keine externen Verwaltungsfunktionen durch. Fällt der Führungscontroller aus,
übernimmt der Peer-Controller die E/A- und Verwaltungsaufgaben beider
Controller. Siehe Führungscontroller.
Persona Eine auf Laufwerk festgehaltene Umgebung: das Betriebssystem, optionale
Dell AIM Softwareagenten, das Netzwerk oder weitere für eine auf einem Host
der Dell AIM Umgebung laufende Anwendung benötigte Einstellungen.
13Pool Für die Nutzung durch Volumes auf einem SAN verfügbarer Speicherplatz.
Beim Dell Compellent Enterprise Storage Manager und dem Dell Compellent
Storage Center entspricht dies dem Gesamtspeicherplatz im SAN. In Dell
EqualLogic PS-Series Arrays entspricht dies dem Gesamtspeicherplatz auf den
Mitgliedern des jeweiligen Pools.
Pool-Administrator Ein Konto auf einer Dell EqualLogic PS-Series Gruppe, das nur zur Verwaltung
von Objekten in einem bestimmten Pool oder Satz von Pools für eine Gruppe
berechtigt ist. Vergleiche Gruppen-Administrator.
Primärgruppe Innerhalb der Umgebung des Dell EqualLogic Group Manager diejenige
Gruppe, die das ursprüngliche Volume im Rahmen einer
Replikationspartnerschaft enthält. Siehe Sekundärgruppe.
Primärvolume Innerhalb der Umgebung des Dell EqualLogic Group Manager ein Volume, das
für die Replikation auf einen Replikationspartner konfiguriert ist.
PS-Series Array Eine einzelne Dell EqualLogic iSCSI-Speichereinheit, die üblicherweise als Dell
EqualLogic PS-Series Gruppe konfiguriert ist. Mehrere PS-Series Arrays
können in einer größeren PS-Series Gruppe zusammengefasst und als
einzelnes iSCSI-SAN verwaltet werden.
PS-Series Gruppe Eine aus einem oder mehreren Dell EqualLogic PS-Series Speicherarrays
zusammengesetzte iSCSI-Speichereinheit, auf die über eine einzige IP-Adresse
zugegriffen und die als Storage Area Network (SAN) verwaltet werden kann.
Öffentliche Dienste Im Kontext des Dell AIM die virtuelle IP-Adresse der Controllerdienste, mithilfe
derer die Konsole oder CLI mit dem aktiven Controller verbunden wird.
RAC Remote Access Controller
RAID Siehe Redundant Array of Independent Disks.
RAID 0 Daten werden in Stripes über die verfügbaren Laufwerke verteilt und so die
Leistung verbessert. RAID 0 bietet keinerlei Datenredundanz.
RAID 10 Daten werden in Stripes über die verfügbaren Laufwerke verteilt und
gespiegelt, was Datenverfügbarkeit und eine verbesserte Leistung bietet. Hält
mindestens eine vollständige Kopie aller Daten auf dem Volume aufrecht. RAID
10 bietet optimale Lese-/Schreibleistung, eine erhöhte Wahrscheinlichkeit für
die Tolerierung mehrfacher Ausfälle und die schnellste Wiederherstellung von
Daten.
RAID 5 Hält mithilfe eines mathematisch hergeleiteten rotierenden Paritätsstripes eine
logische Kopie der Daten aufrecht. Das Paritätsstripe wird aus den
Datenstripes abgeleitet. Dieses Verfahren bietet eine geringere Überkapazität
für redundante Informationen als RAID 10, weist jedoch aufgrund der
Berechung des Paritätsstripes bei jedem Schreibvorgang eine geringere
Schreibleistung auf als RAID 10. Die Leseleistung hingegen entspricht
derjenigen von RAID 10.
RAID 50 RAID-Level 50 ist eine Kombination aus RAID-Level 5 und RAID-Level 0. RAID
50 umfasst sowohl Paritäts- als auch Laufwerk-Striping über mehrere
Laufwerke hinweg.
14Wiederherstellungs-Volume Ein zum Zweck der Wiederherstellung von Daten erstelltes Volume. Bei Dell
EqualLogic PS-Series Arrays wird ein Wiederherstellungs-Volume durch
Verwendung eines eingehenden Replikasatzes als Teil eines Ausfallprozesses
erstellt. Es können zudem Vorlage-Volumes und Thin Clones für die
Wiederherstellung erzeugt werden. Beim Dell Compellent Storage Center wird
ein Ansichts-Volume aus einem Replay erstellt. Siehe Replika, AnsichtsVolume, Replay.
Redundanz Die Duplizierung von Informationen oder Hardwarekomponenten, um
sicherzustellen, dass bei Ausfall einer Primäreinheit eine Sekundäreinheit
dessen Funktion übernehmen kann. Das Dell Compellent Storage Center bietet
Redundanz für jede Komponente, so dass kein Single Point of Failure existiert
(Komponente deren Ausfall zum Ausfall eines Systems führen kann).
Einzelredundanz schützt gegen Datenverlust bei Ausfall einer einzigen
Komponente. Doppelte Redundanz schützt gegen Datenverlust bei Ausfall von
zwei Komponenten.
Redundant Array of Independent
Disks (RAID).
Redundante Anordnung unabhängiger Laufwerke. Ein Verfahren zur
Bereitstellung von Datenredundanz. Einige verbreitete Implementierungen von
RAID sind RAID 0, RAID 1, RAID 5, RAID 10 und RAID 50. Siehe Spiegeln,
Striping.
Remote Instant Replay Eine Funktion des Dell Compellent Storage Center, bei der ein Replay auf ein
entferntes Dell Compellent Storage Center repliziert wird. Das lokale und das
entfernte Dell Compellent Storage Center befinden sich in einer Aktiv-AktivKonfiguration; die bidirektionale Replikation kann synchron oder asynchron in
unabhängigen Intervallen erfolgen. Für Replikationen beim Dell Compellent
Storage Center ist die Softwareanwendung Enterprise Manager und eine
Replikationslizenz erforderlich. Siehe Replay, Remote-System, Replikation.
Remote Setup Wizard (RSW) Eine grafische Benutzeroberfläche (GUI), mit der ein Dell EqualLogic PS-Series
Array nach erfolgter Installation des Host Integration Tools/Microsoft Edition
konfiguriert werden kann.
Remote-System Beim Dell Compellent Storage Center ein separates SAN, das so konfiguriert
ist, dass das lokalen Dell Compellent Storage Center Replikationsdaten vom
ursprünglichen Volume empfängt. Für Replikationen beim Dell Compellent
Storage Center ist die Softwareanwendung Enterprise Manager und eine
Replikationslizenz erforderlich. Siehe Replikation.
Replay Beim Dell Compellent Storage Center eine voll verwendungsfähige Point-inTime-Kopie (PITC) von Daten, die ein Image von Daten zu dem Zeitpunkt
enthält, an dem die Kopie gestartet wurde. Die Kopie kann lokal oder auf einem
entfernten Dell Compellent Storage Center gespeichert werden. Siehe
Snapshot, Data Instant Replay, Remote Instant Replay.
Replay-Profil Beim Dell Compellent Storage Center ein Satz von Regeln, die festlegen, wann
und wie Replay-Point-in-Time-Kopien angefertigt werden und wie lange sie
gespeichert werden. Siehe Replay.
Replay-Speicherplatz Beim Dell Compellent Storage Center der Speicherplatz, der automatisch für
Replays reserviert und verwendet wird. Siehe aktiver Speicherplatz,
tatsächlicher Speicherplatz.
15Replik Ein Point-in-Time-Abbild eines Dell EqualLogic PS-Series Volumes. Das
ursprüngliche Volume und seine Replika befinden sich in verschiedenen Dell
EqualLogic PS-Series Gruppen (Replikationspartner), die nach Möglichkeit
geografisch getrennt sind, um die Toleranz gegen Katastrophen zu erhöhen.
Replika-Sammlung Beim Dell EqualLogic Group Manager der Satz von Replika, der aus jeder
Replikation einer Volume-Sammlung hervorgeht.
Replica-Sammlungs-Satz Beim Dell EqualLogic Group Manager der Satz von Replika-Collections für eine
Volume-Sammlung.
Replika-Reserve Beim Dell EqualLogic Group Manager der Anteil des delegierten
Speicherplatzes bei einem Replikationspartner, der für die Replika-Sätze eines
bestimmten Volumes reserviert ist. Die Replika-Reserve wird für das Volume
auf der Primärgruppe konfiguriert, die tatsächliche Replika-Reserve befindet
sich jedoch auf der Sekundärgruppe.
Replika-Satz Beim Dell EqualLogic Group Manager der Satz vollständiger Replika für ein
Volume, eine Volume-Vorlage oder ein Thin-Clone-Volume.
Replizierendes System Ein Dell Compellent Storage Center, das so konfiguriert ist, dass es
Replikationsdaten von einem oder mehreren lokalen Volumes zu einem
entfernten Storage Center sendet. Siehe Replikation, Remote-System, Remote
Instant Replay.
Replikation Das Kopieren von Volume-Daten (nur Deltas) vom primären (lokalen) SAN auf
ein sekundäres (entferntes) SAN, damit Daten erforderlichenfalls von jedem
SAN wiederhergestellt werden können. Die SANs können unbegrenzt weit
voneinander entfernt sein.
Replikationspartner Beim Dell EqualLogic Group Manager eine Gruppe, die so konfiguriert ist, dass
sie Replika an oder von einem anderen Partner sendet oder empfängt.
RSW Siehe Remote Setup Wizard.
Lauffähige Persona Im Kontext des Dell AIM eine vom Netzwerk gestartete Persona, die darauf
wartet, einem Host zugewiesen zu werden.
SAN Siehe Storage Area Network.
SAN HeadQuarters Ermöglicht die Überwachung mehrerer Dell EqualLogic PS-Series Gruppen von
einer einzigen grafischen Benutzeroberfläche. Es sammelt und formatiert
Leistungsdaten und weitere wichtige Gruppeninformationen.
SCN Siehe System Control Network.
SCN Services (SCN-Dienste) Die virtuelle IP-Adresse der Controllerdienste, die Personas und VMRacks in
der Dell AIM Umgebung zur Kommunikation mit dem aktiven Controller
verwenden.
SCSI Siehe Small Computer System Interface.
SDK Siehe Software Development Kit.
Sekundäres Kontrollmodul Innerhalb der Umgebung des Dell EqualLogic Group Manager spiegelt das
sekundäre Kontrollmodul Cache-Daten vom aktiven Kontrollmodul. Stellt das
aktive Kontrollmodul seine Funktion ein, übernimmt das sekundäre
Kontrollmodul den Netzwerkbetrieb. Siehe aktives Kontrollmodul.
16Sekundärgruppe In einer Replikationskonfiguration des Dell EqualLogic Group Manager
diejenige Gruppe, die Replika eines Quell-Volumes empfängt. Siehe
Primärgruppe.
Servercluster Eine Gruppe unabhängiger, als ein System zusammenarbeitender Server, die
im Falle eines Ausfalls eines Einzelcomputers den ununterbrochenen Betrieb
sicherstellen.
Service Tag (Service-Tag-Nummer) Eine Kennzeichnung auf dem System, mit dem es für einen Anruf beim
technischen Support von Dell identifiziert werden kann.
Simple Mail Transfer Protocol
(SMTP)
Legt ein Nachrichtenformat und ein Verfahren zur Weiterleitung fest, mit dem
Nachrichten zwischen Hosts im Internet hin- und her gesendet werden.
Simple Network Management
Protocol (SNMP)
SNMP ist eine Industriestandardschnittstelle, mit der Netzwerkadministratoren
Workstations im Fernzugriff überwachen und verwalten können.
Simulator Eine Komponente des Dell AIM SDK, die eine laufende Dell AIM Umgebung
einschließlich Controller, Konsole und physischem und virtuellem Netzwerk
emuliert. Siehe SDK.
Small Computer System Interface
(SCSI)
Eine E/A-Bus-Schnittstelle mit schnellerer Datenübertragungsrate als
Standardports.
SMART Self-Monitoring Analysis and Reporting Technology (Selbstüberwachende
Analyse- und Berichtstechnologie). Ermöglicht Fehler- und Ausfallberichte von
Festplatten an das System-BIOS und deren Anzeige auf dem Bildschirm.
Smart Copy Eine anwendungskonsistente Point-in-Time-Kopie des ASM/ME von Objekten
in einer Dell EqualLogic PS-Series Gruppe. Smart Copies können je nach
Version des verwendeten Auto-Snapshot Managers aus Snapshots, Klonen
oder Replika bestehen.
SMP Siehe Symmetric Multiprocessing.
SMTP Siehe Simple Mail Transfer Protocol.
Snapshot Eine Point-in-Time-Kopie (PITC) eines Volumes zu einem bestimmten
Zeitpunkt. Siehe Replay.
Snapshot-Sammlung Ein Satz von Snapshots, der aus der Anfertigung eines Snapshot auf einer
Volume-Sammlung herrührt. Siehe Volume-Sammlung.
SNMP Simple Network Management Protocol (SNMP)
SNMP Trap Collector Im Kontext des Dell AIM die virtuelle IP-Adresse der Controllerdienste, die
verwaltete Switches und andere Geräte verwenden, um SNMP-Traps an den
aktiven Controller zu senden.
Software Development Kit (SDK) Ein Satz von Entwicklungswerkzeugen, mit denen Anwendungen für spezielle
Softwarepakete, Software-Frameworks, Hardware-Plattformen,
Computersysteme, Videospielkonsolen, Betriebssysteme oder ähnliche
Plattformen erstellt werden.
Space Recovery Ein Dienstprogramm zur Gewinnung von Speicherplatz, der laut WindowsBerichten belegt, tatsächlich jedoch leer ist. Das Programm sorgt so für
weiteren verfügbaren Speicherplatz, der vom Storage Center verwendet
werden kann.
17Spare Disk (Ersatzlaufwerk) Ein ausgewiesenes oder ungenutztes Laufwerk in einem SAN, das automatisch
als Ersatz für ein ausgefallenes Laufwerk verwendet wird.
Storage Area Network (SAN) Ein Storage Area Network (SAN) ist ein spezialisiertes Netzwerk, das mittels
Blockspeicherprotokollen Zugang zu hoch verfügbaren HochgeschwindigkeitsSpeichersubsystemen gewährt. Das SAN besteht aus bestimmten Geräten wie
Host-Bus-Adaptern (HBAs) in den Hostservern, Switches für das Routen von
Speicherdatenverkehr und Festplattenspeicher-Subsystemen. Das
Hauptmerkmal eines SANs ist, dass die Speichersubsysteme generell für
mehrere Hosts gleichzeitig verfügbar und dadurch skalierbar und flexibel sind.
Vergleiche NAS.
Speichercluster Beim Dell Compellent Storage Center mehrere SAN-Controller, die zwecks
Verbesserung der Zuverlässigkeit, Verfügbarkeit, Betriebsfähigkeit und
Leistung (über Lastausgleich) miteinander verbunden sind. Das Storage Center
bietet durch eine Aktiv-Aktiv-Konfiguration eine automatische ControllerAusfallsicherung. Ein vollständig gespiegelter, akkugesicherter Cache in jedem
Controller gewährleistet auch über einen Neustart hinweg die
Datenverfügbarkeit und ermöglicht bei einem Ausfall eines der Controller die
Migration von Volumes zwischen den Controllern.
Speicher-Clustering Eine Funktion des Dell Compellent Storage Center, die durch mehrfache
Controller in einer Aktiv-Aktiv-Konfiguration eine automatische
Ausfallsicherung bietet. Ein vollständig gespiegelter akkugesicherter Cache
bietet Fehlertoleranz und sorgt bei einem Controllerausfall automatisch für den
Neustart bzw. die Wiederherstellung.
Speicherpool Siehe Pool.
Speicherprofil Beim Dell Compellent Storage Center ein Satz von Regeln, der die
Laufwerkstypen (Tier) für die Datenspeicherung und den für jede Ebene
einzusetzenden RAID-Level festlegen.
Speichertyp Beim Dell Compellent Storage Center ein Satz von Attributen einschließlich
Redundanzoptionen und Blockgröße, die steuern, wie Speicherplatz von einem
Speicherpool alloziert und geschützt wird.
Striping Laufwerk-Striping schreibt Daten über drei oder mehrere Laufwerke in einem
Array, verwendet auf jedem Laufwerk jedoch nur einen Teil des
Speicherplatzes. Die durch den „Stripe“ genutzte Menge an Speicherplatz ist
auf jedem verwendeten Laufwerk identisch. Ein virtuelles Laufwerk kann
mehrere Stripes auf derselben Laufwerkgruppe in einem Array nutzen . Siehe
auch Spiegeln und RAID.
Symmetric Multiprocessing (SMP) Ein System, bei dem mindestens zwei Prozessoren bei hoher Datenrate
miteinander verbunden sind und von einem Betriebssystem gesteuert werden.
Dabei hat jeder Prozessor gleichen Zugriff auf E/A-Geräte.
synch Siehe Synchrone Replikation.
Synchrone Replikation Funktion, bei der dieselben Daten automatisch auf zwei separate Volumes
geschrieben und auf unterschiedlicher physischer Hardware gespeichert
werden, bevor die Anwendung eine Meldung über den Abschluss des E/AVorgangs erhält. Dabei sind beide Schreibvorgänge entweder erfolgreich oder
fehlgeschlagen, so dass beide Volumes jederzeit voll synchronisiert sind. Die
18Funktion kann jedoch die Schreiblatenzzeiten der Anwendung erhöhen.
Siehe synch.
System Control Network SCN
(Systemsteuerungsnetzwerk)
Ein internes Netzwerk, das der Dell AIM für die Kommunikation zwischen dem
Controller, Personas und VMRacks nutzt. Der Controller verwendet dieses
Netzwerk auch, um Server zu erkennen und Personas und VMRacks auf ihnen
zu starten.
System-Setup-Programm Ein BIOS-gestütztes Programm, mit dem durch die Einstellung von Funktionen
die Hardware eines Systems konfiguriert und der Systembetrieb durch den
Benutzer festgelegt werden kann. Da das System-Setup-Programm im NVRAM
gespeichert ist, bleiben sämtliche Einstellungen bis zu einer erneuten
Änderung wirksam.
Systems Deployment Appliance
(Systembereitstellungs-Appliance)
Eine Lösung zur Systemverwaltung für IT-Mitarbeiter auf Basis der Dell KACEAppliance, die Werkzeuge für das Imaging von Laufwerken, die Migration des
Benutzerzustands, Fernverwaltung von Anlagen, Reparatur und
Wiederherstellung von Systemen sowie die Erfassung von Bestandslisten und
Anlagen bereitstellt. Darüber hinaus automatisiert sie vor und nach der
Bereitstellung Konfigurationsaufgaben, wie das Erfassen von
Computerbestandslisten und Anlagen; sie automatisiert ebenfalls das
Konfigurieren von Laufwerken, BIOS und RAID sowie die Softwareverteilung
und Konfigurationsverwaltung.
Systems Management Appliance
(Systemverwaltungs-Appliance)
Eine Lösung zur Systemverwaltung für IT-Mitarbeiter auf Basis der Dell KACEAppliance, die durch eine webgestützte Schnittstelle Aufgaben wie die
Verwaltung von Bestandslisten, Softwareverteilung, Berichte, PatchVerwaltung, Anlagenverwaltung, Scripting und Support vereinfacht.
Vorlage Im Kontext des Dell AIM eine ruhende Persona, die für die Erstellung weiterer
Personas geklont werden kann, jedoch nicht lauffähig ist (um Änderungen an
der Vorlage zu vermeiden).
Vorlagenvolume Ein schreibgeschütztes Volume, von dem aus Thin Clones erstellt werden
können.
Thin Clone (schlanker Klon) Volume, das sich Speicherplatz mit einem Vorlagenvolume teilt. Thin Clones
bieten eine effiziente Speicherplatznutzung bei Konfigurationen mit mehreren
Volumes und einer großen Menge gemeinsamer Daten.
Thin Provisioning (Schlanke
Speicherzuweisung)
Funktion, die eine Überprovisionierung (oder Überkonfigurierung) des im SAN
verfügbaren Speicherplatzes ermöglicht. Speicherobjekte (wie Volumes) mit
schlanker Speicherzuweisung informieren Anwendungen zwar über ihre
maximal mögliche Größe, nutzen tatsächlich jedoch eventuell deutlich weniger
Speicherplatz. Durch schlanke Speicherzuweisung kann der
Gesamtspeicheraufwand reduziert, die Verfügbarkeit erhöht und eine höhere
Leistung erzielt werden.
Tiered Storage (Mehrstufige
Speicherung)
Speicheroptimierungsstrategie, bei der oft und schnell benötigte Daten auf
teuren, schnellen Datenträgern und selten benötigte Daten auf weniger teuren,
langsameren Datenträgern gespeichert werden.
Nicht verwalteter Speicherplatz Bei Dell EqualLogic PS-Series Arrays zugeordneter Speicherplatz auf der
Sekundärgruppe, der von der Primärgruppe nicht länger zugänglich ist.
19Uplink-Port Ein Port auf einem Netzwerk-Hub oder -Switch, über den weitere Hubs oder
Switches ohne Cross-Over-Kabel angeschlossen werden können.
Vacating Beim Dell EqualLogic Group Manager das Entfernen eines Mitglieds aus einer
Gruppe, während das Mitglied online bleibt.
Ansichts-Volume Beim Dell Compellent Storage Center ein schreibgeschütztes Volume, das aus
einem vorherigen Replay hauptsächlich zum Zweck der
Datenwiederherstellung erzeugt wurde. Siehe Replay.
Virtueller Port oder Virtual-PortModus
Im Kontext des Dell Compellent Storage Center ist bei virtuellen Ports keine
Portreservierung mehr erforderlich. Im Betriebsmodus „Virtual Port“ (Virtueller
Port) nehmen alle Front-End-Ports E/A an und können Teil einer Fault Domain
sein. Informationen zur Aktivierung virtueller Ports finden Sie im
Einrichtungshandbuch des Dell Compellent Storage Center Systems.
virtual World Wide Port Name
(vWWPM)
Ein vom Dell AIM zur Erstellung SAN-gestarteter Personas verwendeter
weltweiter virtueller Portname.
Virtualisierung Die Möglichkeit, mithilfe von Software die Ressourcen eines einzelnen
Computers oder Speichergeräts über mehrere Umgebungen hinweg
gemeinsam zu nutzen. Für den Benutzer kann dabei ein einzelnes physisches
System oder Gerät wie mehrere virtuelle Systeme erscheinen und auch
mehrere Betriebssysteme beherbergen.
VMRack Ein Rack von Virtual Machines (VMs) auf einem Server, auf dem eine
Kombination aus Softwareagenten und Red Hat Xen, VMware ESX oder
Microsoft Hyper-V läuft.
Volume Eine einzelne Speichereinheit, die mittels Striping auf einem Speichergerät
oder mehreren Speichergeräten verteilt ist.
Volume-Sammlung Mehrere in einer Gruppe zusammengefasste Volumes mit dem Zweck, auf den
Volumes gleichzeitig Operationen durchzuführen. Siehe Snapshot-Sammlung,
Replika-Sammlung.
Volume-Reserve Menge an Speicherplatz, die einem Volume aus dem freien Speicherplatz eines
Pools zugewiesen ist. Ohne schlanke Provisionierung entspricht die VolumeReserve der berichteten Größe.
Volumetyp Im Kontext des Dell Compellent Storage Center gibt es folgende Volumetypen:
dynamisch, Replay aktiviert und Replikation. Ein Volume ist solange dynamisch,
bis mindestens ein Replay von ihm erstellt wurde. Sobald ein Replay erstellt
wurde, wird der Volumetyp zu „Replay Enabled“ (Replay Aktiviert). Ein
Replikations-Volume ist ein Volume, das auf ein anderes Dell Compellent
Storage Center repliziert wird.
vRack Im Kontext des Dell AIM eine logische Gruppe von Hosts, die mit einem
virtuellen Switch (vRack-Switch) verbunden sind.
vRack-Switch Im Kontext des Dell AIM ein virtueller Switch, der Hosts in einem vRack
verbindet.
vWWPN Siehe virtual World Wide Port Name.
20Glosario de Dell: versión 2
GlosarioGlosario
ACPI Ver Interfaz de energía y configuración avanzada
módulo de control
activo
Para arreglos Dell EqualLogic PS Series de un arreglo de módulo de control dual, el módulo
de control que está activamente ocupado en la E/S de una red. Si deja de funcionar, cede el
testigo al módulo de control secundario. Ver Módulo de control secundario.
controladora activa La controladora de Dell AIM que está gestionando de forma activa el entorno de Dell AIM.
espacio activo En Dell Compellent Storage Center, la cantidad de espacio que utiliza un volumen,
excluyendo las reproducciones. Esta cantidad no incluye sobrecarga de RAID. Ver
Reproducción.
espacio real En Dell Compellent Storage Center, la cantidad de espacio activo más el espacio de
reproducciones de un volumen. Ver espacio activo, espacio de Reproducciones.
Interfaz de energía y
configuración
avanzada (ACPI)
Interfaz estándar que permite al sistema operativo controlar la configuración y la
administración de energía.
agente En el entorno de Dell AIM (VMRacks basados en Red Hat Xen y Microsoft Hyper-V, más
personas), el software opcional instalado en elementos que la controladora utiliza para
administrar los elementos y configurar sus propiedades de sistema de red.
persona sin agente Persona de Dell AIM que no tiene un agente de Dell AIM instalado.
temperatura ambiente La temperatura del área o de la habitación donde se encuentra el sistema.
miembro de arreglo Arreglo Dell EqualLogic PS Series configurado en un grupo PS Series. Los grupos pueden
tener varios miembros.
número de serie de
arreglo
En el entorno de arreglo Dell EqualLogic PS Series, una cadena de identificación de arreglo
Dell EqualLogic PS Series que se codifica en el hardware del arreglo. Consulte la etiqueta de
servicio.
ASM/ME Ver Auto-Snapshot Manager/Microsoft Edition.
ASM/VE Ver Auto-Snapshot Manager/Microsoft Edition.
Servidor de
administración de
activos
Solución de administración de activos basada en el servidor KACE de Dell para profesionales
de TI que realiza un seguimiento del software y del cumplimiento de licencias. Automatiza la
administración del inventario, los activos de software, las versiones, las actualizaciones y los
equipos a través de un panel basado en web.
etiqueta de propiedad Código individual asignado a un sistema, normalmente por un administrador, con fines de
seguridad o de seguimiento.
Discos asignados En Dell Compellent Storage Center, medios físicos de almacenamiento asignados a una
carpeta de discos para que se administren y utilicen para almacenar volúmenes y
reproducciones. Ver carpeta de discos, Bloque de almacenamiento.
modo de asignación Mecanismo para controlar cómo se asignan las personas y VMRacks a los hosts en función
de la disponibilidad de HBA en el host. Ver HBA.
replicación asíncrona El proceso de escribir datos en un almacenamiento local y de ponerlos luego en cola para su
almacenamiento en una SAN remota. Si la SAN local falla antes de que se entregue una
3escritura, es posible que la replicación falle. Ver replicación, replicación sincrónica,
reproducción instantánea remota.
configuración RAID
automática
En el contexto de los grupos Dell EqualLogic PS Series, un proceso interno que configura la
política de RAID seleccionada por el usuario en el arreglo.
Auto-Snapshot
Manager/Microsoft
Edition (ASM/ME)
Aplicación de consola de complemento para Microsoft Management Console que le permite
administrar Smart Copies.
Auto-Snapshot
Manager/VMware
Edition (ASM/VE)
Aplicación basada en web que funciona con entornos virtuales VMware para permitirle
administrar Smart Copies.
espacio disponible Cantidad de almacenamiento total disponible en todas las unidades.
back-end En Dell Compellent Storage Center, red aislada y dedicada que conecta la controladora o el
clúster de almacenamiento (por ejemplo, par redundante de controladoras) con gabinetes de
discos locales.
red de back-end Conexión entre controladora y discos en la controladora de Dell Compellent Storage Center.
volumen base (Dell
EqualLogic PS Series)
Un volumen montado en el equipo y al que se accede a través de su letra de unidad asignada
por Windows (por ejemplo, G:) o de su punto de montaje.
volumen base (Dell
EqualLogic Group
Manager)
Un volumen que tiene instantáneas. Las instantáneas dependen del volumen base. Si el
volumen base se destruye, las instantáneas se habrán eliminado.
Controladora de
administración de la
placa base (BMC)
Módulo de administración de servidores que implementa el protocolo de Interfaz de
administración de plataforma inteligente (IPMI). En el contexto de Dell AIM, la controladora
utiliza el BMC para controlar algunos modelos de servidores de manera remota.
blade Para el SDK de Dell AIM, el blade es un elemento de la superclase host. Para sistemas
modulares de Dell, un blade hace referencia a un servidor modular que se monta en un
gabinete.
BMC Ver Controladora de administración de la placa base.
Medio de inicialización CD, tarjeta SD o memoria USB que se utiliza para iniciar el sistema si éste no va a iniciarse
desde la unidad de disco duro.
caché Área de almacenamiento rápido que conserva una copia de los datos o instrucciones para
brindar una recuperación más rápida de los datos.
CHA Ver Adaptador de host Compellent.
Protocolo de
autenticación por
desafío mutuo (CHAP)
Protocolo de autenticación por desafío mutuo, un protocolo de inicio de sesión de red que
utiliza un mecanismo de desafío-respuesta cifrado. Se utiliza para limitar el acceso a
volúmenes e instantáneas a los hosts que suministran el nombre de cuenta y la contraseña
correctos. CHAP también se utiliza para cuentas de inicio de sesión/administrador.
canal En el entorno Dell/AIM, una de un máximo de ocho conexiones físicas que puede asignar
para conmutar puertos y que puede conectar a una persona utilizando hasta ocho NICs
físicas. Puede configurar una red para preferir uno o dos canales para su tráfico, de modo
que si el canal preferido falla, el tráfico se redirige de forma clara al otro canal.
CHAP Ver Protocolo de autenticación por desafío mutuo.
4conmutador de chasis En el contexto de Dell AIM, un conmutador Ethernet en el compartimento de un chasis. Los
conmutadores de chasis los administra la controladora.
certificado de
comunicación de
dispositivo cliente
En el contexto de EKM, una clave cifrada especializada que permite a un cliente
comunicarse con el servidor.
Nodo del clúster Miembro físico de un clúster de recursos, caso de un host en un clúster de servidores o una
SAN en un clúster de almacenamiento.
colección En ASM/ME, una colección son grupos relacionados de objetos de almacenamiento como,
por ejemplo, volúmenes, instantáneas o componentes de aplicación, y se representan
mediante nodos en el Árbol de consola ASM bajo el nodo maestro Colecciones. En Dell
EqualLogic Group Manager, las colecciones de volúmenes y réplicas y las colecciones de
instantáneas personalizadas aparecen en la jerarquía bajo la vista Volúmenes.
Adaptador de host
Compellent (CHA)
Tarjeta/batería de caché interna colocada en cada controladora de Dell Compellent Storage
Center. La memoria de caché de escritura se duplica en la tarjeta de caché. En un Dell
Compellent Storage Center de controladora dual, la tarjeta de caché de la controladora 1
contiene el duplicado de la controladora 2, y la tarjeta de caché de la controladora 2
contiene el duplicado de la controladora 1. En un Dell Compellent Storage Center de una sola
controladora, la tarjeta de caché contiene el duplicado de la única controladora.
configuración Base de datos que describe todo el contenido y la configuración del entorno de Dell AIM.
Modo de conservación En Dell Compellent Storage Center, un modo de conservación de datos que se alcanza
cuando el espacio libre restante está por debajo de un umbral crítico (normalmente el 10%,
hasta 32 GB). En modo de conservación, Dell Compellent Storage Center genera una alerta,
impide que se creen nuevos volúmenes e inicia la caducidad de reproducciones a una
velocidad mayor para liberar espacio. Ver Modo de emergencia.
Consola La interfaz de usuario basada en web que utiliza para supervisar y trabajar con los
elementos del entorno de Dell AIM. La consola de Dell AIM está alojada por la controladora
de Dell AIM.
módulo de control En arreglos Dell EqualLogic PS Series, el componente de interfaz y procesador físico. Un
módulo de control contiene el firmware Dell EqualLogic PS Series en memoria flash y
proporciona alimentación continua a los datos ordenados en la memoria caché. Tiene varias
interfaces de red y un puerto serie opcional. Un arreglo puede contener dos controladoras
redundantes duales de intercambio activo. El módulo de control activo suministra E/S,
mientras el módulo de control secundario duplica los datos de su caché.
panel de control Parte del sistema que contiene indicadores y controles, como el botón de encendido y el
indicador de alimentación.
Puerto de control Puerto iSCSI de destino al que se conectan los iniciadores iSCSI (servidores) para realizar
solicitudes de almacenamiento. En un Dell Compellent Storage Center configurado para
modo de puerto virtual, se crea un puerto de control para cada dominio de error iSCSI, para
redirigir el tráfico iSCSI al puerto virtual adecuado.
Controladora (Dell AIM) Software que administra el hardware virtual y físico, el software y las configuraciones de red
y que aloja la consola de Dell AIM. En el contexto de un par de controladoras resistentes,
cada controladora se ejecuta en un servidor dedicado pero comparte una base de datos de
configuración y otros archivos de clave de un sistema de archivos compartido.
5Controladora (Dell
Compellent)
Proporciona agregación de discos (RAID), enrutamiento de E/S, detección de errores y
recuperación de datos. Proporciona la inteligencia para todo el subsistema Dell Compellent
Storage Center. Cada sistema Storage Center contiene al menos uno. Storage Center
recomienda acciones correctivas para mejorar el rendimiento y la disponibilidad del sistema.
Servicios de
controladora
En el contexto de Dell AIM, la dirección o las direcciones IP virtuales que utiliza la
controladora para comunicarse con la Red de control del sistema (SCN), los conmutadores
administrados, la consola y la CLI, etc. De forma predeterminada, se trata de una dirección
IP virtual única en la controladora activa, pero puede especificar direcciones únicas para los
servicios SCN Services (Servicios de SCN) y SNMP Trap Collector (Recolector de capturas
SNMP).
Copilot Services En Dell Compellent Storage Center, combinación de asistencia centralizada, formación sobre
productos y recursos de ventas que supervisan proactivamente el sistema y recomiendan
acciones correctivas para mejorar el rendimiento y la disponibilidad del sistema.
Copy-Mirror-Migrate
(Copiar-DuplicarMigrar)
Función de Dell Compellent Storage Center que permite que los volúmenes se migren entre
diferentes tipos de disco y niveles de RAID.
almacén de
credenciales
En el contexto de EKM, un repositorio que contiene información de credenciales de las
sesiones. La información de credenciales son datos de seguridad como nombres de usuario,
contraseñas y certificados.
Objeto criptográfico Método de protección de los datos.
Recopilador de datos Componente de Dell Compellent Enterprise Manager que se ejecuta en segundo plano en un
servidor, recopilando información sobre todos los sistemas de Compellent Storage Center
conectados al servidor.
Reproducción
instantánea de datos
Función de Dell Compellent Storage Center que captura copias puntuales (PITC) que ahorran
espacio en la SAN local a intervalos definidos, ofreciendo la posibilidad de revertir un
volumen a un punto en el tiempo anterior. Ver Reproducción, instantánea.
Progresión de datos Función de Dell Compellent Storage Center que migra automáticamente las páginas a
dispositivos de rendimiento más alto o más bajo, en función del nivel de actividad de E/S
(demanda). Ver almacenamiento nivelado.
DDR Ver Velocidad de datos doble.
espacio delegado En el contexto de Dell EqualLogic Group Manager, espacio de un grupo reservado para
almacenar las réplicas recibidas de un asociado.
Dell Encryption Key
Manager (EKM)
Dell Encryption Key Manager (EKM) protege los datos almacenados en cartuchos de cinta
LTO administrando claves de cifrado para soluciones de automatización de cinta de Dell.
Dell Remote Access
Controller (DRAC)
Tarjeta de interfaz que proporciona recursos de administración fuera de banda. La
controladora tiene sus propios procesador, memoria, conexión de red y acceso al bus del
sistema, y permite a los administradores del sistema controlar los sistemas de forma remota
a través de una red.
controladora de
dispositivo
Programa que permite que el sistema operativo u otro programa establezca una interfaz
correcta con un dispositivo periférico.
DHCP Ver Protocolo de configuración dinámica de host.
Disco versátil digital Disco versátil digital o disco de vídeo digital (DVD).
6carpeta de discos En Dell Compellent Storage Center, colección de dispositivos de medios físicos de
almacenamiento (discos, SSD) que un usuario puede ver y administrar. Las carpetas de
discos determinan los bloques de almacenamiento desde los que se asigna el espacio de
almacenamiento de volúmenes. Aunque las carpetas de discos pueden estar asociadas con
varios bloques de almacenamiento, el rendimiento de Dell Compellent Storage Center se
maximiza al asignar todos los discos a la misma carpeta y bloque de almacenamiento.
Posición de disco En Dell Compellent Storage Center, la posición de ranura de una unidad de disco en su
gabinete, en notación fila-columna. Por ejemplo, la posición de disco 01-02 hace referencia a
la ranura de la primera fila empezando por arriba y a la segunda columna empezando por la
izquierda.
DNS Ver Sistema de nombres de dominio.
Sistema de nombres de
dominio (DNS)
Método de conversión de nombres de dominio de Internet en direcciones IP; por ejemplo,
conversión de www.ejemplo.com en 208.77.188.166.
Imagen inactiva En el entorno de AIM, imagen que actualmente no se ejecuta (o espera para ser ejecutada)
en un host.
Velocidad de datos
doble (DDR)
Velocidad de datos doble. Tecnología de los módulos de memoria que puede llegar a doblar
la velocidad de los datos al transferir datos en los flancos tanto de subida como de bajada de
un ciclo de reloj.
DRAC Ver Dell Remote Access Controller.
DRAM Ver Memoria dinámica de acceso aleatorio.
Redundante dual En Dell Compellent Storage Center, una opción de perfil de almacenamiento para protegerse
frente a la pérdida de dos unidades, normalmente mediante el uso de RAID 10 y/o RAID 6.
DVD Ver Disco versátil digital.
Protocolo de
configuración dinámica
de host (DHCP)
Método de asignación automática de una dirección IP a un sistema cliente.
Memoria dinámica de
acceso aleatorio
(DRAM)
La memoria RAM de un sistema está por lo general totalmente conformada por chips de
DRAM.
EKM Ver Dell Encryption Key Manager.
Administrador de EKM En el contexto de EKM, el superusuario que puede crear o eliminar usuarios y grupos.
EKM Encryption
Manager (tklmadmin)
En el contexto de EKM, el usuario diario que crea o elimina claves y dispositivos.
Modo de emergencia En Dell Compellent Storage Center, un modo al que se llega cuando el sistema ya no puede
funcionar porque no hay más espacio libre. En modo de emergencia, se rechaza toda E/S del
servidor y todos los volúmenes se ponen fuera de línea y no se pueden volver a poner en
línea hasta que se libere suficiente espacio para salir del modo de emergencia. Ver Modo de
conservación.
gabinete Un gabinete físico que proporciona una única interfaz, alimentación y enfriamiento a varios
discos o blades.
7entorno En el contexto de Dell AIM, la colección de hardware, software y configuraciones de red
administradas por una controladora de Dell AIM.
Eth0 Vea puerto 0 Ethernet.
Eth1 Vea puerto 1 Ethernet.
puerto 0 Ethernet (Eth0) En Dell Compellent Storage Center, Eth0 es una interfaz Ethernet dedicada a la
administración.
puerto 1 Ethernet (Eth1) En Dell Compellent Storage Center, Eth1 es una interfaz Ethernet dedicada a la comunicación
interprocesal entre controladoras, para agrupación en clústeres y replicación remota.
red externa En el contexto del entorno de Dell AIM, una red que no forma parte del entorno de Dell AIM
pero que está, física y lógicamente, conectada a él.
conmutador externo En el contexto del entorno de Dell AIM, un conmutador que no forma parte del entorno de
Dell AIM pero que está, física y lógicamente, conectado a él.
Red Fabric Combinación de conmutadores interconectados que actúa como infraestructura de
enrutamiento unificada. Permite varias conexiones entre dispositivos de una SAN y permite
que nuevos dispositivos entren discretamente. Una topología FC (o iSCSI) con al menos un
conmutador presente en la red.
FastTrack Una utilidad opcional de Dell Compellent Storage Center que coloca dinámicamente los
datos más activos en las pistas de disco exteriores (más rápidas).
FAT Ver Tabla de asignación de archivos.
Dominio de error En el entorno de Dell Compellent Storage Center, un dominio de error identifica un conjunto
de protección contra fallos. En modo de puerto virtual, todos los puertos de front-end pueden
formar parte del dominio de error. En modo heredado, cada puerto primario y reservado crea
un dominio de error.
FC Ver Fibre Channel.
FE Ver Red de front-end.
Fibre Channel (FC) Interconexión de alta velocidad que se utiliza para conectar servidores con controladoras y
gabinetes de disco de back-end. Los componentes de FC incluyen HBA, concentradores,
conmutadores y cables. El término FC también hace referencia a un protocolo de
comunicación en serie completamente dúplex de alta velocidad que permite velocidades de
transferencia de datos de hasta 10 gigabits por segundo.
Tabla de asignación de
archivos (FAT)
Estructura del sistema de archivos usada por MS-DOS para organizar y realizar un
seguimiento del almacenamiento de archivos. Los sistemas operativos Microsoft Windows
pueden opcionalmente utilizar una estructura de sistema de archivos FAT.
Protocolo de
transferencia de
archivos (FTP)
Protocolo de la capa de aplicaciones que se utiliza para transferir archivos de datos masivos
entre máquinas o hosts.
Red de front-end (FE) El componente de escrituras de datos (servidor a conmutador a controladora a discos) del
flujo de SAN de Dell Compellent Storage Center que inicia las escrituras de datos. En
general, los servidores (o los conmutadores) son el front-end de la controladora. Sin
embargo, un sistema Storage Center que esté replicando datos a un sistema remoto será el
front-end del sistema remoto. Ver back-end.
8FTP Ver Protocolo de transferencia de archivos.
GB Ver Gigabyte(s).
Gigabyte(s) (GB) 1.024 megabytes o 1.073.741.824 bytes. No obstante, cuando se refiere a la capacidad de
unidad de disco duro; el término se suele redondear a 1.000.000.000 bytes.
grupo Ver Grupo PS Series.
HBA Ver Adaptador de bus host.
HIT/LE Ver Host Integration Tools para Linux.
HIT/ME Ver Host Integration Tools para Windows.
HIT/VM Ver Host Integration Tools para VMware.
host En el entorno de Dell AIM, un host puede ser un servidor físico (montado en bastidor o blade)
o una máquina virtual. En el SDK de Dell AIM, una superclase que incluye servidores blade,
servidores montados en bastidor y máquinas virtuales (VM).
adaptador host Controladora que implementa la comunicación entre el bus del sistema y el dispositivo
periférico, que suele ser un dispositivo de almacenamiento.
Adaptador de bus host
(HBA)
Dispositivo, normalmente una tarjeta complementaria, que conecta un servidor a una SAN
(Red de área de almacenamiento). Cada HBA se identifica de forma exclusiva en la SAN a
través de su WWPN (Número de puerto mundial). Entre los tipos comunes de HBA están
Fiber Channel e iSCSI.
Host Integration Tools
para Linux (HIT/LE).
Suite de herramientas que integran sistemas ESX con arreglos de almacenamiento Dell
EqualLogic PS Series. Incluye Auto Snapshot Manager/VMware Edition (ASM/VE),
EqualLogic Datastore Manager, y EqualLogic Virtual Desktop Deployment Utility.
Host Integration Tools
para Windows (HIT/
ME).
Suite de aplicaciones que le permiten configurar y administrar un arreglo. Incluye ASM/ME,
DSM (Módulo específico de dispositivo de E/S multirruta), y RSW (Remote Setup Wizard,
Asistente para la instalación remota).
Host Integration Tools
para VMware (HIT/VM)
Suite de herramientas que integran sistemas Linux con arreglos de almacenamiento Dell
EqualLogic PS Series. Incluye la interfaz de línea de comandos del asistente para la
instalación remota (RSWCLI), EqualLogic Host Performance and Configuration Tuning Suite
(eqltune), y EqualLogic Log Gathering Facility (eqllog).
Disco de repuesto
dinámico
En el entorno de Dell Compellent Storage Center, un disco de repuesto dinámico es un disco
de copia de seguridad. En caso de que falle un arreglo activo, la controladora hace que el
repuesto dinámico forme parte del arreglo activo y reconstruye los datos al vuelo. Aunque el
repuesto dinámico se convierte en un disco activo sin intervención humana, recuerde
sustituir la unidad errónea lo antes posible, para que el arreglo vuelva a estar protegido con
un nuevo repuesto dinámico. Los repuestos dinámicos pueden abarcar varios gabinetes de
disco. Los repuestos dinámicos de Storage Center pueden tener una capacidad diferente a
la unidad de discos que sustituyan.
conexión en caliente Capacidad de insertar o instalar un dispositivo, normalmente una unidad de disco duro o un
ventilador de enfriamiento interno, en el sistema host mientras éste está encendido y en
funcionamiento. También se denomina intercambio directo.
intercambio directo Ver conexión en caliente.
9E/S Entrada/Salida. Un teclado es un dispositivo de entrada, y un monitor es un dispositivo de
salida. En general, la actividad de E/S se puede diferenciar de la actividad computacional.
Identificación En el entorno de Dell AIM, identificador exclusivo para un elemento, que se asigna al
añadirse al entorno.
iDRAC Ver integration Dell Remote Access Controller.
IKEv2-SCSI Protocolo utilizado para la creación de certificados.
imagen Específico de Dell AIM, los bits reales almacenados en un disco o arreglo de
almacenamiento que una imagen o VMRack inicia, junto con la información que la
controladora utiliza para iniciar dicha imagen en un tipo específico de host. Puede configurar
una imagen o VMRack con más de una imagen, por ejemplo, para que la misma imagen
pueda iniciarse en un servidor físico o una máquina virtual.
infiniBand InfiniBand ofrece enlaces serie bidireccionales punto a punto para la conexión de
procesadores y periféricos de alta velocidad.
Reproducción
instantánea
Ver Reproducción instantánea de datos.
integration Dell Remote
Access Controller
(iDRAC)
Controladora de acceso remoto que utiliza el protocolo Internet SCSI.
Interfaz de
administración de
plataforma inteligente
(IPMI)
Protocolo implementado por módulos de administración en algunos servidores, que se utiliza
para controlar los servidores de manera remota. Los módulos de administración blade en los
servidores Dell implementan iPMI.
conmutador de
interconexión
Conmutador del entorno de Dell AIM, administrado por la controladora, que se utiliza para
interconectar elementos como chasis, vRacks, otros conmutadores de interconexión y
conmutadores externos.
internet SCSI (iSCSI) Internet SCSI (ver SCSI). Protocolo que encapsula comandos de SCSI estándar para la
comunicación entre los servidores de cliente (iniciadores iSCSI) y los dispositivos de
almacenamiento de red (destinos iSCSI) de las redes IP.
IPMI Ver Interfaz de administración de plataforma inteligente.
iSCSI Ver Internet SCSI.
Protocolo de
interoperabilidad de
administración de
claves (KMIP)
Estándares configurados para la comunicación entre sistemas de administración de claves
empresariales y sistemas de cifrado.
Puertos de servicio
clave
Puertos utilizados por el sistema operativo para comunicarse en EKM.
Grupo de claves En EKM, conjunto de claves asignado a un departamento, un área o un tipo de hardware
específicos.
Claves Certificado cifrado que se utiliza para proteger datos en EKM.
Clasificación de
claves / Grupo de
Grupo de claves cifradas en EKM.
10claves / Clasificación
de claves maestra
KMIP Ver Protocolo de interoperabilidad de administración de claves
Java Database
Connectivity (JDBC)
API para el lenguaje de programación Java que define cómo puede un cliente acceder a,
consultar y actualizar los datos de una base de datos.
JDBC Ver Java Database Connectivity.
Controladora líder Controladora primaria de un Dell Compellent Storage Center de controladora
dual. Normalmente, las controladoras líder y de acompañamiento comparten la carga de E/S
de almacenamiento, doblando fundamentalmente el rendimiento, pero sólo la controladora
líder realiza funciones de administración externa. Si una controladora falla, la controladora
restante se convertirá o seguirá siendo el líder y asumirá las obligaciones de ambas
controladoras. Ver Controladora de acompañamiento.
Modo heredado En Dell Compellent Storage Center, los dominios de error se configuran para dedicar pares
de puertos de front-end primario y reservado, conectados a través de equipo redundante,
como mecanismo para proteger el tráfico de almacenamiento contra un único punto de
error. Ver Dominio de error, Puerto virtual o Modo de puerto virtual.
Linear Tape-Open (LTO) Formato de cinta de estándares abiertos.
número de unidad
lógica (LUN)
Una unidad lógica es una división conceptual (una subunidad) de un disco de
almacenamiento o un conjunto de discos. Cada unidad lógica tiene una dirección, conocida
como número de unidad lógica (LUN), que le permite ser identificado de manera exclusiva.
LTO Ver Linear Tape-Open.
Sustitución de grupo de
claves LTO
En EKM, conjunto de claves asignado que se utiliza una vez agotado el grupo de claves
predeterminado.
LUN Ver número de unidad lógica.
Dirección MAC Ver dirección Media Access Control.
Discos administrados En Dell Compellent Storage Center, dispositivos de medios de almacenamiento (discos, SSD)
que se asignan a una carpeta de discos para asociar dichos dispositivos con un bloque de
almacenamiento. Ver Bloque de almacenamiento, carpeta de discos.
sistema administrado Un sistema administrado es cualquier sistema que se supervisa y se administra utilizando
Dell OpenManage Server Administrator.
dirección IP de
administración
Dirección utilizada para conectarse a un dispositivo con IP activado inteligente para
supervisar o administrar dicho dispositivo. La dirección puede dedicarse a uso exclusivo de
las aplicaciones de administración o compartirse entre las aplicaciones de administración y
servicio.
red de administración Una red de administración opcional separa el tráfico iSCSI (E/S de volumen) del tráfico de
administración (sesiones GUI y CLI, y otras comunicaciones de administración de grupos y
operaciones entre grupos).
estación de
administración
Sistema utilizado para administrar de manera remota uno o más sistemas administrados
desde una ubicación central.
Reproducción manual Función de Dell Compellent Storage Center que permite al usuario crear manualmente
copias puntuales de los volúmenes.
11replicación de
transferencia manual
Replicación realizada a través de un medio transportable en lugar de a través de una red. Se
utiliza en casos en los que el enlace de red entre los asociados de replicación es demasiado
lento o de otro modo inadecuado para transferir grandes cantidades de datos.
Utilidad para la
transferencia manual
Utilidad autónoma de Dell EqualLogic que realiza la replicación de volúmenes utilizando
medios transportables en lugar de la red. La utilidad tiene tanto interfaz de usuario de línea
de comandos como interfaz gráfica.
dirección Media
Access Control
(dirección MAC)
Número de hardware exclusivo de un sistema en una red.
migrar volumen Comando de Dell Compellent Storage Center que sirve para mover datos de un volumen a
otro.
migración En el contexto de EKM, combinar una clasificación de claves en una clasificación de claves
existente durante (no después de) la instalación de Dell Encryption Key Manager 3.0.
duplicar volumen Comando de Dell Compellent Storage Center para replicar un volumen local en un Dell
Compellent Storage Center remoto y mantener actualizaciones entre los volúmenes locales y
remotos hasta que el duplicado se deshaga manualmente.
duplicación Tipo de redundancia de datos en la que un conjunto de unidades físicas almacena datos y
uno o más conjuntos de unidades adicionales almacenan copias duplicadas de los datos. La
funcionalidad de duplicación la proporciona el software. Ver seccionamiento, RAID.
NAS Ver Almacenamiento conectado a la red.
conexión de red Objeto que define una conectividad de red necesaria de una imagen y de VMRack. Una
conexión de red se crea como resultado de añadir elementos a una red, por ejemplo, al
añadir una imagen a una red.
Almacenamiento
conectado a la
red (NAS)
NAS es uno de los conceptos utilizados para implementar almacenamiento compartido en
una red. Los sistemas NAS tienen sus propios sistemas operativos, hardware integrado y
software que se optimizan para satisfacer las necesidades de almacenamiento específicas.
NTP El protocolo de hora de red (Network Time Protocol, NTP) es un protocolo para sincronizar
los relojes de los sistemas a través de redes de datos de latencia variable y conmutación de
paquetes.
Espacio sobresuscrito En una SAN que admita aprovisionamiento reducido, la cantidad de espacio de
almacenamiento que se configura como disponible pero no está físicamente presente (por
ejemplo, espacio configurado menos espacio disponible).
sección de paridad En arreglos RAID, una unidad de disco duro seccionada que contiene datos de paridad.
partición Sección física de una unidad de disco duro creada mediante el comando fdisk. Las
particiones se pueden luego dividir en varias unidades lógicas utilizando el comando
format.
Controladora pasiva La controladora de Dell AIM que actúa en espera activa, listo para hacerse cargo de la
administración del entorno si falla la controladora activa.
Controladora de
acompañamiento
En un Dell Compellent Storage Center de controladora dual, la controladora de
acompañamiento comparte la carga de E/S con la controladora líder pero no realiza
funciones de administración externa. Si falla la controladora líder, la controladora de
12acompañamiento asume las obligaciones de E/S y administración de ambas
controladoras. Ver Controladora líder.
imagen Un entorno de servidor capturado en disco: el sistema operativo, el software del agente de
Dell AIM y la red y los otros valores de configuración necesarios para ejecutar una
aplicación en un host del entorno de Dell AIM.
bloque Espacio de almacenamiento en una SAN disponible para su uso por volúmenes. En Dell
Compellent Enterprise Storage Manager y Dell Compellent Storage Center, esto equivale al
espacio total de la SAN. En arreglos Dell EqualLogic PS Series, equivale al espacio total de
los miembros del bloque específico.
administrador de
bloque
Cuenta de un grupo de Dell EqualLogic PS Series que tiene permiso para administrar objetos
sólo en un bloque o conjunto de bloques que sean específicos de un grupo. Compárese con
administrador de grupo.
grupo primario En el entorno de Dell EqualLogic Group Manager, el grupo que contiene el volumen original
de una asociación de replicación. Ver grupo secundario.
volumen primario En el entorno de Dell EqualLogic Group Manager, un volumen configurado para replicación
en un asociado de replicación.
Arreglo PS Series Unidad de almacenamiento Dell EqualLogic iSCSI única, normalmente configurada como
grupo de Dell EqualLogic PS Series. Puede unir varios arreglos PS Series en un grupo PS
Series más grande y administrarlos como una única SAN iSCSI.
Grupo PS Series Entidad de almacenamiento iSCSI compuesta de uno o más arreglos de almacenamiento de
Dell EqualLogic PS Series a la que se accede a través de una única dirección IP y se
administra como red de área de almacenamiento (SAN).
Servicios públicos En el contexto de Dell AIM, la dirección IP virtual de servicios de controladora que se utiliza
para conectarse a la consola o a la CLI de la controladora activa.
RAC Remote Access Controller
RAID Ver Arreglo redundante de discos independientes
RAID 0 Los datos se seccionan entre los discos disponibles que proporcionan rendimiento
mejorado. RAID 0 no proporciona redundancia de datos.
RAID 10 Los datos se seccionan entre las unidades de disco disponibles y se duplican,
proporcionando disponibilidad de datos y rendimiento mejorado. Mantiene un mínimo de una
copia completa de todos los datos del volumen. RAID 10 ofrece un rendimiento de lectura/
escritura óptimo, mayor probabilidad de resistencia a varios errores y la restauración más
rápida de los datos.
RAID 5 Mantiene una copia lógica de los datos utilizando una sección de paridad rotatoria derivada
matemáticamente. La sección de paridad se deriva de las secciones de datos. Este método
tiene menos sobrecarga para la información redundante que RAID 10 aunque el rendimiento
de escritura es más lento que el de RAID 10 debido al cálculo de la sección de paridad para
cada escritura. El rendimiento de lectura es similar al de RAID 10.
RAID 50 RAID nivel 50 es una combinación de RAID nivel 5 y RAID nivel 0. RAID 50 incluye
seccionamiento de disco y de paridad en varias unidades.
volumen de
recuperación
Volumen creado con el fin de recuperar datos. En arreglos Dell EqualLogic PS Series, un
volumen de recuperación se crea promoviendo un conjunto de réplicas de entrada como
13parte de una operación de protección contra fallos. También puede crear volúmenes de
plantilla de recuperación y copias idénticas reducidas de recuperación. En Dell Compellent
Storage Center, un volumen de vista se crea a partir de una reproducción. Ver réplica,
Volumen de vista, Reproducción.
Redundancia La duplicación de información o los componentes de equipo de hardware para garantizar
que si un recurso primario falla, un recurso secundario podrá asumir su función. Dell
Compellent Storage Center proporciona redundancia para cada componente, de forma que
no haya ningún único punto de error. La redundancia única protege frente a la pérdida de
datos si falla un recurso cualquiera. La redundancia dual protege frente a la pérdida de
datos si fallan dos recursos cualesquiera.
Arreglo redundante de
discos independientes
(RAID)
Arreglo redundante de discos independientes. Método de suministro de redundancia de
datos. Algunas implementaciones comunes de RAID entre las que se incluye RAID 0, RAID 1,
RAID 5, RAID 10 y RAID 50. Ver duplicación, seccionamiento.
Reproducción
instantánea remota
Función de una solución Dell Compellent Storage Center en la que se replica una
reproducción en un Dell Compellent Storage Center remoto. Los Dell Compellent Storage
Center local y remoto son activo-activo, y la replicación bidireccional se puede producir, de
forma sincrónica o asíncrona, en intervalos independientes. La replicación de Dell
Compellent Storage Center necesita la aplicación de software Enterprise Manager con una
licencia de replicación. Ver Reproducción, Sistema remoto, replicación.
Asistente para la
instalación remota
(RSW)
Interfaz gráfica de usuario (GUI) que le permite configurar un arreglo Dell EqualLogic PS
Series después de instalar las Host Integration Tools/Microsoft Edition.
Sistema remoto En Dell Compellent Storage Center, una SAN independiente configurada para recibir datos
de replicación de un volumen original en el Dell Compellent Storage Center local. La
replicación de Dell Compellent Storage Center necesita la aplicación de software Enterprise
Manager con una licencia de replicación. Ver replicación.
Reproducción En Dell Compellent Storage Center, una copia puntual (PITC) y completamente útil de datos
que contiene una imagen de los datos tal como aparecían en el momento en que se inició la
copia. La copia se puede almacenar localmente o en un Dell Compellent Storage Center
remoto. Ver instantánea, Reproducción instantánea de datos, Reproducción instantánea
remota.
Perfil de reproducción En Dell Compellent Storage Center, conjunto de reglas que determinan cuándo y cómo se
realizarán las copias puntuales de las reproducciones y durante cuánto tiempo se
guardarán. Ver Reproducción.
Espacio de
reproducción
En Dell Compellent Storage Center, la cantidad de espacio que automáticamente se reserva
y utiliza para reproducciones. Ver espacio activo, espacio real.
réplica Representación puntual de un volumen Dell EqualLogic PS Series. El volumen original y su
réplica se encuentran en grupos de Dell EqualLogic PS Series diferentes (asociados de
replicación) potencialmente separados a cierta distancia geográfica para facilitar la
tolerancia frente a desastres.
colección de réplica En Dell EqualLogic Group Manager, conjunto de réplicas resultante de cada replicación de
una colección de volúmenes.
conjunto de
colecciones de réplicas
En Dell EqualLogic Group Manager, conjunto de colecciones de réplicas para una colección
de volúmenes.
14reserva de réplica En Dell EqualLogic Group Manager, la parte del espacio delegado de un asociado de
replicación que se reserva para los conjuntos de réplicas de un volumen específico. La
reserva de réplica del volumen se configura en el grupo primario, pero la reserva de réplica
real está en el grupo secundario.
conjunto de réplicas En Dell EqualLogic Group Manager, el conjunto de réplicas completas de un volumen, un
volumen de plantilla o un volumen de copias idénticas reducidas.
sistema de replicación Un Dell Compellent Storage Center configurado para enviar datos de replicación de uno o
más volúmenes locales a un Storage Center remoto. Ver replicación, Sistema remoto,
Reproducción instantánea remota.
replicación Proceso de copiar datos de volumen (sólo deltas) de la SAN primaria (local) en la SAN
secundaria (remota), de modo que los datos se puedan recuperar de cualquier SAN si fuera
necesario. Las SAN pueden estar separadas sin límite de distancia.
asociado de
replicación
En Dell EqualLogic Group Manager, grupo que está configurado para enviar o recibir réplicas
de otro asociado.
RSW Ver Asistente para la instalación remota.
imagen ejecutable En el contexto de Dell AIM, imagen iniciada por la red que se inicia y que espera ser
asignada a un host.
SAN Ver Red de área de almacenamiento (SAN).
Sede de SAN Le permite supervisar varios grupos de Dell EqualLogic PS Series desde una única interfaz
gráfica. Reúne y formatea datos de rendimiento y demás información importante sobre los
grupos.
SCN Ver Red de control del sistema.
SCN Services
(Servicios de SCN)
La dirección IP virtual de los servicios de la controladora que utilizan las imágenes y los
VMRacks del entorno de Dell AIM para comunicarse con la controladora activa.
SCSI Ver Interfaz estándar de equipos pequeños (SCSI)
SDK Ver Kit de desarrollo de software.
módulo de control
secundario
En el entorno de Dell EqualLogic Group Manager, el módulo de control secundario duplica
los datos de la caché del módulo de control activo. Si el módulo de control activo deja de
funcionar, el secundario asume las operaciones de red. Ver módulo de control activo.
grupo secundario En una configuración de replicación de Dell EqualLogic Group Manager, el grupo que recibe
réplicas de un volumen de origen. Ver grupo primario.
Clúster de servidores Grupo de servidores independientes que funcionan juntos como sistema único para
proporcionar servicio ininterrumpido en caso de fallos individuales en el equipo.
etiqueta de servicio Una etiqueta en el sistema utilizada para identificarlo al llamar a Dell en busca de asistencia
técnica.
Protocolo simple de
transferencia de correo
(SMTP)
Define un formato de mensaje y un procedimiento de reenvío para permitir que se envíen
mensajes entre hosts en Internet.
Protocolo simple de
administración de red
(SNMP)
Interfaz estándar que permite que un administrador de red supervise y administre estaciones
de trabajo de forma remota.
15Simulador Componente del SDK de Dell AIM que emula un entorno de Dell AIM en ejecución,
incluyendo la controladora, la consola y las redes física y virtual. Ver SDK.
Interfaz estándar de
equipos pequeños
(SCSI)
Interfaz estándar de equipos pequeños. Interfaz de bus de E/S con velocidades de
transmisión de datos más rápidas que los puertos estándar.
SMART Self-Monitoring Analysis and Reporting Technology (Tecnología de análisis y generación de
informes de auto-supervisión). Permite que las unidades de disco duro notifiquen errores y
fallos al BIOS del sistema y, a continuación, muestren un mensaje de error en la pantalla.
Smart Copy Copia coherente con la aplicación, puntual, de ASM/ME de objetos en un grupo de Dell
EqualLogic PS Series. Las Smart Copy pueden ser de tipo instantánea, copia idéntica o
réplica, dependiendo de la edición de Auto-Snapshot Manager que utilice.
SMP Ver multiprocesamiento simétrico.
SMTP Ver Protocolo simple de transferencia de correo
instantánea Copia puntual (PITC) de un volumen. Ver Reproducción.
colección de
instantáneas
Conjunto de instantáneas resultante de una operación de instantánea en una colección de
volúmenes. Ver colección de volúmenes.
SNMP Ver Protocolo simple de administración de red.
SNMP Trap Collector
(Recolector de
capturas SNMP)
En el contexto de Dell AIM, la dirección IP virtual de servicios de controladora que utilizan
los conmutadores administrados y otros dispositivos para enviar capturas SNMP a la
controladora activa.
Kit de desarrollo de
software (SDK)
Conjunto de herramientas de desarrollo utilizado para crear aplicaciones para un paquete de
software, una estructura de software, una plataforma de hardware, un sistema informático,
una consola de videojuego, un sistema operativo o una plataforma similar concretos.
Recuperación de
espacio
Utilidad que recupera el espacio que Windows indica que está en uso pero que en realidad
está vacío; espacio disponible que puede utilizar Dell Compellent Storage Center.
disco de repuesto Unidad designada o no utilizada en una SAN que se utiliza para reemplazar automáticamente
una unidad errónea.
Red de área de
almacenamiento (SAN)
Una Red de área de almacenamiento (SAN) es una red especializada que suministra acceso
a subsistemas de almacenamiento de alto rendimiento y alta disponibilidad mediante
protocolos de almacenamiento en bloques. La SAN se compone de dispositivos específicos
como, por ejemplo, adaptadores de bus host (HBA) en los servidores de host, conmutadores
que ayudan a enrutar el tráfico de almacenamiento, y subsistemas de almacenamiento en
disco. La característica principal de una SAN es que los subsistemas de almacenamiento
están normalmente disponibles para varios hosts al mismo tiempo, volviéndolos escalables y
flexibles. Compárese con NAS.
Clúster de
almacenamiento
En Dell Compellent Storage Center, varias controladoras de SAN interconectadas con el fin
de mejorar la fiabilidad, la disponibilidad, la capacidad de servicio y el rendimiento (a través
del equilibrio de carga). Storage Center utiliza una configuración activo-activo para
proporcionar protección automática contra fallos de la controladora. Una caché respaldada
mediante batería, completamente duplicada, en cada controladora garantiza la fiabilidad de
los datos a través de un reinicio y permite que los volúmenes migren entre las controladoras
en caso de fallo en una sola controladora.
16Agrupación en
clústeres de
almacenamiento
Función de Dell Compellent Storage Center que proporciona protección automática contra
fallos a través de varias controladoras en una configuración activo-activo. La caché
respaldada mediante batería, completamente duplicada, proporciona tolerancia a errores y
reinicio/recuperación automáticos en caso de fallo de la controladora.
Bloque de
almacenamiento
Ver bloque
Perfil de
almacenamiento
En Dell Compellent Storage Center, conjunto de reglas que definen los tipos de unidad
(niveles) en los que almacenar datos y el nivel de RAID que utilizar para cada nivel.
Tipo de
almacenamiento
En Dell Compellent Storage Center, conjunto de atributos, incluyendo opciones de
redundancia y tamaño de bloques, que controla cómo se asigna y protege el espacio de un
bloque de almacenamiento.
seccionamiento El seccionamiento de disco escribe datos en tres o más discos de un arreglo, pero sólo
utiliza una parte del espacio de cada disco. La cantidad de espacio utilizado por la "sección"
es la misma en cada disco utilizado. Un disco virtual puede utilizar varias secciones del
mismo conjunto de discos en un arreglo. Ver también duplicación, y RAID.
multiprocesamiento
simétrico (SMP)
Se utiliza para describir un sistema con dos o más procesadores conectados mediante un
enlace de gran amplitud de banda y gestionado por un sistema operativo donde cada
procesador tiene el mismo tipo de acceso a los dispositivos de E/S.
sincronizar Ver Replicación sincrónica.
Replicación sincrónica Función que escribe automáticamente los mismos datos en dos volúmenes independientes, y
los almacena en hardware físico diferente, antes de que la aplicación reciba un mensaje de
finalización de E/S. Ambas escrituras se completan o fallan, así que ambos volúmenes
estarán completamente sincronizados en todo momento. No obstante, la función puede
aumentar la latencia de escritura para la aplicación. Ver sincronizar.
Red de control del
sistema (SCN)
Red privada que Dell AIM utiliza para la comunicación entre la controladora, las imágenes y
VMRacks. La controladora también utiliza esta red para descubrir servidores y para iniciar
imágenes y VMRacks en ellos.
Programa de
configuración del
sistema
Programa basado en BIOS que permite la configuración de un hardware del sistema y la
personalización del funcionamiento del sistema estableciendo funciones como la protección
mediante contraseña. Como el programa de configuración del sistema se almacena en
NVRAM, los valores permanecen en vigor hasta que se cambien.
Servidor de
implementación de
sistemas
Solución de administración de implementación basada en el servidor Dell KACE para
profesionales de TI que proporciona herramientas para imágenes de disco, migración de
estado del usuario, administración de sitios remotos, reparación y recuperación del sistema,
así como exploración y evaluación del inventario del equipo. Además, automatiza tareas de
configuración anteriores y posteriores a la implementación como, por ejemplo, la
exploración y evaluación del inventario del equipo; también automatiza la configuración de
discos, BIOS y RAID, la distribución del software y la administración de la configuración.
Servidor de
administración de
sistemas
Solución de administración de sistemas basadas en el servidor Dell KACE para profesionales
de TI que racionaliza tareas como la administración del inventario, la distribución de
software, la creación de informes, la administración de parches, la administración de
activos, las secuencias de comandos y la asistencia del departamento de servicios a través
de una interfaz basada en web.
17plantilla En el contexto de Dell AIM, una imagen inactiva que puede clonar para crear otras
imágenes, pero que no podrá ejecutar (para evitar cambios en la plantilla).
volumen de plantilla Volumen de sólo lectura a partir del cual puede crear copias idénticas reducidas.
copia idéntica reducida Volumen que comparte espacio con un volumen de plantilla. Las copias idénticas reducidas
proporcionan un uso eficaz del espacio de almacenamiento para configuraciones con varios
volúmenes que tengan una gran cantidad de datos comunes.
Aprovisionamiento
reducido
Función que le permite sobreaprovisionar (o sobresuscribir) el espacio disponible en la SAN.
Los objetos de almacenamiento (como, por ejemplo, volúmenes) que utilizan
aprovisionamiento reducido notifican su tamaño máximo potencial a las aplicaciones, pero
pueden utilizar realmente mucho menos espacio. El aprovisionamiento reducido permite que
las organizaciones reduzcan sus gastos de almacenamiento globales, aumenten la
disponibilidad y consigan un mayor rendimiento.
almacenamiento
escalonado
Estrategia de optimización de almacenamiento en la que los datos requeridos de forma
rápida y frecuente se almacenan en tipos de medios caros y rápidos y los datos requeridos
con poca frecuencia se almacenan en tipos de medios más lentos y menos caros.
espacio sin administrar En arreglos Dell EqualLogic PS Series, capacidad de espacio delegado en el grupo
secundario al que ya no se puede acceder desde el grupo primario.
puerto de enlace
ascendente
Puerto de un concentrador o un conmutador de red que se utiliza para conectar a otros
concentradores o conmutadores sin necesidad de utilizar un cable cruzado.
vaciar En Dell EqualLogic Group Manager, eliminar un miembro de un grupo mientras el miembro
permanece en línea.
Volumen de vista En Dell Compellent Storage Center, un volumen de sólo lectura que se ha creado a partir de
una reproducción anterior, con el principal propósito de recuperar datos. Ver Reproducción.
Puerto virtual o Modo
de puerto virtual
En el contexto de Dell Compellent Storage Center, los puertos virtuales eliminan la necesidad
de los puertos de reserva. Cuando se funciona en modo de puerto virtual, todos los puertos
de front-end aceptan E/S y pueden formar parte de un dominio de error. Para obtener
información sobre cómo activar puertos virtuales, consulte la Guía de configuración de Dell
Compellent Storage Center System.
Nombre de puerto
mundial virtual
(vWWPM)
Nombre de puerto mundial virtual que se utiliza en Dell AIM para crear imágenes iniciadas
por SAN.
Virtualización Posibilidad de utilizar software para compartir los recursos de un único equipo o dispositivo
de almacenamiento en varios entornos. Un dispositivo o sistema físico único puede
mostrarse al usuario como varios sistemas virtuales capaces de alojar varios sistemas
operativos.
VMRack Bastidor de máquinas virtuales (VM) en un servidor que ejecuta una combinación de
software de agente y Red Hat Xen, VMware ESX o Microsoft Hyper-V.
volumen Unidad independiente de almacenamiento seccionada en un dispositivo o en varios
dispositivos de almacenamiento.
colección de
volúmenes
Serie de volúmenes agrupados juntos con el fin de realizar operaciones en los volúmenes de
forma simultánea. Ver colección de instantáneas, colección de réplicas.
18reserva de volumen Cantidad de espacio asignado a un volumen desde un espacio de bloque libre. Sin
aprovisionamiento reducido, la reserva de volumen es igual al tamaño notificado.
Tipo de volumen En el contexto de Dell Compellent Storage Center, el tipo de volumen: puede ser dinámico,
con reproducción activada, o replicación. Un volumen es dinámico hasta que al menos se
haya realizado una reproducción de dicho volumen. Después de haber realizado una
reproducción de un volumen, se vuelve Con reproducción activada. Un volumen de
replicación es aquel que se ha replicado a otro sistema Dell Compellent Storage Center.
vRack En el contexto de Dell AIM, grupo lógico de hosts conectados a un conmutador virtual
(conmutador vRack).
conmutador de vRack En el contexto de Dell AIM, un conmutador virtual que conecta hosts en un vRack.
vWWPN Ver Nombre de puerto mundial virtual
1920Glossaire Dell – Version 2
GlossaireGlossaire
ACPI Voir advanced configuration and power interface (interface avancée de configuration
et d'alimentation)
active control module
(module de contrôle actif)
Pour les matrices Dell EqualLogic PS Series dans une matrice de module à deux
contrôleurs, il s'agit du module de contrôle qui gère activement les E/S sur un
réseau. S'il cesse de fonctionner, il bascule sur le module de contrôle secondaire. Voir
secondary control module (module de contrôle secondaire).
active Controller (contrôleur
actif)
Le contrôleur Dell AIM gère activement l'environnement Dell AIM.
active space (espace actif) Dans un Dell Compellent Storage Center, il s'agit de l'espace utilisé par un volume, sans
compter les relectures. Cette quantité n'inclut pas le surdébit RAID. Voir Replay
(Relecture).
actual space (espace réel) Dans un Dell Compellent Storage Center, il s'agit de la quantité d'espace actif plus
l'espace dédié aux relectures pour un volume. Voir active space (espace actif), Replay
space (Espace de relecture).
advanced configuration and
power interface (interface
avancée de configuration et
d'alimentation - ACPI)
Interface standard qui permet au système d'exploitation de contrôler les paramètres
relatifs à la configuration et à la gestion de l'alimentation.
agent Dans un environnement Dell AIM (des VMRack Red Hat Xen et Microsoft Hyper-V, plus
les personas), le logiciel en option est installé sur les éléments que le contrôleur utilise
pour gérer les éléments et configurer leurs propriétés de réseau.
agentless persona (persona
sans agent)
Une persona Dell AIM pour laquelle aucun agent Dell AIM n'est installé.
ambient temperature
(température ambiante)
Température de l'endroit ou de la pièce où se trouve le système.
array member (membre de
matrice)
Un matrice Dell EqualLogic PS Series configurée dans un groupe PS Series. Les
groupes peuvent avoir plusieurs membres.
array serial number (numéro
de série de matrice)
Dans un environnement Dell EqualLogic PS Series, une chaîne d'identification de
matrice Dell EqualLogic PS Series unique est codée dans le matériel de la matrice. Voir
service tag (numéro de service).
ASM/ME Voir Auto-Snapshot Manager/Microsoft Edition.
ASM/VE Voir Auto-Snapshot Manager/VMware Edition.
Asset Management
Appliance (Serveur de
gestion des actifs)
Une solution de gestion de l'inventaire sous forme de serveur Dell KACE destinée aux
professionnels de l'informatique qui gère la conformité des logiciels et licences. Elle
automatise la gestion de l'inventaire, de l'inventaire logiciel, des versions, des mises à
niveau, et des ordinateurs via un tableau de bord en ligne.
asset tag (numéro
d'inventaire)
Un code individuel attribué à un système, en général par un administrateur système,
pour des raisons de sécurité ou de suivi.
3Assigned Disks (Disques
attribués)
Dans un Dell Compellent Storage Center, il s'agit du support de stockage physique
attribué à un dossier de disques pour qu'il puisse être géré et utilisé pour le stockage
de volumes et de relectures. Voir disk folder (dossier de disques), Storage Pool (Pool de
stockage).
assignment mode (mode
d'affectation)
Un mécanisme permettant de contrôler l'affectation des personas et des VMRack aux
hôtes en fonction de la disponibilité des HBA de l'hôte. Voir HBA.
async/asynchronous
replication (réplication
asynchrone/async)
Le processus d'écriture des données sur un stockage local puis d'acheminement de
ces données sur un SAN distant pour être stockées. Si le SAN local échoue avant
qu'une écriture soit acheminée, il est possible que la réplication échoue. Voir
replication (réplication), synchronous replication (réplication synchrone), remote
instant replay (relecture instantanée à distance).
automatic RAID
configuration (configuration
RAID automatique)
Dans le contexte des groupes Dell EqualLogic PS Series, il s'agit d'un processus
interne qui configure la stratégie de RAID sélectionnée par l'utilisateur sur la matrice.
Auto-Snapshot Manager/
Microsoft Edition
(Gestionnaire d'instantanés
automatiques/édition
Microsoft) (ASM/ME)
Une application de console intégrable pour la console de gestion Microsoft qui vous
permet d'administrer les Smart Copy (Copies intelligentes).
Auto-Snapshot Manager/
VMware Edition
(Gestionnaire d'instantanés
automatiques/édition
VMware) (ASM/VE)
Une application Web qui s'associe aux environnements virtuels VMware pour vous
permettre d'administrer les Smart Copies (Copies intelligentes).
available space (espace
disponible)
Espace total disponible sur tous les lecteurs.
back end (arrière) Dans un centre de stockage Dell Compellent, il s'agit d'un réseau isolé et dédié
connectant le contrôleur ou le cluster de stockage (par exemple, une paire de
contrôleurs redondants) à des boîtiers de disques locaux.
back end network (réseau
arrière)
Connexion entre le contrôleur et les disques dans le contrôleur du Dell Compellent
Storage Center.
base volume (volume de
base) (Dell EqualLogic PS
Series)
Un volume monté sur l'ordinateur auquel vous pouvez accéder via sa lettre de lecteur
attribuée par Windows (comme par exemple G:) ou son point de montage.
base volume (volume de
base) (Dell EqualLogic Group
Manager - Gestionnaire de
groupes Dell EqualLogic)
Un volume contenant des instantanés. Les instantanés dépendent du volume de
base. Si le volume de base est détruit, les instantanés ont été retirés.
BaseBoard Management
Controller (BMC )
Un module de gestion de serveur qui implémente le protocole IPMI (Intelligent Platform
Management Interface). Dans le contexte de Dell AIM, le contrôleur utilise le BMC pour
contrôler à distance certains modèles de serveurs.
blade (serveur lame) Pour le SDK Dell AIM, le serveur lame est un élément de la superclasse de l'hôte. Pour
des systèmes modulaires Dell, un serveur lame désigne un serveur modulaire qui est
monté dans un boîtier.
4BMC Voir Baseboard Management Controller.
Bootable media (Support
amorçable)
Un CD, une carte SD ou une clé de mémoire USB utilisé(e) pour démarrer votre système
si celui-ci ne s'amorce pas depuis le disque dur.
cache Mémoire à accès rapide contenant une copie des données ou des instructions,
permettant une réutilisation rapide de celles-ci.
CHA Voir Compellent Host Adapter (Adaptateur hôte Compellent).
Challenge Handshake
Authentication Protocol
(protocole CHAP)
Un protocole de connexion au réseau qui utilise un mécanisme crypté de type questionréponse. Sert à limiter l'accès aux volumes et aux instantanés aux hôtes qui fournissent
le nom et mot de passe corrects. CHAP est aussi utilisé pour les comptes de connexion/
administrateur.
channel (canal) Dans un environnement Dell/AIM, il s'agit d'une parmi jusqu'à huit connexions
physiques que vous pouvez attribuer à des ports de commutation et connecter à une
persona en utilisant jusqu'à huit NIC physiques. Vous pouvez configurer un réseau pour
qu'il préfère un ou deux canaux pour son trafic afin que, lors d'un échec du canal
préféré, le trafic soit redirigé de manière transparente vers l'autre canal.
CHAP Voir Challenge Handshake Authentication Protocol (Protocole CHAP)
chassis switch
(commutateur de châssis)
Dans le contexte de Dell AIM, il s'agit d'un commutateur Ethernet dans une baie se
trouvant dans un châssis. Les commutateurs de châssis sont gérés par le contrôleur.
client device communication
certificate (certificat de
communication pour
dispositif client)
Dans le contexte de EKM, il s'agit d'une clé cryptée spécialisée permettant à un client
de communiquer avec le serveur.
Cluster Node (Nœud de
cluster)
Un membre physique d'un cluster de ressources, comme par exemple un hôte dans un
cluster de serveur ou un SAN dans un cluster de stockage.
collection Dans ASM/ME, une collection signifie des groupes apparentés d'objets de stockage
(tels que des volumes, instantanés, ou des composants d'applications) représentés par
des nœuds dans l'arborescence de console ASM sous le nœud maître
Collections. Dans le Dell EqualLogic Group Manager (Gestionnaire de groupes Dell
EqualLogic), les collections de volumes et répliques et les collections d'instantanés
personnalisés apparaissent dans la hiérarchie dans la vue Volumes.
Compellent Host Adapter
(Adaptateur d'hôte
Compellent - CHA)
Carte/batterie de cache interne situé(e) dans chaque contrôleur du Dell Compellent
Storage Center. La mémoire cache d'écriture est mise en miroir sur la carte cache.
Pour un Dell Compellent Storage Center à deux contrôleurs, la carte cache du
contrôleur 1 contient le miroir du contrôleur 2 et la carte cache du contrôleur 2 contient
le miroir du contrôleur 1. Pour un Dell Compellent Storage Center à un contrôleur
unique, la carte cache contient le miroir du contrôleur.
configuration Il s'agit de la base de données qui décrit tout le contenu et toute la configuration de
l'environnement Dell AIM.
Conservation Mode (Mode
Conservation)
Dans un Dell Compellent Storage Center, un mode de conservation des données est
atteint lorsque l'espace libre restant descend en-dessous d'un seuil critique
(typiquement 10%, jusqu'à 32 Go). En mode Conservation, le Dell Compellent Storage
Center génère une alerte, empêche la création de nouveaux volumes et commence à
5expirer des relectures à une plus grande vitesse afin de libérer de l'espace. Voir le
mode Urgence.
Console L'interface utilisateur Web que vous utilisez pour surveiller et utiliser les éléments dans
l'environnement Dell AIM. La console Dell AIM est hébergée par le contrôleur Dell AIM.
control module (module de
contrôle)
Dans les matrices Dell EqualLogic PS Series, il s'agit du processeur physique et du
composant d'interface. Un module de contrôle contient le micrologiciel Dell EqualLogic
PS Series dans la mémoire flash et fournit une continuité d'alimentation temporaire
pour les données triées dans la mémoire cache. Il dispose de plusieurs interfaces
réseau et d'un port série en option. Une matrice peut contenir deux contrôleurs à
redondance double remplaçables à chaud. Le module de contrôle actif gère les E/S,
tandis que le module de contrôle secondaire met en miroir les données de son cache.
control panel (panneau de
commande)
Partie du système sur laquelle se trouvent les voyants et les contrôles (bouton
d'alimentation, voyant d'alimentation, etc.).
Control Port (Port de
contrôle)
Le port iSCSI de destination auquel les initiateurs (serveurs) iSCSI se connectent afin
d'effectuer des requêtes de stockage. Dans un Dell Compellent Storage Center
configuré pour un mode de port virtuel, un port de contrôle est créé pour chaque
domaine de défaillance iSCSI afin de rediriger le trafic iSCSI vers le port virtuel
approprié.
Controller (Contrôleur) (Dell
AIM)
Logiciel qui gère les configurations physiques et virtuelles du matériel, des logiciels et
du réseau ainsi que les hôtes de la console Dell AIM. Dans le contexte d'une paire de
contrôleurs robustes, chaque contrôleur s'exécute sur un serveur dédié mais partage
une base de données de configuration et d'autres fichiers clés sur un système de
fichiers partagé.
Controller (Contrôleur) (Dell
Compellent)
Fournit les éléments suivants : regroupement de disques (RAID), routage d'E/S,
détection d'erreurs et récupération de données. Fournit des informations à l'intégralité
du sous-système Dell Compellent Storage Center. Tous les systèmes du Storage Center
en contiennent au moins un. Storage Center et recommandent que des mesures
correctives soient prises pour optimiser les performances et la disponibilité du
système.
Controller Services (Services
du contrôleur)
Dans le contexte de Dell AIM, cela correspond à l'adresse ou aux adresses IP virtuelles
utilisées par le contrôleur pour communiquer avec le SCN (System Control Network -
Réseau de contrôle du système), les commutateurs gérés, la console et la CLI, etc. Par
défaut, il s'agit d'une adresse IP virtuelle unique, cependant vous pouvez spécifier des
adresses uniques pour les services du SCN et le collecteur d'interruptions SNMP.
Copilot Services (Services
Copilot)
Au sein du Dell Compellent Storage Center, il s'agit de la combinaison de ressources de
support centralisé, de formation au produit et de ventes qui surveillent le système de
manière proactive et recommandent des mesures correctives pour optimiser les
performances et la disponibilité du système.
Copy-Mirror-Migrate (CopieMiroir-Migration)
Fonction du Dell Compellent Storage Center qui permet la migration des volumes entre
différents types de disque et niveaux de RAID.
Credential store (stockage
de références)
Dans le contexte du EKM, il s'agit d'une logithèque contenant les informations de
connexion pour toutes les sessions. Les informations de connexion correspondent aux
données de sécurité comme les noms d'utilisateurs, les mots de passe et les certificats.
6Cryptographic Object (Objet
cryptographique)
Une méthode de sécurisation des données.
Data Collector (Collecteur de
données)
Composant du Dell Compellent Enterprise Manager qui s'exécute en arrière-plan sur un
serveur, recueillant des informations sur tous les systèmes de Dell Compellent Storage
Center connectés au serveur.
Data Instant Replay
(Relecture instantanée des
données)
Fonction du Dell Compellent Storage Center qui capture des PITC (point-in-time copies -
copies instantanées) à faible consommation d'espace d'un volume du réseau SAN local
à des intervalles définis, permettant de restaurer un volume précédent à un point dans
le temps défini. Voir Replay, snapshot (Relecture, instantané).
Data Progression
(Progression des données)
Fonction du Dell Compellent Storage Center qui migre automatiquement les pages de
données sur des périphériques à performances plus élevées ou plus basses, selon le
niveau d'activité (demande) d'E/S. Voir tiered storage (stockage en couches).
DDR Voir Double-data Rate (Taux de transfert de données double).
delegated space (espace
délégué)
Dans le contexte du Dell EqualLogic Group Manager (Gestionnaire de groupes Dell
EqualLogic), il s'agit d'un espace mis à part dans un groupe prévu pour le stockage de
données reçues provenant d'un partenaire.
Dell Encryption Key Manager
(EKM - Gestionnaire de clés
de cryptage Dell)
Le EKM Dell sécurise les données stockées sur les cartouches de bande LTO en gérant
les clés de cryptage pour les solutions d'automatisation de bandes Dell.
Dell Remote Access
Controller (Contrôleur DRAC)
Une carte d'interface qui fournit des capacités de gestion hors bande. Le contrôleur
possède son propre processeur, accès au bus du système, sa propre mémoire et
connexion réseau et permet aux administrateurs de contrôler les systèmes à distance
sur un réseau.
device driver (pilote de
périphérique)
Programme qui permet au système d'exploitation ou à un autre programme de
communiquer correctement avec un périphérique donné.
DHCP Voir Dynamic Host Configuration Protocol (Protocole de configuration hôte dynamique)
Digital Versatile Disk (Disque
versatile numérique)
Un disque versatile numérique ou disque vidéo numérique (DVD).
disk folder (dossier de
disques)
Dans un Dell Compellent Storage Center, il s'agit d'un ensemble de périphériques de
support de stockage physique (disques, disques SSD) qui peut être visualisé et géré par
un utilisateur. Les dossiers de disques déterminent le ou les pools de stockage depuis
lesquels un espace de stockage est attribué. Bien que les dossiers de disques puissent
être associés à plusieurs pools de stockage, les performances du Dell Compellent
Storage Center sont optimisées lorsque tous les disques sont attribués à un même
dossier et pool de stockage.
Disk position (Position de
disque)
Dans un Dell Compellent Storage Center, il s'agit de la position du logement de lecteur
de disques au sein de son boîtier, dans une notation au format rangée-colonne. Par
exemple, la position de disque 01-02 fait référence au logement de la première rangée
(depuis le haut) et de la deuxième colonne (depuis le côté gauche).
DNS Voir Domain Name System (Système de noms de domaine)
Domain Name System
(Système de noms de
domaine) (DNS)
Méthode de conversion des noms de domaines Internet (par exemple
www.exemple.com) en adresses IP (par exemple 208.77.188.166).
7dormant Persona (Persona
inactive)
Dans l'environnement AIM, une persona qui n'est pas en cours d'exécution (ou est en
attente d'exécution) sur un hôte.
Double-data Rate (Taux de
transfert de données
doubles) (DDR)
Taux de transfert de données doubles. Technologie de barrettes de mémoire qui permet
de potentiellement doubler le débit des données en transférant celles-ci durant les
phases ascendantes et descendantes d'un cycle d'horloge.
DRAC Voir Integrated Dell Remote Access Controller (Contrôleur DRAC).
DRAM Voir Dynamic random-access memory (Mémoire dynamique à accès aléatoire).
Dual Redundant
(Redondance double)
Dans un Dell Compellent Storage Center, il s'agit d'une option de profil de stockage qui
protège contre la perte de deux lecteurs (quels qu'ils soient), se servant habituellement
de RAID 10 et/ou RAID 6.
DVD Voir Digital Versatile Disc (Disque versatile numérique).
Dynamic Host Configuration
Protocol (Protocole de
configuration dynamique des
hôtes) (DHCP)
Protocole permettant d'attribuer automatiquement une adresse IP à un système client.
Dynamic random-access
memory (Mémoire
dynamique à accès
aléatoire).
La RAM d'un système est généralement constituée entièrement de puces DRAM.
EKM Voir Dell Encryption Key Manager (EKM - Gestionnaire de clés de cryptage Dell)
EKM Administrator
(Administrateur EKM)
Dans le contexte d'un EKM, il s'agit du super-utilisateur qui peut créer ou supprimer
des utilisateurs et des groupes.
EKM Encryption Manager
(Gestionnaire de cryptage
EKM) (tklmadmin)
Dans le contexte d'un EKM, il s'agit de l'utilisateur quotidien qui crée ou supprime des
clés et des périphériques.
Emergency Mode (Mode
Urgence)
Dans le Dell Compellent Storage Center, ce mode est atteint lorsque le système n'arrive
plus à fonctionner en raison d'un manque d'espace libre. En mode Urgence, toutes les
E/S de serveur sont rejetées et tous les volumes sont mis hors ligne et ne seront remis
en ligne qu'après l'acquisition d'un espace libre suffisant pour quitter le mode Urgence.
Voir Conservation Mode (Mode Conservation).
enclosure (boîtier) Boîtier physique qui fournit une interface unique, l'alimentation et le refroidissement à
plusieurs disques.
environment
(environnement)
Dans le contexte de Dell AIM, l'ensemble des configurations matérielles, logicielles et
de réseau gérées par le contrôleur Dell AIM.
eth0 Voir Ethernet port 0 (Port Ethernet 0).
eth1 Voir Ethernet port 1 (Port Ethernet 1).
Ethernet port 0 (Port Ethernet
0) (Eth0)
Dans le Dell Compellent Storage Center, Eth0 est une interface Ethernet dédiée à la
gestion.
Ethernet port 1 (Port Ethernet
1) (Eth1)
Dans le Dell Compellent Storage Center, Eth1 est une interface Ethernet dédiée à la
communication inter-processus entre les contrôleurs pour la mise en cluster ou la
réplication à distance.
8external network (réseau
externe)
Dans le contexte de l'environnement Dell AIM, il s'agit d'un réseau qui ne fait pas partie
de l'environnement Dell AIM mais qui y est physiquement et logiquement connecté.
external switch
(commutateur externe)
Dans le contexte de l'environnement Dell AIM, il s'agit d'un commutateur qui ne fait pas
partie de l'environnement Dell AIM mais qui y est physiquement et logiquement
connecté.
Fabric (Structure) Une combinaison de commutateurs interconnectés qui agissent en tant
qu'infrastructure de routage unifiée. Cela permet d'établir plusieurs connexions entre
les périphériques d'un SAN et permet aux nouveaux périphériques d'y entrer sans
provoquer d'interruption. Une topologie FC (ou iSCSI) dotée d'au moins un commutateur
sur le réseau.
FastTrack Utilitaire du Dell Compellent Storage Center en option qui place dynamiquement les
données les plus actives sur les pistes extérieures (plus rapides) du disque.
FAT Voir File Allocation Table (Tableau d'affectation de fichiers).
Fault Domain (Domaine de
défaillance)
Au sein de l'environnement Dell Compellent Storage Center, un domaine de défaillance
identifie un basculement. En mode Virtual Port (Port virtuel), tous les ports avant
peuvent faire partie d'un domaine de défaillance. En mode Legacy (Hérité), chaque port
principal et réservé crée un domaine de défaillance.
FC Voir Fibre Channel.
FE (Réseau avant) Voir Front End Network (Réseau avant).
Fibre Channel (FC) Une interconnexion grande vitesse utilisée pour connecter les serveurs aux contrôleurs
et boîtiers de disques arrière. Les composants FC comprennent : adaptateurs HBA,
concentrateurs, commutateurs et composants de câblage. Le terme FC fait également
référence à un protocole de communication série grande vitesse duplex intégral
permettant des taux de transfert des données de jusqu'à 10 Gigabits par seconde.
File Allocation Table
(Tableau d'affectation de
fichiers) (FAT)
La structure du système de fichiers utilisée par MS-DOS pour organiser et faire le suivi
du stockage de fichiers. Les systèmes d'exploitation Microsoft Windows ont également
l'option d'utiliser une structure de système de fichiers FAT.
File Transfer Protocol
(Protocole de transfert de
fichiers) (FTP)
Un protocole de couche d'applications utilisé pour le transfert de fichiers de données
en masse entre les machines et les hôtes.
Front End Network (Réseau
avant) (FE)
Le composant du flux des écritures de données du SAN du Dell Compellent Storage
Center (serveur à commutateur à contrôleur à disques) qui initie les écritures de
données. En général, les serveurs (ou commutateurs) se trouvent à l'avant du
contrôleur. Cependant, un système Storage Center qui réplique des données sur un
système distant se trouve à l'avant du système distant. Voir Back end (Arrière).
FTP Voir File Transfer Protocol (Protocole de transfert de fichiers).
GB (Go) Voir Gigabyte(s) (Gigaoctet(s)).
Gigabyte(s) (GB) (Gigaoctets
- Go)
1024 mégaoctets ou 1 073 741 824 octets. Cependant, dans le cas d'une capacité de
disque dur, le terme est généralement arrondi à 1 000 000 000 octets.
group (groupe) Voir PS Series group (groupe PS Series).
HBA Voir Host Bus Adapter (Adaptateur de bus hôte).
9HIT/LE Voir Host Integration Tools for Linux (Outils d'intégration de l'hôte pour Linux).
HIT/ME Voir Host Integration Tools for Windows (Outils d'intégration de l'hôte pour Windows).
HIT/VM Voir Host Integration Tools for VMware (Outils d'intégration de l'hôte pour VMware).
host (hôte) Dans un environnement Dell AIM, un hôte peut signifier un serveur physique (monté en
rack ou lame) ou une machine virtuelle. Dans le Dell AIM SDK, il s'agit d'une super
classe qui comprend les serveurs lame, les serveurs montés en rack et les machines
virtuelles (MV).
host adapter (adaptateur
hôte)
Contrôleur permettant de mettre en œuvre les communications entre le bus du système
et le périphérique (généralement un périphérique de stockage).
Host Bus Adapter
(Adaptateur de bus hôte)
(HBA)
Un périphérique, typiquement une carte d'extension, qui connecte un serveur au
réseau SAN (Storage Area Network - Réseau de stockage). Chaque HBA est identifié
de manière unique sur le SAN par son WWPN (World Wide Port Number - Numéro de
port universel). Des types de HBA typiques comprennent Fiber Channel et iSCSI.
Host Integration Tools for
Linux (Outils d'intégration de
l'hôte pour Linux) (HIT/LE).
Une suite d'outils qui intègre les systèmes ESX avec matrices de stockage Dell
EqualLogic PS Series. Elle comprend les outils suivants : ASM/VE (Auto Snapshot
Manager/VMware Edition - Instantanés automatiques/Édition VMware), EqualLogic
Datastore Manager (Gestionnaire de stockage des données EqualLogic) et EqualLogic
Virtual Desktop Deployment Utility (Utilitaire de déploiement du bureau virtuel
EqualLogic).
Host Integration Tools for
Windows (Outils
d'intégration hôte pour
Windows) (HIT/ME).
Une suite d'application qui vous permet de configurer et gérer une matrice. Elle
comprend : ASM/ME, DSM (Multipath I/O Device Specific Module - Module pour
périphériques d'E/S multivoies) et RSW (Remote Setup Wizard - Assistant de
configuration à distance).
Host Integration Tools for
VMware (Outils d'intégration
de l'hôte pour VMware) (HIT/
VM)
Une suite d'outils qui intègre les systèmes Linux avec les matrices de stockage Dell
EqualLogic PS Series. Elle comprend : la RSWCLI (Remote Setup Wizard Command Line
Interface - Interface de ligne de commande de l'assistant de configuration à distance),
eqltune (EqualLogic Host Performance and Configuration Tuning Suite - Suite de
Performances des hôtes et réglages de la configuration EqualLogic) et eqllog
(EqualLogic Log Gathering Facility - Emplacement de récupération des journaux
EqualLogic).
Hot Spare Disk (Disque de
rechange)
Dans l'environnement du Dell Compellent Storage Center, un disque de rechange est un
disque de sauvegarde. Si une matrice active venait à échouer, le contrôleur rend la
partie de rechange de la matrice active et reconstruit les données à la volée. Bien que
le disque de rechange devienne un disque actif sans qu'un utilisateur ait besoin
d'intervenir, veillez à remplacer le lecteur en échec le plus tôt possible afin que la
matrice soit à nouveau protégée et dotée d'un nouveau disque de rechange. Les
disques de rechange peuvent balayer plusieurs boîtiers de disques. Les disques de
rechange Storage Center peuvent être de capacité différente que les lecteurs de
données qu'ils remplacent.
hot-plug (enfichage à chaud) La capacité d'insérer ou d'installer un périphérique (généralement un disque dur ou un
ventilateur interne) sur le système hôte alors que celui-ci est sous tension et en cours
de fonctionnement. Reportez-vous également à hot-swap (remplacement à chaud).
hot-swap (remplacement à
chaud)
Voir hot-plug (enfichage à chaud).
10I/O (E/S) Input/Output (Entrée/Sortie). Un clavier est un périphérique d'entrée et un moniteur est
un périphérique de sortie. En général, l'activité d'E/S est différente de l'activité
informatique.
ID Dans l'environnement Dell AIM, il s'agit d'un identifiant unique pour un élément du ,
attribué lorsqu'il est ajouté à l'environnement.
iDRAC Voir Integration Dell Remote Access Controller (Contrôleur iDRAC).
IKEv2-SCSI Un protocole utilisé pour la création de certificats.
image Spécifique au Dell AIM, il s'agit des bits réels stockés sur un disque ou une matrice de
stockage sur laquelle une persona ou un VMRack s'amorce, ainsi que les informations
utilisées par le contrôleur pour amorcer l'image sur un type d'hôte particulier. Vous
pouvez configurer une persona ou un VMRack avec plus d'une image, par exemple, de
manière à ce que la même persona puisse s'amorcer sur un serveur physique ou une
machine virtuelle.
infiniBand InfiniBand propose des liaisons série bidirectionnelles point à point destinées à la
connexion des processeurs aux périphériques à haut débit.
Instant Replay (Relecture
instantanée)
Voir Data Instant Replay (Relecture instantanée des données).
Integrated Dell Remote
Access Controller
(Contrôleur iDRAC)
Contrôleur d'accès à distance qui utilise le protocole Internet SCSI.
Intelligent Platform
Management Interface
(Interface intelligente de
gestion de plateforme) (IPMI)
Un protocole mis en place par les modules de gestion dans certains serveurs, qui est
utilisé pour contrôler les serveurs à distance. Les modules de gestion lame des servers
Dell mettent en place l'iPMI.
interconnect switch
(commutateur
d'interconnexion)
Un commutateur dans l'environnement Dell AIM, géré par le contrôleur, qui sert à
interconnecter des éléments tels que les châssis, les vRacks, d'autres commutateurs
d'interconnexion ainsi que des commutateurs externes.
internet SCSI (iSCSI) Internet SCSI (voir SCSI). Protocole qui contient les commandes SCSI permettant la
communication entre les serveurs client (initiateurs iSCSI) et les périphériques de
stockage réseau (cibles iSCSI) sur les réseaux IP.
IPMI Voir Intelligent Platform Management Interface (Interface intelligente de gestion de
plateforme)
iSCSI Voir Internet SCSI.
Key Management
Interoperability Protocol
(Protocole d'interopérabilité
de gestion de clés) (KMIP)
Les standards définis pour la communication entre les systèmes de gestion de clés
Enterprise et les systèmes de cryptage.
Key Serving Ports (Ports de
services de clés)
Les ports utilisés par le système d'exploitation pour communiquer avec EKM.
Keygroup (Groupe de clés) Situé dans EKM, il s'agit d'un ensemble de clés attribué à un service, une zone ou un
type de matériel spécifique.
Keys (Clés) Un certificat crypté utilisé pour protéger les données dans le EKM.
11Keystore/Keygroup/Master
Keystore (Stockage de clés/
Groupe de clés/Stockage de
clés passe-partout)
Groupe de clés cryptées dans le EKM.
KMIP Voir Key Management Interoperability Protocol (Protocole d'interopérabilité de gestion
de clés) (KMIP)
Java Database Connectivity
(Connectivité de base de
données Java) (JDBC)
Une interface API pour la langue de programmation Java qui définit comment un client
peut accéder, effectuer une demande et mettre à jour les données dans une base de
données.
JDBC Voir Java Database Connectivity (Connectivité de la base de données Java).
Leader Controller (Contrôleur
leader)
Contrôleur principal au sein d'un Dell Compellent Storage Center à deux
contrôleurs. Normalement, les contrôleurs leader et homologue partagent la charge
d'E/S de stockage, essentiellement doublant le débit, cependant uniquement le
contrôleur leader effectue des fonctions de gestion externe. Si un contrôleur échoue, le
contrôleur restant devient ou demeure le contrôleur leader et prend en charge les
responsabilités des deux contrôleurs. Voir Peer Controller (Contrôleur homologue).
Legacy Mode (Mode Hérité) Dans le Dell Compellent Storage Center, les domaines de défaillance sont configurés de
manière à dédier des paires de ports avant principal et en réserve, connectées via un
équipement redondant, tel qu'un mécanisme de protection du trafic de stockage contre
un point de panne unique. Voir Fault Domain (Domaine de défaillance), Virtual Port (Port
virtuel) ou Virtual Port Mode (Mode de port virtuel).
Linear Tape-Open (Bandes
linéaires à format ouvert)
(LTO)
Un format standard ouvert de bande.
Logical Unit Number
(Numéro d'unité logique)
(LUN)
Une unité logique est une division conceptuelle (une sous-unité) d'un disque de
stockage ou d'un ensemble de disques. Chaque unité logique possède une adresse,
appelée numéro d'unité logique (LUN), qui lui permet d'être identifiée de manière
unique.
LTO Voir Linear Tape-Open (Bandes linéaires à format ouvert).
LTO Key Group Rollover
(Basculement du groupe de
clés LTO)
Dans le EKM, il s'agit d'un ensemble de clés attribuées à utiliser une fois le groupe de
clés par défaut vidé.
LUN Voir logical unit number (numéro d'unité logique).
MAC address (Adresse
MAC)
Voir Media Access Control address (Adresse du contrôle d'accès aux médias).
Managed Disks (Disques
gérés)
Dans le Dell Compellent Storage Center, il s'agit des périphériques de stockage
(disques, SSD) attribués à un dossier de disques afin d'associer ces périphériques à un
pool de stockage. Voir Storage Pool, disk folder (Pool de stockage, dossier de disques).
managed system (système
géré)
« Système géré » signifie tout système surveillé et géré par Dell OpenManage Server
Administrator.
management IP address
(adresse IP de gestion)
Adresse utilisée pour établir une connexion à un périphérique IP intelligent afin de
surveiller ou gérer ce périphérique. L'adresse peut être dédiée à un usage exclusif par
12les applications de gestion ou partagé pour être utilisée par la gestion et les
applications de service.
management network
(réseau de gestion)
Un réseau de gestion facultatif qui sépare le trafic iSCSI (E/S du volume) du trafic de
gestion (sessions de l'interface graphique utilisateur et de la CLI, autres
communications de gestion de groupe et opérations intergroupe).
management station (station
de gestion)
Système utilisé pour gérer à distance un ou plusieurs systèmes gérés à partir d'un
emplacement central.
Manual Replay (Relecture
manuelle)
Fonction du Dell Compellent Storage Center qui permet à l'utilisateur de créer
manuellement des copies de volumes à un moment dans le temps.
manual transfer replication
(réplication de transfert
manuel)
Réplication effectuée via un support amovible plutôt que sur un réseau. Utilisée lorsque
la liaison réseau entre les partenaires de réplication est trop lente ou ne convient pas
pour un transfert de larges quantités de données.
Manual Transfer Utility
(Utilitaire de transfert
manuel)
Utilitaire autonome de Dell EqualLogic qui effectue une réplication des volumes à l'aide
d'un support amovible au lieu du réseau. L'utilitaire possède les interfaces GUI et CLI.
Media Access Control
address (MAC address)
(Adresse du contrôle
d'accès aux médias -
Adresse MAC)
Numéro unique d'identification de votre matériel sur un réseau.
migrate volume (migrer un
volume)
Une commande du Dell Compellent Storage Center permettant de déplacer les données
d'un volume à un autre.
migration Dans le contexte de EKM, cela signifie l'introduction d'un stockage de clés dans un
stockage de clés existant au cours de l'installation de Dell Encryption Key Manager 3.0
(et non après).
mirror volume (volume
miroir)
Une commande du Dell Compellent Storage Center qui permet de répliquer un volume
local sur un Dell Compellent Storage Center distant et de maintenir les mises à jour
entre les volumes locaux et distants jusqu'à ce que le miroir soit brisé manuellement.
mirroring (mise en miroir) Un type de redondance des données dans lequel un ensemble de lecteurs physiques
stockent des données et un ou plusieurs ensembles de lecteurs supplémentaires
stockent les copies dupliquées des données. La fonctionnalité de mise en miroir est
fournie par le logiciel. Voir striping (répartition), RAID.
NAS Voir Network-Attached Storage (Stockage en réseau).
network connection
(connexion réseau)
Un objet qui définit la connectivité de réseau requise d'une persona ou d'un VMRack.
L'ajout d'éléments sur un réseau entraîne la création d'une connexion réseau, par
exemple lorsque vous ajoutez une persona à un réseau.
Network-Attached
Storage (Stockage en
réseau) (NAS)
NAS est l'un des concepts utilisés pour la mise en place d'un stockage partagé sur un
réseau. Les systèmes NAS ont leurs propres systèmes d'exploitation, matériel intégré
et logiciel optimisé pour répondre à des besoins de stockage spécifiques.
NTP Le protocole NTP (Network Time Protocol) est un protocole de synchronisation des
horloges des systèmes informatiques sur des réseaux de données commutés par
paquets et de latence variable.
13Oversubscribed space
(espace surenregistré)
Dans un SAN qui prend en charge l'allocation dynamique, il s'agit de la capacité de
stockage configurée comme étant disponible sans être physiquement présente (c'est-
à-dire, l'espace configuré moins l'espace disponible).
parity stripe (bande de
parité)
Dans des matrices RAID, un disque dur segmenté contenant des données de parité.
partition Une section physique du disque dur créée à l'aide de la commande fdisk. Les partitions
peuvent être divisées en plusieurs lecteurs logiques à l'aide de la commande format.
passive Controller
(contrôleur passif)
Le contrôleur Dell AIM qui agit en tant que disque de secours, prêt à prendre la relève
pour la gestion de l'environnement si le contrôleur actif échoue.
Peer Controller (Contrôleur
homologue)
Dans un Dell Compellent Storage Center à deux contrôleurs, le contrôleur homologue
partage la charge d'E/S avec le contrôleur leader mais n'a aucune fonction de gestion
externe. Si le contrôleur leader échoue, le contrôleur homologue prend la relève et se
charge de la gestion et des E/S pour les deux contrôleurs. Voir Leader Controller
(Contrôleur Leader).
persona Un environnement du serveur capturé sur disque : le système d'exploitation, le logiciel
agent Dell AIM facultatif et le réseau et tout autre paramètre requis pour l'exécution
d'une application sur un hôte au sein de l'environnement Dell AIM.
pool L'espace de stockage dans un SAN disponible pour une utilisation par les volumes.
Dans un Dell Compellent Enterprise Storage Manager (Gestionnaire de stockage
Enterprise Dell Compellent) et un Dell Compellent Storage Center, cela équivaut à
l'espace total du SAN. Dans les matrices Dell EqualLogic PS Series, cela équivaut à
l'espace total des membres du pool en question.
pool administrator
(administrateur de pool)
Un compte du groupe Dell EqualLogic PS Series autorisé à gérer les objets dans des
pools spécifiques uniquement ou un ensemble de pools pour un groupe. Comparer à
l'administrateur de groupe (group administrator).
primary group (groupe
principal)
Au sein de l'environnement du Dell EqualLogic Group Manager (Gestionnaire de
groupes Dell EqualLogic), il s'agit du groupe contenant le volume d'origine dans un
partenariat de réplication. Voir secondary group (groupe secondaire)
primary volume (volume
principal)
Au sein d'un environnement du Dell EqualLogic Group Manager (Gestionnaire de
groupes Dell EqualLogic), il s'agit d'un volume configuré pour la réplication sur un
partenaire de réplication.
PS Series array (Matrice PS
Series)
Une unité de stockage Dell EqualLogic iSCSI unique, généralement configurée en tant
que groupe Dell EqualLogic PS Series. Vous pouvez introduire plusieurs matrices de
série PS dans un groupe plus important de série PS et les gérer en tant que réseau SAN
iSCSI unique.
PS Series group (Groupe PS
Series)
Une entité de stockage iSCSI comprenant une ou plusieurs matrices de stockage Dell
EqualLogic PS Series accessibles via une adresse IP unique et gérables en tant que
réseau de stockage SAN.
Public Services (Services
publics)
Dans le contexte du Dell AIM, il s'agit de l'adresse IP virtuelle des services de
contrôleur que vous utilisez pour vous connecter à la console ou à la CLI du contrôleur
actif.
RAC Remote Access Controller (Contrôleur d'accès à distance)
14RAID Voir Redundant Array of Independent Disks (Matrice redondante de disques
indépendants)
RAID 0 Les données sont réparties sur les disques disponibles, offrant ainsi des performances
optimisées. RAID 0 ne fournit cependant aucune redondance des données.
RAID 10 Les données sont réparties sur les lecteurs de disque disponibles et mises en miroir,
offrant ainsi une disponibilité et des performance optimisées des données. Maintient au
moins une copie complète des données sur le volume. RAID 10 fournit des
performances de Lecture/Écriture optimales, une probabilité de résistance à plusieurs
pannes accrue et une restauration des données la plus rapide.
RAID 5 Maintient une copie logique des données à l'aide d'une bande de parité rotative
mathématiquement dérivée. La bande de parité est dérivée de bandes de données.
Cette méthode permet moins de surcharge système pour les informations redondantes
que le RAID 10, cependant les performances d'écriture sont plus lentes que RAID 10 en
raison du calcul de parité associé à chaque écriture. Les performances d'écriture sont
semblables à celles de RAID 10.
RAID 50 Le niveau de RAID 50 est une combinaison des niveaux de RAID 5 et 0. RAID 50 inclut la
parité et la répartition des disques sur plusieurs lecteurs.
recovery volume (volume de
restauration)
Un volume créé dans le but de restaurer des données. Dans les matrices Dell
EqualLogic PS Series, un volume de restauration est créé en associant un ensemble de
répliques entrantes à une opération de basculement. Vous pouvez également créer des
modèles de volumes de restauration ainsi que des « thin clones » (clones dynamiques)
de restauration. Dans le Dell Compellent Storage Center, un volume d'affichage est
créé depuis une relecture. Voir replica, View Volume, Replay (réplique, Volume
d'affichage, Relecture).
Redundancy (Redondance) La déduplication d'informations ou de composants d'équipement pour assurer la relève
de la fonction d'une ressource principale en échec par une ressource secondaire. Le
Dell Compellent Storage Center fournit une redondance à chaque composant pour
qu'aucun point de panne unique ne survienne. La redondance unique protège contre la
perte de données en cas d'échec d'une ressource. La double redondance protège
contre la perte de données en cas d'échec de deux ressources.
« Redundant Array of
Independent Disks », matrice
redondante de disques
indépendants (RAID).
Matrice redondante de disques indépendants. Une méthode d'apport de redondance
des données. Certaines mises en œuvre typiques de RAID comprennent RAID 0, RAID 1,
RAID 5, RAID 10 et RAID 50. Voir mirroring, striping (mise en miroir, répartition).
Remote Instant Replay
(Relecture instantanée à
distance)
Une fonction de la solution du Dell Compellent Storage Center dans laquelle une
relecture est répliquée sur un Dell Compellent Storage Center distant. Les Dell
Compellent Storage Centers local et distant sont actif-actif et une réplication
bidirectionnelle (synchrone ou asynchrone) peut se produire à des intervalles
indépendants. La réplication du Dell Compellent Storage Center requiert une
application logicielle de l'Enterprise Manager (Gestionnaire Enterprise) avec licence de
réplication. Voir Replay, Remote System, replication (Relecture, Système distant,
réplication).
Remote Setup Wizard
(Assistant de configuration
distant) (RSW)
Une interface utilisateur graphique (GUI) qui vous permet de configurer une matrice
Dell EqualLogic PS Series une fois l'installation de Host Integration Tools/Microsoft
Edition effectuée.
15Remote System (Système
distant)
Dans le Dell Compellent Storage Center, il s'agit d'un SAN distinct configuré pour
recueillir des données de réplication provenant d'un volume d'origine du Dell
Compellent Storage Center local. La réplication du Dell Compellent Storage Center
requiert une application logicielle de l'Enterprise Manager (Gestionnaire Enterprise)
avec licence de réplication. Voir replication (réplication).
Replay (Relecture) Dans le Dell Compellent Storage Center, il s'agit d'une copie instantanée (PITC)
complètement utilisable qui contient une image des données telles qu'elles
apparaissent à un « point dans le temps » - moment auquel la copie fût initiée. La copie
peut être stockée localement ou sur un Dell Compellent Storage Center distant. Voir
snapshot, Data Instant Replay, Remote Instant Replay (instantané, Relecture
instantanée des données, Relecture instantanée distante).
Replay profile (Profil de
relecture)
Dans un Dell Compellent Storage Center, il s'agit d'un ensemble de règles qui
déterminent quand et comment les copies instantanées de relectures seront prises et
quelle sera leur durée de sauvegarde. Voir Replay (Relecture).
Replay space (Espace de
relecture)
Dans un Dell Compellent Storage Center, l'espace automatiquement réservé et utilisé
pour les relectures. Voir active space, actual space (espace actif, espace réel).
replica (réplique) Une représentation « point dans le temps » d'un volume Dell EqualLogic PS Series. Le
volume d'origine et sa réplique se trouvent sur les différents groupes Dell EqualLogic
PS Series (partenaires de réplication) pouvant être séparés par une certaine distance
géographique afin de faciliter la tolérance aux pannes.
replica collection (collection
de répliques)
Dans le Dell EqualLogic Group Manager (Gestionnaire de groupes Dell EqualLogic), il
s'agit de l'ensemble des répliques résultant d'une collection de volumes.
replica collection set
(ensemble de collection de
répliques)
Dans le Dell EqualLogic Group Manager (Gestionnaire de groupes Dell EqualLogic), il
s'agit de l'ensemble de collections de répliques pour une collection de volumes.
replica reserve (réserve de
répliques)
Dans le Dell EqualLogic Group Manager (Gestionnaire de groupes Dell EqualLogic), la
partie d'espace délégué mise de côté pour les ensembles de répliques d'un volume
spécifique. Vous configurez la réserve de répliques pour le volume sur le groupe
principal, mais la réserve de répliques réelle se trouve sur le groupe secondaire.
replica set (ensemble de
répliques)
Dans le Dell EqualLogic Group Manager (Gestionnaire de groupes Dell EqualLogic),
l'ensemble de répliques complètes d'un volume, d'un volume modèle ou d'un volume
« thin clone » (de clones dynamiques).
replicating system (système
en cours de réplication)
Un Dell Compellent Storage Center configuré de manière à envoyer les données de
réplication d'un ou plusieurs volumes locaux sur un Storage Center distant. Voir
replication, Remote System, Remote Instant Replay (réplication, Système distant,
Relecture instantanée à distance).
replication (réplication) Il s'agit du processus de copie des données de volume (uniquement deltas) d'un réseau
SAN (local) principal sur un réseau SAN (distant) secondaire, de manière à ce que les
données puissent être restaurées depuis l'un ou l'autre SAN, au besoin. Il n'existe
aucune limitation de distance entre les SAN.
replication partner
(partenaire de réplication)
Dans le Dell EqualLogic Group Manager (Gestionnaire de groupes Dell EqualLogic), il
s'agit d'un groupe configuré pour envoyer ou recevoir des répliques provenant d'un
autre partenaire.
RSW Voir Remote Setup Wizard (Assistant de configuration à distance).
16runnable persona (persona
exécutable)
Dans le contexte du Dell AIM, il s'agit d'une persona amorcée depuis le réseau qui est
initialisée et en attente d'être attribuée à un hôte.
SAN Voir Storage Area Network (Réseau de stockage).
SAN HeadQuarters Permet de surveiller plusieurs groupes Dell EqualLogic PS Series depuis une interface
graphique unique. Recueille et formate les données de performances et autres
informations de groupe importantes.
SCN Voir System Control Network (Réseau de contrôle système).
SCN Services (Services
SCN)
L'adresse IP virtuelle des services du contrôleur utilisée par les personas et les
VMRacks dans l'environnement Dell AIM pour communiquer avec le contrôleur actif.
SCSI Voir Small Computer System Interface (Interface système pour micro-ordinateur)
SDK Voir Software Development Kit (Kit de développement du logiciel).
secondary control module
(module de contrôle
secondaire).
Au sein de l'environnement du Dell EqualLogic Group Manager (Gestionnaire de
groupes Dell EqualLogic), le module de contrôle secondaire met en miroir les données
du cache du module de contrôle actif. Si le module de contrôle actif cesse de
fonctionner, le module secondaire prend alors la relève des opérations de réseau. Voir
active control module (module de contrôle actif).
secondary group (groupe
secondaire)
Dans une configuration de réplication du Dell EqualLogic Group Manager (Gestionnaire
de groupes Dell EqualLogic), il s'agit du groupe qui reçoit des répliques provenant d'un
volume source. Voir primary group (groupe principal).
Server Cluster (Cluster de
serveurs)
Un groupe de serveurs indépendants fonctionnant ensemble en tant que système
unique pour fournir un service ininterrompu en cas de pannes d'ordinateur individuel.
service tag (numéro de
service)
Une étiquette située sur le système permettant son identification auprès du support
technique Dell.
Simple Mail Transfer
Protocol (protocole de
transfert de courrier simple)
(SMTP)
Définit un format et une procédure d'acheminement de message pour permettre l'envoi
de messages sur Internet entre les hôtes.
Protocole SNMP (Simple
Network Management
Protocol - protocole de
gestion de réseau simple).
Interface standard permettant à un administrateur de réseau de suivre et de gérer des
postes de travail à distance.
Simulator (Simulateur) Un composant du Dell AIM SDK qui imite un environnement Dell AIM sous
fonctionnement, y compris le contrôleur, la console et les réseaux physiques et virtuels.
Voir SDK.
Small Computer System
Interface (Interface système
pour micro-ordinateur)
Small Computer System Interface (Interface système pour micro-ordinateur). Une
interface du bus d'E/S avec des taux de transmission de données plus rapides que les
ports standard.
SMART Self-Monitoring Analysis and Reporting Technology (Technologie SMART). Permet aux
lecteurs de disques de rapporter des erreurs et des pannes au BIOS du système et
d'afficher ensuite un message d'erreur.
Smart Copy (Copie
intelligente)
Une copie ASM/ME « point dans le temps » cohérente avec les applications d'objets
dans un groupe Dell EqualLogic PS Series. Les copies intelligentes peuvent être de
17différents types : instantané, clone, ou réplique. Ces types varient selon l'édition du
Gestionnaire d'instantanés automatiques (Auto-Snapshot Manager) utilisé.
SMP Voir symmetric multiprocessing (multi-traitement symétrique).
SMTP Voir Simple Mail Transfer Protocol (protocole de transfert de courrier simple) (SMTP)
snapshot (instantané) Une copie instantanée (PITC) d'un volume. Voir Replay (Relecture).
snapshot collection
(collection d'instantanés)
Un ensemble d'instantanés résultant d'une opération d'instantanés sur une collection
de volumes. Voir volume collection (collection de volumes).
SNMP Voir Simple Network Management Protocol (Protocole simplifié de gestion de réseau).
SNMP Trap Collector
(Collecteur d'interruptions
SNMP)
Dans le contexte de Dell AIM, l'adresse IP virtuelle des services du contrôleur qui gère
les commutateurs et autres périphériques utilisée pour l'envoi d'interruptions SNMP au
contrôleur actif.
Software Development Kit
(Kit de développement du
logiciel) (SDK)
Un ensemble d'outils de déploiement utilisé pour créer des applications de progiciel,
cadre logiciel, plateforme matérielle, système informatique, console de jeux vidéo,
système d'exploitation ou plateforme semblable spécifiques.
Space Recovery
(Restauration d'espace)
Utilitaire qui restaure l'espace disponible que Windows reporte comme utilisé mais qui
est réellement vide et qui peut être utilisé par Dell Compellent Storage Center.
spare disk (disque de
secours)
Un lecteur désigné ou non utilisé d'un SAN qui est utilisé pour le remplacement
automatique d'un lecteur en échec.
Storage Area Network
(Réseau de stockage SAN)
Un réseau de stockage SAN est un réseau spécialisé qui fournit un accès à des soussystèmes de stockage ultraperformants et hautement disponibles en utilisant des
protocoles de stockage de blocs. Le réseau SAN est composé de périphériques
particuliers, tels que des adaptateurs de bus hôte (HBA) dans les serveurs hôte, des
commutateurs qui aident à l'acheminement du trafic de stockage et des sous-systèmes
de stockage de disques. La caractéristique principale d'un SAN s'avère être ses soussystèmes de stockage, généralement disponibles pour plusieurs hôtes de manière
simultanée, les rendant de ce fait plus souples et évolutifs. Comparer au NAS.
Storage Cluster (Cluster de
stockage)
Dans le Dell Compellent Storage Center, il s'agit de plusieurs contrôleurs SAN
interconnectés dans le but d'optimiser la fiabilité, la disponibilité, la serviabilité et les
performances (via l'équilibrage de charge). Le Storage Center se sert d'une
configuration active-active pour fournir un basculement de contrôleur automatique. Un
cache complètement en miroir et doté d'une batterie dans chaque contrôleur assure la
fiabilité des données après un redémarrage et permet aux volumes de migrer entre les
contrôleurs en cas d'échec d'un seul contrôleur.
Storage Clustering (Mise en
cluster du stockage)
Une fonction du Dell Compellent Storage Center qui fournit un basculement de
contrôleur automatique via plusieurs contrôleurs au sein d'un configuration activeactive. Pleinement mis en miroir, le cache de secours de la batterie fournit une
tolérance aux erreurs ainsi qu'un redémarrage/restauration automatique en cas
d'échec d'un contrôleur.
Storage Pool (Pool de
stockage)
Voir pool.
Storage Profile (Profil de
stockage)
Dans le Dell Compellent Storage Center, il s'agit d'un ensemble de règles qui définit les
types de lecteurs (couches) sur lesquels stocker les données et le niveau de RAID à
utiliser pour chaque couche.
18Storage Type (Type de
stockage)
Dans le Dell Compellent Storage Center, il s'agit d'un ensemble d'attributs, notamment
les options de redondance et la taille des blocs, qui contrôle l'attribution et la protection
de l'espace d'un pool de stockage.
striping (répartition) La répartition des disques permet l'écriture des données sur trois disques ou plus au
sein d'une matrice, cependant seule une partie de l'espace de chaque disque est
utilisée. L'espace utilisé par la répartition est identique sur chaque disque utilisé. Un
disque virtuel peut utiliser plusieurs répartitions sur le même ensemble de disques
d'une matrice. Voir également mirroring (mise en miroir) et RAID.
symmetric multiprocessing
(multi-traitement symétrique)
(SMP)
Se dit d'un système qui dispose de deux processeurs ou plus reliés par un lien haut
débit et qui est administré par un système d'exploitation, dans lequel l'ensemble des
processeurs dispose des mêmes priorités d'accès au système d'E/S.
synch Voir Synchronous Replication (Réplication synchrone).
Synchronous Replication
(Réplication synchrone)
Fonction qui écrit de manière atomique les mêmes données sur deux volumes distincts,
stockés sur du matériel physique distinct, avant que l'application ne reçoive un
message intégral d'E/S. Les deux écritures se terminent ou échouent simultanément, ce
qui signifie que les deux volumes sont toujours complètement synchrones. Cependant,
la fonction peut avoir pour effet d'accroître la latence d'écriture pour l'application. Voir
synch.
System Control Network
(Réseau de contrôle
système) (SCN)
Un réseau privé que le Dell AIM utilise pour la communication entre le contrôleur, les
personas et les VMRacks. Le contrôleur utilise également ce réseau pour la détection
des serveurs et pour amorcer les personas et les VMRacks sur ces derniers.
System Setup program
(Programme de configuration
du système)
Un programme BIOS qui permet la configuration du matériel d'un système et la
personnalisation des opérations d'un système en définissant des fonctionnalités telles
que la protection par mot de passe. Le System Setup program (Programme de
configuration du système) étant stocké dans la NVRAM, tout paramètre restera actif
jusqu'à ce qu'il soit modifié.
Systems Deployment
Appliance (Serveur de
déploiement des systèmes)
Une solution de gestion de déploiement basée sur le serveur Dell KACE destinée aux
professionnels de l'informatique qui fournit des outils pour l'imagerie de disque, la
migration de l'état des utilisateurs, la gestion de sites à distance, le dépannage et la
restauration du système, ainsi que le balayage et l'évaluation de l'inventaire du
système. En outre, elle automatise les tâches de configuration de pré et postdéploiement, telles que le balayage et l'évaluation de l'inventaire du système ; elle
automatise également la configuration du disque, du BIOS et RAID, la distribution
logicielle et la gestion des configurations.
Systems Management
Appliance (Serveur de
gestion des systèmes)
Une solution de gestion des systèmes basée sur serveur Dell KACE pour les
professionnels de l'informatique qui simplifie les tâches telles que la gestion de
l'inventaire, la distribution logicielle, la création de rapports, la gestion des correctifs, la
gestion des actifs, la création de scripts et le support technique via un interface Web.
template (modèle) Dans le contexte de Dell AIM, il s'agit d'une persona inactive qui peut être clonée pour
créer d'autres personas mais qui ne peut pas être exécutée (ce qui évite
d'endommager le modèle).
template volume (volume du
modèle)
Un volume en lecture seule depuis lequel des clones dynamiques sont créés.
19thin clone (clone dynamique) Volume qui partage son espace avec un volume modèle. Les clones dynamiques (thin
clones) fournissent une utilisation d'espace de stockage efficace pour les
configurations à plusieurs volumes qui possèdent un montant important de données
communes.
Thin Provisioning (Allocation
dynamique)
Fonction qui permet de sur-allouer (ou sur-attribuer) l'espace disponible dans le SAN.
Les objets de stockage (tels que des volumes) qui utilisent l'allocation dynamique
rapportent leur taille maximale potentielle aux applications, cependant il est possible
qu'ils en utilisent beaucoup moins. L'allocation dynamique permet aux organisations de
réduire l'ensemble de leurs frais de stockage, accroître la disponibilité et obtenir de
meilleures performances.
tiered storage (stockage en
couches)
Stratégie d'optimisation du stockage dans laquelle les données qui sont souvent
requises rapidement sont stockées sur des types de supports rapides onéreux et les
données rarement requises sont stockées sur des types de supports plus économiques
et plus lents.
unmanaged space (espace
non géré)
Dans les matrices Dell EqualLogic PS Series, il s'agit de la capacité d'espace délégué
sur le groupe secondaire qui n'est plus accessible depuis le groupe principal.
uplink port (port de liaison
montante)
Port d'un concentrateur réseau ou d'un commutateur, qui sert à le relier à un autre
concentrateur ou commutateur sans utiliser de câble croisé.
vacate (vider) Dans le Dell EqualLogic Group Manager (Gestionnaire de groupes Dell EqualLogic),
cela signifie retirer un membre du groupe alors que les autres membres restent en
ligne.
View Volume (Volume de
vue)
Dans le Dell Compellent Storage Center, il s'agit d'un volume en lecture seule créé au
cours d'une relecture précédente et dont le but principal est la restauration des
données. Voir Replay (Relecture).
Virtual Port (Port virtuel) ou
Virtual Port Mode (Mode port
virtuel)
Dans le contexte du Dell Compellent Storage Center, les ports virtuels éliminent le
besoin de posséder des ports de réserve. En mode Port virtuel, tous les ports avant
acceptent des E/S et peuvent faire partie d'un domaine de défaillance. Pour en savoir
plus sur l'activation des ports virtuels, reportez-vous au Dell Compellent Storage Center
System Setup Guide (Guide de configuration du système Dell Compellent Storage
Center).
virtual World Wide Port
Name (nom de port universel
virtuel) (vWWPN)
Un nom de port universel virtuel utilisé dans le Dell AIM pour la création de personas
depuis le SAN.
Virtualization (Virtualisation) La capacité d'utiliser le logiciel pour partager les ressources d'un seul ordinateur ou
périphérique de stockage sur plusieurs environnements. Un système ou périphérique
physique peut apparaître comme plusieurs systèmes virtuels capables d'héberger
plusieurs systèmes d'exploitation.
VMRack Un rack de machines virtuelles (MV) se trouvant sur un serveur qui exécute une
combinaison de logiciel agent et Red Hat Xen, VMware ESX ou Microsoft Hyper-V.
volume Une unité de stockage distincte associée à un ou plusieurs périphériques de stockage.
volume collection (collection
de volumes)
Plusieurs volumes regroupés dans le but d'effectuer des opérations simultanées sur les
volumes. Voir snapshot collection, replica collection (collection d'instantanés,
collection de répliques).
20volume reserve (réserve de
volumes)
Espace du pool disponible alloué à un volume. Lorsque l'allocation dynamique n'existe
pas, la réserve de volumes correspond à la taille rapportée.
Volume Type (Type de
volume)
Dans le contexte du Dell Compellent Storage Center, le type de volume peut être :
dynamique, Relecture activée ou Réplication. Un volume est dynamique jusqu'à ce
qu'au moins une relecture de ce volume ait été prise, après quoi il devient un volume de
type Relecture activée. Un volume de réplication signifie qu'il est en cours de
réplication sur un autre système Dell Compellent Storage Center.
vRack Dans le contexte du Dell AIM, il s'agit d'un groupe logique qui héberge des hôtes
connectés à un commutateur virtuel (commutateur vRack).
vRack switch (Commutateur
vRack)
Dans le contexte du Dell AIM, il s'agit d'un commutateur qui connecte les hôtes au
vRack.
vWWPN Voir virtual World Wide Port Name (nom de port universel virtuel)
2122デル用語集 - バージョン 2
用語集用語集
ACPI Advanced Configuration and Power Interface を参照してください。
アクティブコントロ
ールモジュール
デュアルコントロールモジュールアレイの Dell EqualLogic PS シリーズアレイで、実際
にネットワーク上で I/O 動作を行っているコントロールモジュールです。停止する
と、セカンダリコントロールモジュールにフェイルオーバーします。セカンダリコン
トロールモジュールを参照してください。
アクティブコントロ
ーラ
Dell AIM 環境を実際に管理している Dell AIM コントローラです。
アクティブ領域 Dell Compellent Storage Center で、リプレイを除くボリュームで使用されている容量で
す。この容量には RAID オーバーヘッドは含まれません。リプレイを参照してくだ
さい。
実質領域 Dell Compellent Storage Center のボリュームのアクティブ領域とリプレイ領域を合計
した容量です。アクティブ領域、リプレイ領域を参照してください。
Advanced
Configuration and
Power Interface
(ACPI)
オペレーティングシステムが設定と電力管理を直接、実行できるようにするための標
準インタフェースです。
エージェント Dell AIM 環境(Red Hat Xen および Microsoft Hyper-V ベースの VMRack およびペルソ
ナ)における、エレメント管理およびネットワークプロパティ設定のためにコントロ
ーラが使用する、エレメントにインストールされたオプションソフトウェアです。
エージェントレスペ
ルソナ
Dell AIM エージェントがインストールされていない Dell AIM ペルソナです。
周囲温度 システムが置かれている場所や部屋の温度。
アレイメンバー PS シリーズグループに設定された Dell EqualLogic PS シリーズアレイ。グループに
は複数のメンバーを含めることができます。
アレイシリアルナン
バー
Dell EqualLogic PS シリーズアレイ環境において、Dell EqualLogic PS シリーズアレイを
識別する固有の文字列で、アレイのハードウェア内にエンコードされています。サー
ビスタグを参照してください。
ASM/ME Auto-Snapshot Manager/Microsoft Edition を参照してください。
ASM/VE Auto-Snapshot Manager/VMware Edition を参照してください。
資産管理アプライア
ンス
IT 担当者向けの Dell KACE アプライアンスベースの資産管理ソリューションです。ソ
フトウェアおよびライセンスの準拠を追跡します。インベントリ、ソフトウェア資
産、バージョン、アップグレード、コンピューターの管理をウェブベースのダッシュ
ボード経由で自動的に実行します。
Asset Tag(管理タグ)通常はシステム管理者によって、セキュリティやトラッキング目的でシステムごとに
割り当てられるコード。
割り当て済みディス
ク
Dell Compellent Storage Center の物理ストレージメディア。ボリュームとリプレイの
保存用に管理および使用するためにディスクフォルダに割り当てられます。ディス
クフォルダ、ストレージプールを参照してください。
割り当てモード ペルソナおよび VMRack を、ホスト内 HBA の可用性にもとづいてホストに割り当てる
手段を管理するメカニズムです。HBA を参照してください。
3非同期レプリケーシ
ョン
データをローカルストレージに書き込み、そのデータをリモート SAN に保存するた
めにキューを行う処理です。書き込みが送信される前にローカル SAN に不具合が発
生すると、レプリケーションに失敗する可能性があります。レプリケーション、同
期レプリケーション、リモートインスタントリプレイを参照してください。
自動 RAID 設定 Dell EqualLogic PS シリーズグループで、ユーザーが選択した RAID ポリシーをアレイ
で設定する内部処理です。
Auto-Snapshot
Manager/Microsoft
Edition (ASM/ME)
スマートコピーを管理できる、Microsoft Management Console 向けの、スナップインコ
ンソールアプリケーションです。
Auto-Snapshot
Manager/VMware
Edition (ASM/VE)
VMware 仮想環境で動作する、スマートコピーを管理できるウェブベースのアプリケ
ーションです。
使用可能容量 すべてのドライブ上の、利用可能なストレージの容量の合計。
バックエンド Dell Compellent Storage Center で、コントローラまたはストレージクラスタ(コントロ
ーラの冗長ペアなど)をローカルディスクエンクロージャに接続する、独立した専用
ネットワーク。
バックエンドネット
ワーク
Dell Compellent Storage Center コントローラでの、コントローラとディスクの接続。
ベースボリューム
(Dell EqualLogic PS
シリーズ)
コンピューターにマウントされたボリュームで、Windows で割り当てられたドライブ
文字(G: など)またはマウントポイントを使ってアクセスします。
ベースボリューム
(Dell EqualLogic
Group Manager)
スナップショットを持つボリュームです。スナップショットはベースボリュームに
依存します。ベースボリュームが破壊されている場合、スナップショットは削除さ
れています。
ベースボード管理コ
ントローラ(BMC)
IPMI (Intelligent Platform Management Interface) プロトコルを実装するサーバー管理モ
ジュールです。Dell AIM では、コントローラで BMC を使用していくつかのモデルのサ
ーバーをリモート制御します。
ブレード Dell AIM SDK で、ブレードはホストのスーパークラスのエレメントです。Dell モジュ
ラシステムでは、ブレードはエンクロージャにマウントされたモジュラサーバーを指
します。
BMC ベースボード管理コントローラを参照してください。
起動可能なメディア システムをハードディスクドライブから起動できない場合にシステムの起動に使用
する CD、SD カード、または USB メモリキー。
キャッシュ データを迅速に取得するため、データのコピーまたは手順を保管しておく高速記憶領
域。
CHA Compellent ホストアダプタを参照してください。
チャレンジハンドシ
ェイク認証プロトコ
ル(CHAP)
チャレンジハンドシェイク認証プロトコル(CHAP)は、暗号化されたチャレンジ / レ
スポンスメカニズムを使用するネットワークログインプロトコルです。ボリューム
およびスナップショットへのアクセスを、正しいアカウント名とパスワードを提供す
るホストのみに制限するために使用します。 CHAP は、ログイン / 管理者アカウント
でも使用します。
チャネル Dell / AIM 環境で、スイッチポートに割り当てることのできる最大 8 つの物理的な接続
のうちの 1 つで、最大 8 の物理 NIC を使用してペルソナに接続できます。 1 つまたは
42 つのチャネルをトラフィックに優先的に使用して、優先チャネルに不具合が発生し
た場合には別のチャネルにトラフィックを透過的にルーティングできるようネット
ワークを構成できます。
CHAP チャレンジハンドシェイク認証プロトコル(CHAP)を参照してください。
シャーシスイッチ Dell AIM で、シャーシ内ベイに搭載されたイーサネットスイッチです。シャーシスイ
ッチはコントローラで管理します。
クライアントデバイ
ス通信証明書
EKM で、クライアントとサーバーとの通信を許可する専用暗号化キーです。
クラスタノード サーバークラスタ内のホストやストレージクラスタ内の SAN など、リソースクラス
タの物理メンバーです。
コレクション ASM/ME で、コレクションは、ボリュームやスナップショット、アプリケーションコ
ンポーネントといったストレージオブジェクトの関連するグループで、ASM コンソ
ールツリーで Collcetions マスターノードの下位ノードとして示されます。 Dell
EqualLogic Group Manager では、ボリュームおよびレプリカのコレクションおよびカス
タムスナップショットのコレクションは、Volumes ビューの下に階層構造で示されま
す。
Compellent ホストア
ダプタ(CHA)
各 Dell Compellent Storage Center コントローラ内に搭載された内部キャッシュカード /
バッテリです。書き込みキャッシュメモリはキャッシュカードにミラーリングされ
ます。デュアルコントローラの Dell Compellent Storage Center では、コントローラ 1 の
キャッシュカードにはコントローラ 2 のミラーが含まれ、コントローラ 2 のキャッシ
ュカードにはコントローラ 1 のキャッシュカードが含まれます。シングルコントロ
ーラの Dell Compellent Storage Center では、キャッシュカードにはシングルコントロー
ラのミラーが含まれます。
設定 全体のコンテンツの説明および Dell AIM 環境の設定を説明したデータベースです。
節約モード Dell Compellent Storage Center で残りの空き容量が重大しきい値(平均 10%、最大 32
GB)に低下すると到達するデータ保全モードです。節約モードで、Dell Compellent
Storage Center はアラートを生成し、新規ボリュームの作成を抑制し、リプレイの期
限切れを早めて容量を解放します。緊急モードを参照してください。
コンソール Dell AIM 環境のエレメントの監視および操作に使用するウェブベースのユーザーイ
ンタフェースです。Dell AIM コンソールのホストコントローラは Dell AIM コントロー
ラです。
コントロールモジュ
ール
Dell EqualLogic PS シリーズアレイの物理プロセッサおよびインタフェースコンポー
ネント。コントロールモジュールのフラッシュメモリ内に Dell EqualLogic PS シリー
ズのファームウェアが含まれ、キャッシュメモリに保存されたメモリに一時的な電源
を供給します。複数のネットワークインタフェースおよびオプションのシリアルポ
ートを備えています。 1 つのアレイに、ホットスワップ可能なデュアル冗長コントロ
ーラ 2 台を構成することができます。アクティブコントロールモジュールは I/O を提
供し、セカンダリコントロールモジュールはキャッシュ内にデータのミラーリングを
行います。
コントロールパネル システムの中で電源ボタン、電源インジケータなどの制御部品やインジケータをまと
めた部分。
コントロールポート ストレージリクエストを行うための iSCSI イニシエータ(サーバー)の接続先 iSCSI
ポートです。仮想ポートモードに設定された Dell Compellent Storage Center では、コ
ントロールポートは iSCSI の各フォールトドメイン向けに作成され、該当する仮想ポ
ートへの iSCSI トラフィックのリダイレクトを行います。
5コントローラ(Dell
AIM)
物理および仮想ハードウェア、ソフトウェアおよび、ネットワーク構成を管理し、
Dell AIM コンソールのホストになるソフトウェア。レジリエントなコントローラの
ペアでは、各コントローラは専用サーバー上で動作しますが、設定データベースおよ
びその他主要ファイルを共有ファイルシステムで共有します。
コントローラ(Dell
Compellent)
ディスクアグリゲーション(RAID)、I/O ルーティング、エラー検出、データ復元を提
供します。Dell Compellent Storage Center サブシステム全体にインテリジェンスを提
供します。すべての Storage Center システムに 1 つ以上のコントローラが含まれてい
ます。Storage Center および推奨される対応処置で、システムのパフォーマンスと可
用性を改善します。
コントローラサービ
ス
Dell AIM では、仮想 IP アドレス、またはコントローラがシステム制御ネットワーク
(SCN)、管理対象スイッチ、コンソールおよび CLI などと通信を行うために使用する
複数のアドレスです。デフォルトでは、アクティブなコントローラ上の単一の仮想
IP アドレスですが、SCN サービスおよび SNMP トラップコレクタ向けに固有のアドレ
スを指定することができます。
コパイロットサービ
ス
Dell Compellent Storage Center 内で、集中サポート、製品教育、および営業リソースを
一つに統合したサービスです。システムのパフォーマンスと可用性を向上させるた
めに、システムの予防的監視を行い、改善策のアドバイスを行います。
コピー - ミラー -
移行
種類の異なるディスク間および RAID レベル間でボリュームの移行を可能にする、Dell
Compellent Storage Center の機能です。
資格情報ストア EKM で、セッション間の資格情報を持つリポジトリ。資格情報は、ユーザー名やパス
ワード、証明書といったセキュリティデータです。
暗号化オブジェクト データの保護手段。
Data Collector Dell Compellent Enterprise Manager のコンポーネントの一つ。サーバー上でバックグ
ラウンドで実行され、サーバーに接続されたすべての Dell Compellent Storage Center シ
ステムに関する情報を収集します。
Data Instant Replay Dell Compellent Storage Center の機能の一つ。ローカル SAN 上で、容量効率に優れたボ
リュームのポイントインタイムコピー(PITC)を指定された間隔で実行し、以前の任
意の時点にボリュームをロールバックする機能を提供します。リプレイ、スナップ
ショットを参照してください。
Data Progression Dell Compellent Storage Center の機能の一つ。 I/O 動作のレベル(需要)に応じて、パ
フォーマンスの高いまたは低いデバイスにデータページを自動で移行します。階層
化ストレージを参照してください。
DDR ダブルデータ速度を参照してください。
委任済み容量 Dell EqualLogic Group Manager で、パートナーから受信するレプリカを保存するために
確保されているグループ上の容量です。
Dell Encryption Key
Manager(EKM)
Dell Encryption Key Manager(EKM)は、Dell テープ自動化ソリューション向けの暗号
化キーを管理することで、LTO テープカートリッジに保存されたデータを保護しま
す。
Dell Remote Access
Controller(DRAC)
帯域外管理機能を提供するインタフェースカードです。コントローラは固有のプロ
セッサ、メモリ、ネットワーク接続およびシステムバスへのアクセスを持ち、システ
ム管理者はネットワーク経由でシステムをリモート制御することができます。
デバイスドライバ オペレーティングシステムやプログラムが周辺機器と正しくインタフェースできる
ようにするためのプログラム。
DHCP 動的ホスト構成プロトコルを参照してください。
6Digital Versatile Disk デジタル多用途ディスクまたはデジタルビデオディスク(DVD)。
ディスクフォルダ Dell Compellent Storage Center で、ユーザーが表示したり管理したりできる物理ストレ
ージメディアデバイス(ディスク、SSD)の集合。ディスクフォルダは、ボリューム
ストレージ容量の割り当て元のストレージプールを決定します。ディスクフォルダ
を複数のストレージプールと関連付けることはできますが、すべてのディスクを同一
のフォルダおよびストレージプールに割り当てると Dell Compellent Storage Center の
パフォーマンスは最大化します。
ディスク位置 Dell Compellent Storage Center で、エンクロージャ内ディスクドライブのスロット位置
で、行 / 列の形式で表記されます。たとえば、ディスク位置 01-02 は、上から1番目
の行、左から 2 番目の列のスロットを意味します。
DNS ドメインネームシステムを参照してください。
ドメインネームシス
テム(DNS)
たとえば www.example.com のようなインターネットのドメインネームを
208.77.188.166 のような IP アドレスに変換する方法です。
非アクティブなペル
ソナ
AIM 環境で、ホスト上で現在動作していない(または待機中の)ペルソナ。
ダブルデータ速度
(DDR)
クロックサイクルの上昇パルスと下降パルスの両方でデータを転送することでデー
タ速度を理論上 2 倍にするメモリモジュール内のテクノロジです。
DRAC Dell Remote Access Controller(DRAC)を参照してください。
DRAM ダイナミック RAM を参照してください。
デュアル冗長 通常は RAID 10 および / または RAID 6 を使用して 2 つのドライブの損失を防ぐ、Dell
Compellent Storage Center のストレージプロファイルオプションです。
DVD Digital Versatile Disc を参照してください。
動的ホスト構成プロ
トコル(DHCP)
クライアントシステムに自動的に IP アドレスを割り当てるための方法です。
ダイナミック RAM 通常、システムの RAM は DRAM チップのみで構成されます。
EKM Dell Encryption Key Manager(EKM)を参照してください。
EKM 管理者 EKM において、ユーザーおよびグループの作成および削除を行えるスーパーユーザ
ー。
EKM Encryption
Manager(tklmadmin)
EKM において、キーおよびデバイスの作成または削除を行えるデイリーユーザー。
緊急モード Dell Compellent Storage Center で、空き容量がなくなりシステムが動作できない場合に
到達するモードです。緊急モードでは、すべてのサーバー I/O は拒否され、すべての
ボリュームはオフラインになり、緊急モードを終了できるだけの十分な容量が解放さ
れるまではオンラインに戻りません。節約モードを参照してください。
エンクロージャ 物理的なエンクロージャ。複数のディスクまたはブレードに対して、単一のインタフ
ェース、電源、および冷却システムを提供します。
環境 Dell AIM で、Dell AIM Controller が管理するハードウェア、ソフトウェアおよびネット
ワーク構成の集合。
Eth0 イーサネットポート 0 を参照してください。
Eth1 イーサネットポート 1 を参照してください。
7イーサネットポート
0(Eth0)
Dell Compellent Storage Center で、Eth0 は、管理専用のイーサネットインタフェースで
す。
イーサネットポート
1(Eth1)
Dell Compellent Storage Center で、Eth1 は、クラスタ化やリモートレプリケーションの
ためのコントローラ間のプロセス間通信専用の、イーサネットインタフェースです。
外部ネットワーク Dell AIM 環境には含まれませんが、Dell AIM 環境に物理的および論理的に接続されて
いるネットワークです。
外付けスイッチ Dell AIM 環境には含まれませんが、Dell AIM 環境に物理的および論理的に接続されて
いるスイッチです。
ファブリック 統合ルーティングインフラストラクチャとして機能する、相互接続されたスイッチの
組み合わせ。SAN 上のデバイス間で複数接続が可能で、新規デバイスを目立たないよ
うに追加できます。ネットワーク上で少なくとも 1 つのスイッチを備えた FC(また
は iSCSI)トポロジ。
FastTrack 最もアクティブなデータをディスクトラックの外側(高速側)に動的に配置する、
Dell Compellent Storage Center のオプションユーティリティです。
FAT ファイルアロケーションテーブルを参照してください。
フォールトドメイン Dell Compellent Storage Center 環境内で、フォールトドメインはフェイルオーバーのセ
ットを識別します。仮想ポートモードではすべてのフロントエンドポートを 1 つの
フォールトドメインに含めることができます。レガシーモードでは、プライマリポー
トおよび予約済みポートでそれぞれ 1 つのフォールトドメインを構成します。
FC ファイバーチャネルを参照してください。
FE フロントエンドネットワークを参照してください。
ファイバーチャネル
(FC)
サーバーのコントローラおよびバックエンドディスクエンクロージャへの接続に使
用する、高速相互接続。FC コンポーネントには HBA、ハブ、スイッチ、ケーブルが
含まれます。FC は、最大 10 Gbps のデータ転送が可能な高速全二重シリアル通信プロ
トコルも意味します。
ファイルアロケーシ
ョンテーブル(FAT)
MS-DOS で、ファイルストレージの整理および追跡に使用されるファイルシステム構
造。 Microsoft Windows オペレーティングシステムのオプションで、FAT ファイルシス
テム構造を使用することができます。
ファイル転送プロト
コル(FTP)
バルクデータファイルをマシンまたはホスト間で転送するために使用する、アプリケ
ーションレイヤプロトコルです。
フロントエンドネッ
トワーク(FE)
Dell Compellent Storage Center の SAN を使用した書き込みデータの流れ(サーバーから
スイッチ、コントローラ、ディスクの順)に含まれるコンポーネントです。通常、サ
ーバー(またはスイッチ)はコントローラのフロントエンドですが、リモートシステ
ムへのデータのレプリケーションを行っている Storage Center システムは、リモート
システムのフロントエンドです。バックエンドを参照してください。
FTP ファイル転送プロトコルを参照してください。
GB ギガバイトを参照してください。
ギガバイト(GB) 1024 メガバイトまたは、1,073,741,824 バイト。ただし、ハードディスクドライブの容
量を指す場合は、1 ギガバイトは 1,000,000,000 バイトに丸められます。
グループ PS シリーズのグループを参照してください。
HBA ホストバスアダプタを参照してください。
HIT/LE Linux 向けホスト統合ツールを参照してください。
8HIT/ME Windows 向けホスト統合ツールを参照してください。
HIT/VM VMware 向けホスト統合ツールを参照してください。
ホスト Dell AIM 環境では、ホストは物理サーバー(ラックマウントまたはブレード型)であ
る場合と仮想マシンである場合があります。Dell AIM SDK では、ブレードサーバ-、
ラックマウント型サーバー、および仮想マシン(VM)を含むスーパークラスです。
ホストアダプタ システムのバスと周辺機器(通常はストレージデバイス)の間の通信を実現するコン
トローラ。
ホストバスアダプタ
(HBA)
通常アドオンカードとして、サーバーを SAN(ストレージエリアネットワーク)に接
続するデバイス。各 HBA は、SAN 上で WWPN(ワールドワイドポート番号)で一意
に識別されます。共通 HBA タイプには、ファイバチャネルと iSCSI があります。
Linux 向けホスト統
合ツール(HIT/LE)
Dell EqualLogic PS シリーズストレージアレイに ESX システムを統合するツールのス
イート。Auto Snapshot Manager/VMware Edition(ASM/VE)、EqualLogic Datastore
Manager、EqualLogic Virtual Desktop Deployment Utility を含みます。
Windows 向けホスト
統合ツール(HIT/ME)
アレイの設定および管理を行うアプリケーションのスイート。ASM/ME、DSM
(Multipath I/O Device Specific Module)、RSW(リモートセットアップウィザード)を含
みます。
VMware 向けホスト
統合ツール(HIT/VM)
Linux システムを Dell EqualLogic PS シリーズストレージアレイに統合するツールのス
イート。Remote Setup Wizard Command Line Interface(RSWCLI)、EqualLogic Host
Performance and Configuration Tuning Suite(eqltune)、EqualLogic Log Gathering Facility
(eqllog)を含みます。
ホットスペアディス
ク
Dell Compellent Storage Center 環境で、ホットスペアディスクはバックアップディスク
です。アクティブなアレイに不具合が発生した場合、コントローラは、アクティブな
アレイのホットスペアパートを作成し、データをオンザフライで再構築します。ホッ
トスペアはユーザーの操作なしでアクティブなディスクになりますが、アレイが新し
いホットスペアで保護されるよう、故障したドライブをすぐに交換する必要がありま
す。ホットスペアは、複数のディスクエンクロージャにまたがる場合もあります。
Storage Center のホットスペアには、置換するデータドライブとは異なる容量を持た
せることができます。
ホットプラグ システムに電源が入って稼動している間にデバイス(通常はハードディスクドライブ
または内蔵冷却ファン)をホストシステムに挿入する、または取り付けることができ
る機能。ホットスワップも参照してください。
ホットスワップ ホットプラグを参照してください。
I/O 入力 / 出力。キーボードは入力デバイス、モニタは出力デバイスです。通常、I/O 動
作は演算動作とは区別されます。
ID Dell AIM 環境への追加時にエレメントに割り当てられる固有の識別子。
iDRAC Integrated Dell Remote Access Controller を参照してください。
IKEv2-SCSI 証明書の作成に使用されるプロトコル。
イメージ Dell AIM では特に、ペルソナまたは VMRack が起動するディスクまたはストレージア
レイに保存された実際のビットを意味し、コントローラが特定の種類のホスト上でそ
のイメージを起動するために使用する情報を含みます。たとえば、ペルソナまたは
VMRack に複数のイメージを設定して、同じペルソナが物理サーバーまたは仮想マシ
ンのいずれでも起動できるように設定できます。
infiniBand 複数のプロセッサと高速周辺機器との接続に、ポイントツーポイントの双方向シリア
ルリンクを提供します。
9インスタントリプレ
イ
Data Instant Replay を参照してください。
Integrated Dell
Remote Access
Controller(iDRAC)
インターネット SCSI プロトコルを使用するリモートアクセスコントローラです。
Intelligent Platform
Management
Interface(IPMI)
いくつかのサーバーで管理モジュールで実装されるプロトコルで、サーバーのリモー
ト制御に使用します。 Dell サーバーのブレード管理モジュールは iPMI を実装してい
ます。
相互接続スイッチ Dell AIM 環境のスイッチ。コントローラによって管理され、シャーシ、vRack、その他
相互接続スイッチおよび外部スイッチの相互接続に使用します。
インターネット
SCSI(iSCSI)
インターネット SCSI(SCSI 参照)。 IP ネットワーク上のクライアントサーバー(iSCSI
イニシエータ)とネットワークストレージデバイス(iSCSI ターゲット)間の通信の
ための、標準 SCSI コマンドをカプセル化するプロトコルです。
IPMI Intelligent Platform Management Interface を参照してください。
iSCSI インターネット SCSI を参照してください。
Key Management
Interoperability
Protocol (KMIP)
エンタープライズキー管理システムと暗号化システムの間の通信用の標準セットア
ップ。
キー提供ポート EKM 内で通信を行うためにオペレーティングシステムで使用するポート。
キーグループ EKM で、特定の部門、エリア、ハードウェアの種類に対して割り当てられたキーの一
式。
キー EKM でデータを保護するために使用する、暗号化された証明書。
キーストア / キーグ
ループ / マスターキ
ーストア
EKM 内の暗号化されたキーのグループ。
KMIP Key Management Interoperability Protocol(KMIP)を参照してください。
Java Database
Connectivity(JDBC)
Java プログラミング言語の API で、クライアントがデータベース内のデータにアクセ
ス、クエリ、およびアップデートを行う方法を定義します。
JDBC Java Database Connectivity を参照してください。
リーダーコントロー
ラ
デュアルコントローラ型の Dell Compellent Storage Center のプライマリコントロー
ラ。通常、リーダーおよびピアコントローラはストレージ I/O 負荷を共有して、基本
的にスループットを倍にしますが、リーダーコントローラのみが外部管理機能を実行
します。 1 台のコントローラに不具合が生じた場合、残りのコントローラがリーダー
となり、両方のコントローラの役割を果たします。ピアコントローラを参照してく
ださい。
レガシーモード Dell Compellent Storage Center で、フォールドドメインは、プライマリおよび予約済の
フロントエンドポートの専用ペアに設定され、冗長機器を経由して、ストレージのト
ラフィックを単一障害点から保護するメカニズムとして接続されます。フォールト
ドメイン、仮想ポート、仮想ポートモードを参照してください。
Linear Tape-Open
(LTO)
標準テープフォーマットを規程したオープン規格。
10論理ユニット番号
(LUN)
論理ユニットはストレージディスクまたはディスクのセットの概念部分(サブユニッ
ト)です。各論理ユニットには、個別に識別が可能な論理ユニット番号(LUN)と呼
ばれるアドレスがあります。
LTO Linear Tape-Open を参照してください。
LTO キーグループロ
ールオーバー
EKM で、デフォルトのキーグループを使い切った時に使用するために割り当てられる
キーのセットです。
LUN 論理ユニット番号を参照してください。
MAC アドレス メディアアクセスコントロールアドレスを参照してください。
管理対象ディスク Dell Compellent Storage Center で、ディスクフォルダに割り当てられ、ストレージプー
ルに関連付けられるストレージメディアデバイス(ディスク、SSD)です。 ストレ
ージプール、ディスクフォルダを参照してください。
管理下システム 管理下システムは Dell OpenManage Server Administrator を使った監視と管理の対象と
なるシステムです。
管理 IP アドレス デバイスを監視または管理するために、IP 対応インテリジェントデバイスへの接続に
使用されるアドレスです。アドレスは、管理アプリケーションで使用する専用アド
レスとすることも、管理およびサービスアプリケーションで使用を共有することもで
きます。
管理ネットワーク オプションの管理ネットワーク。iSCSI トラフィック(ボリューム I/O)を管理トラフ
ィック(GUI および CLI セッション、その他グループ管理通信およびグループ間操作)
と分離します。
管理ステーション 1 つまたは複数の管理下システムを中央サイトからリモート管理するために使用され
るシステム。
手動リプレイ ユーザーが手動でボリュームのポイントインタイムコピーを作成できる、Dell
Compellent Storage Center の機能。
手動転送レプリケー
ション
ネットワーク経由ではなく可搬メディアを経由して行なわれるレプリケーション。
レプリケーションパートナー間のネットワークリンクが遅すぎるか、大容量データの
転送に適さない場合に使用します。
手動転送ユーティリ
ティ
Dell EqualLogic のスタンドアロンユーティリティ。ネットワークではなく可搬メディ
アを使用してボリュームのレプリケーションを実行します。このユーティリティに
はグラフィカルおよびコマンドラインの両方のユーザーインタフェースがあります。
メディアアクセスコ
ントロールアドレス
(MAC アドレス)
ネットワーク上のシステムのハードウェアに付けられた固有の番号です。
移行ボリューム Dell Compellent Storage Center のコマンド。データを 1 つのボリュームから別のボリュ
ームに移動します。
移行 EKM で、Dell Encryption Key Manager 3.0 のインストール中(インストール後ではない)
に 1 つのキーストアを既存の 1 つのキーストアに統合すること。
ミラーボリューム Compellent Storage Center のコマンド。ローカルボリュームをリモートの Dell
Compellent Storage Center にレプリケーションして、ミラーが手動で分離されるまでロ
ーカルとリモートボリュームの間でアップデートを維持します。
ミラーリング データ冗長性の一種。物理ディスクのセットにデータを保存し、1 つまたは複数のそ
の他のドライブのセットにこのデータのコピーを保存します。ミラーリング機能は
ソフトウェアから提供されます。ストライピング、RAID を参照してください。
11NAS ネットワーク接続ストレージを参照してください。
ネットワークの接続 ペルソナおよび VMRack で必要なネットワーク接続を定義するオブジェクト。たと
えば、ペルソナをネットワークに追加する場合など、ネットワークへのエレメントの
追加によってネットワーク接続が作成されます。
ネットワーク接続ス
トレージ(NAS)
NAS は、ネットワークに共有ストレージを実装するための概念の一つです。 NAS シ
ステムには、ストレージ固有のニーズに最適化された独自のオペレーティングシステ
ム、内蔵ハードウェア、およびソフトウェアが搭載されます。
NTP Network Time Protocol(ネットワークタイムプロトコル)は、パケット交換型の可変
遅延データネットワークを介してコンピュータシステム時計を同期するためのプロ
トコルです。
超過容量 シンプロビジョニングをサポートする SAN で、使用可能な容量として設定されてい
るものの、物理的には存在していないストレージの容量(つまり、設定済み容量から
使用可能な容量を引いた容量)。
パリティストライプ RAID アレイで、パリティデータを含むストライピングされたハードディスクドライ
ブ。
パーティション fdisk コマンドを使用して作成されたハードディスクドライブの物理セクション。パ
ーティションは、フォーマットコマンドを使用して複数の論理ドライブに分割できま
す。
パッシブコントロー
ラ
ホットスタンバイとして動作する、Dell AIM Controller。アクティブなコントローラに
エラーが生じた場合、環境の管理を引き継ぎます。
ピアコントローラ デュアルコントローラ型の Dell Compellent Storage Center で、ピアコントローラはリー
ダーコントローラと I/O 負荷を共有しますが、外部管理機能は実行しません。リーダ
ーコントローラに不具合が発生すると、ピアコントローラは両方のコントローラの I/
O および管理を引き継ぎます。リーダーコントローラを参照してください。
ペルソナ ディスク上でキャプチャされるサーバー環境。オペレーティングシステム、オプシ
ョンの Dell AIM エージェントソフトウェア、および Dell AIM 環境内のホスト上でのア
プリケーションの実行に必要なネットワーク設定やその他の設定です。
プール ボリュームで使用可能な SAN 内のストレージ容量。Dell Compellent Enterprise Storage
Manager および Dell Compellent Storage Center では、SAN の合計容量に等しい容量で
す。Dell EqualLogic PS シリーズアレイでは、特定のプール上のメンバーの合計容量に
等しい容量です。
プール管理者 Dell EqualLogic PS シリーズのグループ上でのアカウント。特定のプールまたはグル
ープのプールのセットに限り、オブジェクトの管理を許可されす。グループ管理者と
比較。
プライマリグループ Dell EqualLogic Group Manager 環境内で、レプリケーションパートナーシップでオリジ
ナルボリュームを持つグループ。セカンダリグループを参照。
プライマリボリュー
ム
Dell EqualLogic Group Manager 環境内で、レプリケーションパートナーへのレプリケー
ション用に設定されたボリューム。
PS シリーズアレイ 単一の Dell EqualLogic iSCSI ストレージユニット。通常は、Dell EqualLogic PS シリーズ
グループとして設定されます。複数の PS シリーズアレイをより大きな PS シリーズ
グループに参加させて、単独の iSCSI SAN として管理することができます。
PS シリーズグルー
プ
iSCSI のストレージエンティティ。単一の IP アドレス経由でアクセスしてストレージ
エリアネットワーク(SAN)として管理する、1 つまたは複数の Dell EqualLogic PS シ
リーズストレージアレイで構成されます。
12パブリックサービス Dell AIM で、アクティブなコントローラのコンソールまたは CLI への接続に使用する
コントローラサービスの仮想 IP アドレス。
RAC Remote Access Controller
RAID Redundant Array of Independent Disks を参照してください。
RAID 0 使用可能なディスク間でデータのストライピングが行なわれ、パフォーマンスを向上
します。RAID 0 はデータ冗長性を提供しません。
RAID 10 データは使用可能なディスクドライブ間でストライピングおよびミラーリングされ
て、データの可用性を提供し、パフォーマンスを向上します。ボリューム上のすべて
のデータの完全コピーを 1 つ以上維持します。RAID 10 は、最適な読み書きパフォー
マンス、複数エラーへの耐性向上、およびデータの最速復元を提供します。
RAID 5 計算で得られた循環パリティストライプを使用して、データの論理コピーを保持しま
す。パリティストライプはデータストライピングから得られます。この方法は、RAID
10 よりは冗長情報に関するオーバーヘッドは少ないですが、パリティストライプの計
算がすべての書き込みで行なわれるため、書き込みパフォーマンスは RAID 10 を下回
ります。読み取りパフォーマンスは RAID 10 とほぼ同等です。
RAID 50 RAID level 50 は、RAID level 5 と RAID level 0 を組み合わせたものです。RAID 50 には、
複数ドライブで行うパリティストライピングとディスクストライピングの両方が含
まれます。
リカバリボリューム データリカバリのために作成されるボリューム。 Dell EqualLogic PS シリーズアレイ
では、リカバリボリュームはインバウンドレプリカセットをフェイルオーバー動作の
一部として昇格させて作成します。リカバリテンプレートボリュームおよびリカバ
リシンクローンも作成することができます。 Dell Compellent Storage Center では、リプ
レイからビューボリュームが作成されます。レプリカ、ビューボリューム、リプレ
イを参照してください。
冗長性 プライマリリソースに不具合が発生した場合にセカンダリリソースがその機能を引
き継ぐことができるように、情報またはハードウェア機器コンポーネントを複製する
ことです。Dell Compellent Storage Center は、各コンポーネントに冗長性を提供し、単
一障害点が生じないようにします。シングル冗長性で、いずれか 1 つのリソースに不
具合が発生した場合にデータの損失を防ぎます。デュアル冗長性で、いずれか 2 つの
リソースに不具合が発生した場合にデータの損失を防ぎます。
RAID(Redundant
Array of Independent
Disks)
個々のディスクの冗長アレイ。データの冗長性を提供する方法です。一般的に実装
される RAID には、RAID 0、RAID 1、RAID 5、RAID 10 および RAID 50 があります。ミラ
ーリング、ストライピングを参照してください。
リモートインスタン
トリプレイ
リプレイがリモートの Dell Compellent Storage Center にレプリケーションされる、Dell
Compellent Storage Center ソリューションの機能。ローカルおよびリモートの Dell
Compellent Storage Centers はアクティブ / アクティブで、それぞれ異なる間隔で同期ま
たは非同期での双方向レプリケーションが可能です。 Dell Compellent Storage Center
のレプリケーションには、レプリケーションライセンスのある Enterprise Manager ソ
フトウェアアプリケーションが必要です。リプレイ、リモートシステム、レプリケ
ーションを参照してください。
リモートセットアッ
プウィザード(RSW)
Windows 向けホスト統合ツールをインストールした後に Dell EqualLogic PS シリーズ
アレイの設定を可能にする、グラフィカルユーザーインタフェース(GUI)。
リモートシステム Dell Compellent Storage Center で、ローカルの Dell Compellent Storage Center にあるレプ
リケーションデータをオリジナルボリュームから受信するよう設定された、独立し
た SAN。 Dell Compellent Storage Center のレプリケーションには、レプリケーションラ
13イセンスのある Enterprise Manager ソフトウェアアプリケーションが必要です。レプ
リケーションを参照してください。
リプレイ Dell Compellent Storage Center で、コピーが開始した時点のデータイメージを含む、完
全に使用可能なデータのポイントインタイムコピー(PITC)。コピーはローカルに保
存することも、リモートの Dell Compellent Storage Center に保存することもできま
す。スナップショット、Data Instant Replay、リモートインスタントリプレイを参照し
てください。
リプレイプロファイ
ル
Dell Compellent Storage Center で、リプレイのポイントインタイムコピーを取得する日
時と方法、および保存期間を決定する規則一式。リプレイを参照してください。
リプレイ領域 Dell Compellent Storage Center で、自動で予約されリプレイに使用される容量。アクテ
ィブ領域、実質領域を参照してください。
レプリケーション Dell EqualLogic PS シリーズボリュームのポイントインタイムの複製。オリジナルボ
リュームとそのレプリカは別々の Dell EqualLogic PS シリーズのグループ(レプリケー
ションパートナー)にあり、災害耐性を実現するために地理的に離れている場合があ
ります。
レプリカコレクショ
ン
Dell EqualLogic Group Manager で、ボリュームコレクションの各レプリケーションから
得られたレプリカのセット。
レプリカコレクショ
ンセット
Dell EqualLogic Group Manager で、ボリュームコレクションのためのレプリカコレクシ
ョンのセット。
レプリカ予約 Dell EqualLogic Group Manager で、特定のボリュームのレプリカセットのために確保し
ておく、複製パートナー上で委任された容量の部分。レプリカ予約はプライマリグ
ループ上のボリュームに設定しますが、実際のレプリカ予約はセカンダリグループ上
にあります。
レプリカセット Dell EqualLogic Group Manager のボリューム、テンプレートボリューム、またはクロー
ンボリュームの完全なレプリカのセット。
レプリケーション対
象システム
レプリケーションデータを 1 つまたは複数のローカルボリュームからリモートの
Storage Center へ送信するよう設定された、Dell Compellent Storage Center。レプリケー
ション、リモートシステム、リモートインスタントリプレイを参照してください。
レプリケーション ボリュームデータ(デルタのみ)をプライマリ(ローカル)SAN からセカンダリ(リ
モート)SAN にコピーする処理。必要に応じてデータをいずれかの SAN から回復で
きます。 SAN 同士の距離は無制限です。
レプリケーションパ
ートナー
別のパートナーとの間でレプリカの送受信を行うよう設定された Dell EqualLogic
Group Manager のグループ。
RSW リモートセットアップウィザードを参照してください。
実行可能ペルソナ Dell AIM において、起動後、ホストへの割り当てを待機しているネットワーク起動さ
れたペルソナ。
SAN ストレージエリアネットワークを参照してください。
SAN HeadQuarters
(SAN HQ)
単一のグラフィカルインタフェースからの Dell EqualLogic PS シリーズの複数のグル
ープの監視を実現します。パフォーマンスデータおよびその他重要なグループ情報
を収集し、フォーマットします。
SCN システム制御ネットワークを参照してください。
SCN サービス コントローラサービスの仮想 IP アドレス。Dell AIM 環境内でペルソナおよび VMRack
がアクティブコントローラと通信するために使用します。
14SCSI Small Computer System Interface を参照してください。
SDK ソフトウェア開発キットを参照してください。
セカンダリコントロ
ールモジュール
Dell EqualLogic Group Manager 環境内で、セカンダリコントロールモジュールはアクテ
ィブコントロールモジュールからのキャッシュデータをミラーリングします。アク
ティブコントロールモジュールが動作を停止した場合、セカンダリコントロールモジ
ュールがネットワーク動作を引き継ぎます。アクティブコントロールモジュールを
参照してください。
セカンダリグループ Dell EqualLogic Group Manager のレプリケーション設定で、ソースボリュームからレプ
リカを受信するグループ。プライマリグループを参照してください。
サーバークラスタ 単一のシステムとして動作する、独立したサーバーのグループ。個々のコンピュータ
ーに不具合が発生した場合に、サービスを継続的に提供します。
サービスタグ 弊社カスタマーサポートまたはテクニカルサポートにお問い合わせになる際に、コン
ピュータを識別するためのラベル。
簡易メール転送プロ
トコル(SMTP)
インターネット上のホスト間でメッセージを送信するための、メッセージフォーマッ
トおよび転送手順を定義します。
簡易ネットワーク管
理プロトコル
(SNMP)
ネットワーク管理者がリモートでワークステーションの監視および管理を行うため
の、標準インタフェースです。
シミュレータ Dell AIM SDK のコンポーネントで、コントローラ、コンソール、物理および仮想ネッ
トワークを含む実行中の Dell AIM 環境をエミュレートします。SDK を参照してくだ
さい。
Small Computer
System Interface
(SCSI)
小型コンピュータシステムインタフェース。標準ポートよりデータ転送レートが速
い I/O バスインタフェースです。
SMART Self-Monitoring Analysis and Reporting Technology(システムの自己監視分析および報告
テクノロジ)。ハードディスクドライブからシステムの BIOS へのエラーおよび不具
合のレポート、さらに画面上へのエラーメッセージの表示を行います。
スマートコピー Dell EqualLogic PS シリーズグループ内のオブジェクトの、アプリケーション整合性の
ある ASM/ME のポイントインタイムコピー。使用している Auto-Snapshot Manager の
エディションによって、スマートコピーは、スナップショット、クローン、レプリカ
のいずれかになります。
SMP 対称型マルチプロセッシングを参照してください。
SMTP 簡易メール転送プロトコル(SMTP)を参照してください。
スナップショット ボリュームのポイントインタイムコピー(PITC)です。リプレイを参照してくださ
い。
スナップショットコ
レクション
ボリュームコレクション上のスナップショット動作で得られるスナップショット一
式。ボリュームコレクションを参照してください。
snmp 簡易ネットワーク管理プロトコル(SNMP)を参照してください。
SNMP トラップコレ
クタ
Dell AIM で、コントローラサービスの仮想 IP アドレス。管理対象スイッチおよびその
他デバイスで、SNMP トラップをアクティブコントローラに送信するために使用しま
す。
15ソフトウェア開発キ
ット(SDK)
特定のソフトウェアパッケージ、ソフトウェアフレームワーク、ハードウェアプラッ
トフォーム、コンピューターシステム、ビデオゲームコンソール、オペレーティング
システムまたは同様のプラットフォーム向けのアプリケーション作成に使用する、開
発ツール一式。
容量リカバリ Windows では使用中とレポートされるものの実際には空で、Dell Compellent Storage
Center で使用可能な容量を回復するユーティリティ。
スペアディスク SAN 内の、専用または未使用のドライブ。不具合の発生したドライブを自動的に引き
継ぎます。
ストレージエリアネ
ットワーク(SAN)
ストレージエリアネットワーク(SAN)は、ブロックストレージプロトコルを使用し
てパフォーマンスと可用性の高いストレージサブシステムへのアクセスを実現する、
専用ネットワークです。SAN は、ホストサーバー内のホストバスアダプタ(HBA)、
ストレージトラフィックのルーティングに関係するスイッチ、およびディスクストレ
ージサブシステム等の特定デバイスで構成されます。SAN の主な特徴は、基本的にス
トレージサブシステムを複数のホストで同時に使用可能な点で、拡張性と柔軟性を実
現しています。NAS と比較してください。
ストレージクラスタ 信頼性、可用性、サービス性、パフォーマンスを(ロードバランシングにより)改善
するため相互接続された、Dell Compellent Storage Center の複数の SAN コントローラ。
Storage Center はアクティブ / アクティブ構成を使用して、コントローラの自動フェー
ルオーバーを提供します。各コントローラに、完全ミラーリングされバッテリでバ
ックアップされたキャッシュを搭載して、再起動時のデータ信頼性を確保し、1 台の
コントローラに不具合が発生した場合のコントローラ間でのボリュームの移行を可
能にします。
ストレージクラスタ
リング
アクティブ / アクティブ構成された複数コントローラを経由して、コントローラの自
動フェールオーバーを提供する、Dell Compellent Storage Center の機能。完全ミラーリ
ングされバッテリでバックアップされたキャッシュを搭載して、コントローラに不具
合が発生した場合の、フォールトトレランスおよび自動再起動 / リカバリが可能で
す。
ストレージプール プールを参照してください。
ストレージプロファ
イル
データを保存するドライブの種類(層)および各層で使用する RAID レベルを定義す
る、Dell Compellent Storage Center のルール一式。
ストレージタイプ 冗長性オプションやブロックサイズをはじめとする、ストレージプールの容量の割り
当ておよび保護方法を制御する、Dell Compellent Storage Center の属性一式。
ストライピング ディスクストライピングは、アレイ内の 3 つ以上のディスクにデータを書き込みます
が、各ディスクの容量の一部しか使用しません。ストライプでは、各ディスクで等
しい容量を使用します。仮想ディスクは、1 つのアレイ内の同じディスクのセットか
ら複数のストライプを使用することができます。ミラーリング、RAID も参照してく
ださい。
対称型マルチプロセ
ッシング(SMP)
高帯域幅のリンクを介して複数のプロセッサを接続し、各プロセッサが同等な立場
で I/O 処理を行うようにオペレーティングシステムによって管理する技法です。
同期 同期レプリケーションを参照してください。
同期レプリケーショ
ン
別々の物理ハードウェア内に保存された異なる 2 つのボリュームに対して、同じデー
タをアトミックに書き込んだ後、アプリケーションが I/O 完了メッセージを受信する
機能。完了、失敗にかかわらず両方の書き込みが行なわれ、両方のボリュームは常に
完全に同期されます。ただし、この機能ではアプリケーションの書き込み遅延が長く
なります。同期を参照してください。
16システム制御ネット
ワーク(SCN)
Dell AIM でコントローラ、ペルソナ、VMRack 間での通信に使用されるプライベート
ネットワーク。このネットワークは、コントローラによるサーバーの検出および、
サーバー上のペルソナと VMRack の起動にも使用されます。
セットアップユーテ
ィリティ
BIOS ベースのプログラム。システムのハードウェア設定のほか、パスワード保護な
どの機能を設定することによりシステム動作のカスタマイズを行うことができま
す。セットアップユーティリティは NVRAM に保存されているため、設定内容は変更
されるまで有効です。
Systems Deployment
Appliance
Dell KACE アプライアンスベースの、IT 担当者向け導入管理ソリューション。ディス
クイメージ作成、ユーザー状態移行、リモートサイト管理、システム修復およびリカ
バリのほか、コンピューターのインベントリスキャンとアセスメントを行うツールを
提供します。さらに、コンピューターインベントリスキャンおよびアセスメントとい
った導入前および導入後の設定タスクを自動化します。また、ディスク、BIOS およ
び RAID の設定、ソフトウェア配布、設定管理も自動化します。
システム管理アプラ
イアンス
IT 担当者向けの、Dell KACE アプライアンスベースのシステム管理ソリューション。
インベントリ管理、ソフトウェア配布、レポート、パッチ管理、資産管理、スクリプ
ト、サービスデスクサポートといったタスクを、ウェブベースのインタフェースで簡
素化します。
テンプレート Dell AIM で、他のペルソナを作成するためのクローニングが可能な、非アクティブな
ペルソナ。ただし、テンプレートへの変更を防止するため、ユーザーが実行すること
はできません。
テンプレートボリュ
ーム
シンクローンを作成する読み取り専用ボリューム。
シンクローン テンプレートボリュームと容量を共有するボリューム。シンクローンによって、大
量の共有データを持つ複数ボリュームを使用した設定向けに、ストレージ容量の効率
的な使用が可能になります。
シンプロビジョニン
グ
SAN 内の使用可能な容量をオーバープロビジョン(またはオーバーサブスクライブ)
する機能。シンプロビジョニングを使用するストレージオブジェクト(ボリューム
等)は、見込み最大サイズをアプリケーションに対してレポートしますが、実際に使
用する容量はこれを大幅に下回る場合があります。シンプロビジョニングによって、
組織全体のストレージ支出を低減し、可用性を向上して、より高いパフォーマンスを
達成できます。
階層化ストレージ すぐに必要なデータを高価で高速なメディアに保存し、ほとんど使用しないデータを
より廉価で低速なメディアに保存する、ストレージの最適化ストラテジです。
管理外容量 Dell EqualLogic PS シリーズアレイで、プライマリグループからはアクセスできなくな
っているセカンダリグループ上の委任済み容量。
アップリンクポート 別のハブまたはスイッチに接続する際に使用するネットワークハブまたはスイッチ
上のポート。クロスオーバーケーブルを必要としません。
空にする Dell EqualLogic Group Manager で、メンバーがまだオンライン中にグループから削除す
ること。
ビューボリューム データのリカバリを主な目的として以前のリプレイから作成された、Dell Compellent
Storage Center の読み取り専用ボリューム。リプレイを参照してください。
仮想ポートまたは仮
想ポートモード
Dell Compellent Storage Center で、仮想ポートは予約済みポートを不要にします。仮想
ポートモードでの動作時、すべてのフロントエンドポートは I/O を受け取り、フォー
ルトドメインの一部を構成することができます。仮想ポートの有効化の詳細につい
ては、『Dell Compellent Storage Center System Setup Guide』を参照してください。
17仮想ワールドワイド
ポート名(vWWPM)
SAN 起動のペルソナを作成するために Dell AIM で使用される、仮想ワールドワイドポ
ート名。
仮想化 ソフトウェアを使用して、単一のコンピュータまたはストレージデバイスのリソース
を複数環境で共有する機能。単一の物理システムまたはデバイスが、ユーザー側に
は複数のオペレーティングシステムをホスト可能な複数の仮想システムに見える場
合があります。
VMRack エージェントソフトウェアと Red Hat Xen、VMware ESX、Microsoft Hyper-V のいずれか
を組み合わせて実行している、サーバー上の仮想マシン(VM)のラック。
ボリューム 1 つまたは複数のストレージデバイスにストライピングされたストレージのディスク
リートユニット。
ボリュームコレクシ
ョン
各種動作を同時に実行する目的でグループ化された多数のボリューム。スナップシ
ョットコレクション、レプリカコレクションを参照してください。
ボリューム予約 空きプール容量からボリュームに割り当てられた容量。シンプロビジョニングなし
で、ボリューム予約はレポートされたサイズと同じです。
ボリュームタイプ Dell Compellent Storage Center で、ボリュームタイプは、動的、リプレイ有効、レプリ
ケーション、のいずれかです。ボリュームは、そのボリュームで 1 つ以上のリプレイ
が取得されるまで、動的です。ボリュームからリプレイが取得されると、リプレイ有
効になります。レプリケーションボリュームは、別の Dell Compellent Storage Center シ
ステムにレプリケーションされたボリュームです。
vRack Dell AIM で、仮想スイッチ(vRack スイッチ)に接続されたホストの論理グループ。
vRack スイッチ Dell AIM で、vRack 内でホストを接続する仮想スイッチ。
vWWPN 仮想ワールドワイドポート名(vWWPM)を参照してください。
18Dell 용어집 – 버전 2
용어집용어집
ACPI 고급구성및전원인터페이스(Advanced Configuration and Power Interface)를참조
하십시오.
활성 제어 모듈 이중제어모듈배열의 Dell EqualLogic PS 시리즈배열의경우네트워크의 I/O를적
극적으로서비스하는제어모드입니다. 만일작동을멈추면장애조치로보조제
어모드가작동합니다. 보조제어모드를참조하십시오.
활성 컨트롤러 Dell AIM 환경을적극적으로관리하는 Dell AIM 컨트롤러입니다.
활성 공간 Dell Compellent Storage Center 에서 Replay를제외하고볼륨에의해사용되는공간
입니다여기에는 RAID 오버헤드가포함되지않습니다. Replay 를참조하십시오.
실제 공간 Dell Compellent Storage Center 에서활성공간에볼륨의 Replay 공간을더한공간입
니다. 활성공간(Active space), Replay 공간을참조하십시오.
고급 구성 및 전원 인터페
이스(Advanced
Configuration and Power
Interface)
운영체제가구성및전원을관리할수있도록하는표준인터페이스입니다.
에이전트 Dell AIM 환경(Red Hat Xen 및 Microsoft Hyper-V 그리고페르소나)에서컨트롤러가
요소를관리하고네트워킹속성을구성하는데사용하는요소에설치된선택적소
프트웨어입니다.
에이전트 없는 페르소나 Dell AIM 에이전트가설치되어있지않은 Dell AIM 페르소나입니다.
주변 온도 시스템이위치한환경또는실내온도입니다.
배열 멤버 PS 시리즈그룹에구성된 Dell EqualLogic PS 시리즈배열입니다. 그룹에는멤버가
여러개있을수있습니다.
배열 일련 번호 Dell EqualLogic PS 시리즈배열환경에서배열의하드웨어에인코딩된고유한 Dell
EqualLogic PS 시리즈배열식별문자열입니다. 서비스태그를참조하십시오.
ASM/ME Auto-Snapshot Manager/Microsoft Edition 을참조하십시오.
ASM/VE Auto-Snapshot Manager/VMware Edition을참조하십시오.
자산 관리 어플라이언스
(Asset Management
Appliance)
소프트웨어및라이센스준수를추적하는 IT 전문가를위한 Dell KACE 장치기반자
산관리솔루션입니다. 웹기반대시보드를통해인벤토리, 소프트웨어자산, 버전,
업그레이드및컴퓨터의관리를자동화합니다.
자산 태그 시스템에할당된개별코드로대개관리자가보안이나추적목적으로사용합니다.
할당된 디스크 Dell Compellent Storage Center 에서관리형으로만들고볼륨과 Replay를저장하는
데사용하기위해디스크폴더에할당된물리적스토리지매체입니다. 디스크폴
더, 스토리지풀을참조하십시오.
할당 모드 페르소나와 VMRack이호스트에서 HBA의가용성을기반으로호스트에할당되는
방법을제어하는메커니즘입니다. HBA를참조하십시오.
비동기/비동기 복제 로컬스토리지에데이터를쓴후에원격 SAN 에저장하기위해해당데이터를대
기시키는프로세스입니다. 쓰기가수행되기전에로컬 SAN이실패하면복제도실
패할수있습니다. 복제, 동기복제, Remote Instant Replay 를참조하십시오.
3자동 RAID 구성 Dell EqualLogic PS 시리즈그룹컨텍스트에서사용자가선택한 RAID 정책을배열에
구성하는내부프로세스입니다.
ASM/ME(Auto-Snapshot
Manager/Microsoft Edition)
스마트사본을관리할수있는 Microsoft Management Console 용스냅인콘솔어플
리케이션입니다.
ASM/VE(Auto-Snapshot
Manager/VMware Edition)
스마트사본을관리할수있도록 VMware 가상환경과작동하는웹기반어플리케
이션입니다.
사용 가능한 공간 모든드라이브에서사용가능한전체스토리지의크기입니다.
백 엔드 Dell Compellent Storage Center 에서컨트롤러나스토리지클러스터(예: 중복되는
컨트롤러쌍)를로컬디스크인클로저에연결하는고립된전용네트워크입니다.
백 엔드 네트워크 Dell Compellent Storage Center 컨트롤러입니다.
기준 볼륨(Dell EqualLogic
PS 시리즈)
컴퓨터에장착되며 Windows 기반드라이브문자(예: G:) 또는장착지점을통해연
결할수있는볼륨입니다.
기준 볼륨(Dell EqualLogic
Group Manager)
스냅샷이있는볼륨입니다. 스냅샷은기준볼륨에의존합니다. 기본볼륨이폐기
되면스냅샷이제거됩니다.
BMC(Baseboard
Management Controller)
IPMI(Intelligent Platform Management Interface) 프로토콜을구현하는서버관리모
듈입니다. Dell AIM 컨텍스트에서이컨트롤러는 BMC 를사용하여서버의일부모
델을원격으로제어합니다.
블레이드 Dell AIM SDK의경우블레이드는호스트슈퍼클래스의요소입니다. Dell 모듈러
시스템의경우에는블레이드가인클로저에장착되는모듈식서버를말합니다.
BMC Baseboard Management Controller 를참조하십시오.
부팅 가능한 매체 시스템이하드드라이브에서부팅되지않은경우시스템을시작하는데사용되는
CD, 디스켓또는 USB 메모리키입니다.
캐시 데이터를빨리검색하기위해데이터또는명령의사본을보관하는고속스토리지
영역입니다.
CHA Compellent Host Adapter 를참조하십시오.
CHAP(Challenge Handshake
Authentication Protocol)
암호화된도전-응답메커니즘을사용하는네트워크로그인프로토콜, 즉 Challenge
Handshake Authentication Protocol입니다. 볼륨에대한액세스와올바른계정이름
과암호를공급하는호스트에대한스냅샷을제한하는데사용됩니다 CHAP 는로
그인/관리자계정에도사용됩니다.
채널 Dell/AIM 환경에서스위치포트에할당하고최대 8 개의물리적 NIC 를사용하여페
르소나에연결할수있는 8개물리적연결중하나입니다. 트래픽에대해한두개
의채널만선호하도록네트워크를구성할수있는데, 이렇게하면선호하는채널
이실패할경우트래픽이다른채널로투명하게재전송됩니다.
CHAP Challenge Handshake Authentication Protocol 을참조하십시오.
섀시 스위치 Dell AIM 컨텍스트에서섀시의베이에있는이더넷스위치입니다. 섀시스위치는
컨트롤러에의해관리됩니다.
클라이언트 장치 통신 인
증서
EKM 컨텍스트에서클라이언트가서버와통신할수있게해주는특수화된암호화
키입니다.
클러스터 노드 서버클러스터의호스트또는스토리지클러스터의 SAN 과같은리소스클러스터
의물리적멤버입니다.
4컬렉션 ASM/ME 에서컬렉션은볼륨, 스냅샷또는어플리케이션구성요소같은스토리지
개체의관련그룹이며컬렉션마스터노드아래의 ASM 콘솔트리에서노드로표
현됩니다. Dell EqualLogic Group Manager에서볼륨및레플리카컬렉션과사용자
지정스냅샷컬렉션은볼륨보기아래의계층구조에나타납니다.
CHA(Compellent Host
Adapter)
각 Dell Compellent Storage Center 컨트롤러에장착된내부캐시카드/배터리입니
다. 쓰기캐시메모리는캐시카드로미러링됩니다. 이중컨트롤러 Dell Compellent
Storage Center에서컨트롤러 1 캐시카드가컨트롤러 2의미러를보유하고, 컨트
롤러 2 캐시카드가컨트롤러 1 의미러를보유합니다. 단일컨트롤러 Dell
Compellent Storage Center에서는캐시카드가단일컨트롤러의미러를보유합니
다.
구성 Dell AIM 환경의전체콘텐츠와구성을설명하는데이터베이스입니다.
절전 모드 Dell Compellent Storage Center 에서남은여유공간이심각한임계값(보통 10%, 최
대 32GB)으로떨어지면도달하는데이터보존모드입니다. 절전모드에서 Dell
Compellent Storage Center 는알림을생성하고새볼륨을생성하지못하도록막으
며여유공간을마련하기위해더빠른속도로 Replay 만료를시작합니다. 응급모
드를참조하십시오.
콘솔 Dell AIM 환경의요소를모니터링하고이와작업하기위해사용하는웹기반사용
자인터페이스입니다. Dell AIM 콘솔은 Dell AIM 컨트롤러에의해호스팅됩니다.
제어 모듈 Dell EqualLogic PS 시리즈배열에서물리적프로세서및인터페이스구성요소입니
다. 제어모듈에는플래시메모리로 Dell EqualLogic PS 시리지펌웨어가포함되어
있으며, 캐시메모리에서정렬된데이터의일시적인전원지속이제공됩니다. 여
러개의네트워크인터페이스와선택적인직렬포트가있습니다. 배열에는핫스
왑가능한이중중복컨트롤러 2개가포함될수있습니다. 활성제어모듈은 I/O를
지원하는반면보조제어모듈은해당캐시에있는데이터를미러링합니다.
제어판 전원단추및전원표시등과같은표시등과제어부가있는시스템의한부분입니
다.
컨트롤 포트 iSCSI 이니시에이터(서버)가스토리지요청을위해연결하는대상 iSCSI 포트입니
다. 가상포트모드를위해구성된 Dell Compellent Storage Center에서는 iSCSI 트래
픽을해당가상포트로리디렉션하기위해각 iSCSI 오류도메인에대해제어포트
가생성됩니다.
컨트롤러(Dell AIM) 물리적및가상하드웨어, 소프트웨어, 네트워크구성을관리하고 Dell AIM 콘솔을
호스팅하는소프트웨어입니다. 장애복구형컨트롤러쌍의컨텍스트에서각컨트
롤러는전용서버에서실행되지만공유된파일시스템에서구성데이터베이스와
기타키파일을공유합니다.
컨트롤러(Dell Compellent) 디스크집계(RAID), I/O 라우팅, 오류감지및데이터복구를제공합니다. 전체 Dell
Compellent Storage Center 하위시스템에지능적인기능을제공합니다. 모든
Storage Center 시스템에최소하나씩포함되어있습니다. 시스템의성능과가용성
을개선하기위한수정조치를제안합니다.
컨트롤러 서비스 Dell AIM 컨텍스트에서컨트롤러가 SCN(System Control Network), 관리형스위치, 콘
솔및 CLI 등과통신을위해사용하는가상 IP 주소입니다. 기본적으로활성컨트롤
러에있는단일가상 IP 주소이지만 SCN 서비스와 SNMP Trap Collector 같은서비스
에대해고유한주소를지정할수있습니다.
5Copilot 서비스 Dell Compellent Storage Center 내에서시스템을사전에모니터링하고시스템의성
능및가용성을향상시키기위한수정조치를제안하는집중화된지원, 제품교육
및판매리소스의조합입니다.
복사-미러링-마이그레이
션
볼륨을다른디스크유형및 RAID 레벨간에마이그레이션할수있는 Dell
Compellent Storage Center 기능입니다.
자격 증명 저장소 EKM 컨텍스트에서세션전체의자격증명정보를보관하는저장소입니다. 자격증
명정보는사용자이름, 암호, 인증서같은보안데이터입니다.
암호화 개체 데이터를안전하게보호하는방법입니다.
Data Collector 서버의배경에서실행되어서버에연결된모든 Storage Center 시스템의정보를수
집하는 Dell Compellent Enterprise Manager 구성요소입니다.
Data Instant Replay 로컬 SAN 에서정의된간격으로공간효율적인볼륨의 PITC(Point-In-Time Copy)를
캡처하는 Dell Compellent Storage Center 기능으로, 볼륨을이전시점으로롤백할수
있는기능을제공합니다. Replay, 스냅샷을참조하십시오.
Data Progression(데이터
진행률)
I/O 활동수준(수요)을기반으로데이터페이지를성능이보다높거나낮은장치로
자동마이그레이션하는 Dell Compellent Storage Center 기능입니다. 계층식스토리
지를참조하십시오.
DDR 더블데이터속도를참조하십시오.
위임된 공간 Dell EqualLogic Group Manager 컨텍스트에서파트너에대해수신된레플리카를저
장하기위해따로설정된공간입니다.
Dell EKM(Encryption Key
Manager)
Dell EKM(Encryption Key Manager)은 Dell 테이프자동화솔루션을위해암호화키를
관리하여 LTO 테이프카트리지에저장된데이터를보호합니다.
DRAC(Dell Remote Access
Controller)
대역외(OOB) 관리기능을제공하는인터페이스카드입니다. 컨트롤러에는고유한
프로세서, 메모리, 네트워크연결및시스템버스에대한액세스권한이있으며, 시
스템관리자가네트워크전체에서원격으로시스템을제어할수있게허용합니
다.
장치 드라이버 운영체제또는일부다른프로그램이주변장치와올바르게통신할수있도록하
는프로그램입니다.
DHCP 동적호스트구성프로토콜을참조하십시오.
디지털 다목적 디스크 디지털다목적디스크또는디지털비디오디스크(DVD)입니다.
디스크 폴더 Dell Compellent Storage Center 에서사용자가보고관리할수있는물리적스토리지
매체장치(디스크, SSD)입니다. 디스크폴더는볼륨스토리지공간이할당되는스
토리지풀을결정합니다. 디스크폴더를여러개의스토리지풀에연결할수있기
는하지만 Dell Compellent Storage Center 성능은모든디스크를같은폴더와스토리
지풀에할당할경우에극대화됩니다.
디스크 위치 Dell Compellent Storage Center 에서해당인클로저안에서행-열표기법을따르는
디스크드라이브의슬롯위치입니다. 예를들어, 디스크위치 01-02 는맨위에서첫
번째행, 왼쪽에서두번째열에있는슬롯을나타냅니다.
DNS 도메인이름시스템을참조하십시오.
도메인 이름 시스템(DNS) www.example.com 과같은인터넷도메인이름을 208.77.188.166 과같은 IP 주소로
변환하는방식입니다.
6휴면 페르소나(dormant
Persona)
AIM 환경의호스트에서현재실행중이지않은(또는실행을기다리는) 페르소나입
니다.
더블 데이터 속도(DDR) 한클럭주기의상승펄스및하강펄스모두에서데이터를전송하여데이터속도
를두배로늘릴수있는메모리모듈기술입니다.
DRAC Dell 원격액세스컨트롤러를참조하십시오.
DRAM 동적임의접근메모리를참조하십시오.
이중 중복 Dell Compellent Storage Center 에서일반적으로 RAID 10 및/또는 RAID 6 을사용하여
임의의두드라이브를손실로부터보호하기위한스토리지프로파일옵션입니다.
DVD 디지털다목적디스크를참조하십시오.
동적 호스트 구성 프로토
콜(DHCP)
클라이언트시스템에 IP 주소를자동으로할당하는방식입니다.
동적 임의 접근 메모리
(DRAM)
일반적으로시스템의 RAM은모두 DRAM 칩으로구성되어있습니다.
EKM Dell Encryption Key Manager를참조하십시오.
EKM 관리자 EKM 컨텍스트에서사용자와그룹을만들거나삭제할수있는슈퍼사용자입니다.
EKM Encryption
Manager(tklmadmin)
EKM 컨텍스트에서키와장치를만들거나삭제하는일일사용자입니다.
응급 모드 Dell Compellent Storage Center 에서여유공간이없기때문에시스템이더이상작
동할수없을때도달하는모드입니다. 응급모드에서는모든서버 I/O 가거부되고
모든볼륨이오프라인상태가되며, 충분한공간이마련되어응급모드에서나갈
수있을때까지온라인상태로되돌릴수없습니다절전모드를참조하십시오.
인클로저 복수의디스크에단일인터페이스, 전력, 냉각을제공하는물리적인클로저입니
다.
환경 Dell AIM 컨텍스트에서 Dell AIM 컨트롤러가관리하는하드웨어, 소프트웨어및네
트워크구성의모음입니다.
Eth0 이더넷포트 0 을참조하십시오.
Eth1 이더넷포트 1 을참조하십시오.
이더넷 포트 0(Eth0) Dell Compellent Storage Center 에서 Eth0은관리전용의이더넷인터페이스입니다.
이더넷 포트 1(Eth1) Dell Compellent Storage Center 에서 Eth1은클러스터링이나원격복제를위해컨트
롤러사이의내부프로세스통신을전담하는이더넷인터페이스입니다.
외부 네트워크 Dell AIM 환경컨텍스트에서 Dell AIM 환경에속하지는않지만물리적및논리적으
로연결되어있는네트워크입니다.
외부 스위치 Dell AIM 환경컨텍스트에서 Dell AIM 환경에속하지는않지만물리적및논리적으
로연결되어있는스위치입니다.
패브릭 통합라우팅인프라역할을하는상호연결된스위치모음입니다. SAN 에서장치
사이에여러연결을허용하며새장치가드러나지않게진입하도록허용합니다.
최소하나의스위치가있는 FC(또는 iSCSI) 토폴로지가네트워크에있습니다.
고속 트랙 가장활성화된데이터를트랙의바깥쪽(고속) 디스크트랙에동적으로위치시키는
선택적인 Dell Compellent Storage Center 유틸리티입니다.
7FAT 파일할당테이블을참조하십시오.
오류 도메인 Dell Compellent Storage Center 환경에서오류도메인은장애조치집합을식별합니
다. 가상포트모드에서모든프런트엔드포트는하나의오류도메인에속할수있
습니다. 레거시모드에서는기본및예비포트가각각하나의오류도메인을만듭
니다.
FC 광학채널을참조하십시오.
FE 프런트엔드네트워크를참조하십시오.
광학 채널(FC) 서버를컨트롤러와백엔드디스크에연결하는데사용되는고속상호연결입니
다. FC 구성요소에는 HBA, 허브, 스위치및케이블배선이포함됩니다. FC 는또한
최고초당 10 기가비트의데이터전송속도를허용하는고속전양방직렬통신프
로토콜을말합니다.
파일 할당 테이블(FAT) 파일스토리지를구성하고추적하기위해 MS-DOS에서사용하는파일시스템구
조입니다. Microsoft Windows 운영체제는선택적으로 FAT 파일시스템구조를사
용할수있습니다.
파일 전송 프로토콜(FTP) 머신또는호스트사이의대용량데이터파일전송에사용되는어플리케이션레이
어프로토콜입니다.
프런트 엔드 네트워크(FE) Dell Compellent Storage Center SAN 데이터쓰기흐름(서버-스위치-컨트롤러-디스
크) 데이터쓰기를시작하는구성요소입니다. 일반적으로서버(또는스위치)는컨
트롤러의프런트엔드입니다. 그러나데이터를원격시스템으로복제하는 Storage
Center 시스템은원격시스템의프런트엔드입니다. 백엔드를참조하십시오.
FTP 파일전송프로토콜을참조하십시오.
GB 기가바이트를참조하십시오.
기가바이트(GB) 1024 메가바이트또는 1,073,741,824 바이트입니다. 그러나하드드라이브용량을가
리킬때에이용어는보통 1,000,000,000 바이트로반올림됩니다.
그룹 PS 시리즈그룹을참조하십시오.
HBA 호스트버스어댑터입니다.
HIT/LE Linux 용 Host Integration Tools 를참조하십시오.
HIT/ME Windows 용 Host Integration Tools 를참조하십시오.
HIT/VM VMware 용 Host Integration Tools 를참조하십시오.
호스트 Dell AIM 환경에서호스트는물리적서버(랙장착또는블레이드) 또는가상머신일
수있습니다. Dell AIM SDK 에서블레이드서버, 랙장착서버및가상머신(VM)을
포함하는슈퍼클래스입니다.
호스트 어댑터 시스템버스와주변장치(일반적으로스토리지장치) 간의통신기능을제공하는
컨트롤러입니다.
호스트 버스 어댑터(HBA) 서버를 SAN(Storage Area Network)에연결하는장치또는일반적으로추가기능입
니다. 각 HBA는 SAN 에서해당 WWPN(World Wide Port Number)에의해고유하게
식별됩니다. 일반적인 HBA 유형에는광학채널과 iSCSI가포함됩니다.
Linux용 Host Integration
Tools(HIT/LE)
ESX 시스템과 Dell EqualLogic PS 시리즈스토리지배열을통합하는도구집합입니
다. Auto Snapshot Manager/VMware Edition(ASM/VE), EqualLogic Datastore Manager
및 EqualLogic Virtual Desktop Deployment Utility를포함합니다.
8Windows 용 Host
Integration Tools(HIT/ME)
배열을구성하고관리할수있는어플리케이션집합입니다. ASM/ME, DSM(다중경
로 I/O Device Specific Module) 및 RSW(원격설정마법사)를포함합니다.
VMware용 Host Integration
Tools(HIT/VM)
Linux 시스템을 Dell EqualLogic PS 시리즈스토리지배열과통합하는도구집합입
니다. 원격설정마법사명령행인터페이스(RSWCLI), EqualLogic Host Performance
and Configuration Tuning Suite(eqltune) 및 EqualLogic Log Gathering Facility(eqllog)를
포함합니다.
핫 스페어 디스크 Dell Compellent Storage Center 환경에서핫스페어디스크는백업디스크입니다. 활
성배열이실패할경우컨트롤러는핫스페어를활성배열의일부로만들고신속
하게데이터를다시구축합니다. 핫스페어가사용자의간섭없이활성디스크가
되기는하지만실패한드라이브를가능한빨리교체해야만새핫스페어로배열이
다시보호됩니다. 핫스페어는여러개의디스크인클로저를스팬할수있습니다.
Storage Center 핫스페어에의용량은교체되는데이터드라이브와다릅니다.
핫 플러그 시스템의전원이켜져서실행중일때일반적으로하드드라이브또는내부냉각
팬등의장치를호스트시스템에설치또는삽입하는기능입니다.
핫 스왑 핫플러그를참조하십시오.
I/O 입/출력입니다. 키보드는입력장치이고모니터는출력장치입니다. 일반적으로 I/
O 기능은컴퓨팅동작과구분될수있습니다.
ID Dell AIM 환경에서요소가환경에추가되었을때할당되는요소의고유식별자입
니다.
iDRAC 통합 Dell 원격액세스컨트롤러를참조하십시오.
IKEv2-SCSI 인증서생성에사용되는프로토콜입니다.
이미지 Dell AIM 에서컨트롤러가특정유형의호스트에이미지를부팅하는데사용하는
정보와함께페르소나나 VMRack이부팅되는디스크나스토리지배열에저장되
는실제비트입니다. 동일한페르소나를물리적서버나가상머신에서부팅할수
있도록두개이상의이미지로페르소나또는 VMRack을구성할수있습니다.
infiniBand InfiniBand 는프로세서와고속주변장치사이의연결을위한지점간양방향직렬
링크를제공합니다.
Instant Replay Data Instant Replay를참조하십시오.
통합 Dell 원격 액세스 컨
트롤러(iDRAC)
인터넷 SCSI 프로토콜을사용하는원격액세스컨트롤러입니다.
IPMI(Intelligent Platform
Management Interface)
일부서버에서관리모듈에의해구현되는프로토콜로, 원격으로서버를제어하는
데사용됩니다. Dell 서버의블레이드는 iPMI를구현합니다.
상호 연결 스위치 Dell AIM 환경의스위치로, 컨트롤러에의해관리되며섀시, vRack, 기타상호연결
스위치및외부스위치같은요소를상호연결하는데사용합니다.
인터넷 SCSI(iSCSI) 인터넷 SCSI(SCSI 참조)입니다. IP 네트워크에서클라이언트서버(iSCSI 이니시에
이터)와네트워크스토리지장치(iSCSI 대상) 간의통신을위한표준 SCSI 명령을
압축하는프로토콜입니다.
IPMI 인텔리전트플랫폼관리인터페이스를참조하십시오.
iSCSI 인터넷 SCSI 를참조하십시오.
KMIP(Key Management
Interoperability Protocol)
엔터프라이즈키관리시스템과암호화시스템간의통신을위해설정된표준입니
다.
9Key Serving Port EKM 에서통신하기위해운영체제에서사용되는포트입니다.
키 그룹 EKM 에서특정부서, 영역또는하드웨어유형에할당되는일련의키입니다.
키 EKM 의데이터를보호하는데사용되는암호화된인증서입니다.
키 스토어 / 키 그룹 /마스
터 키 스토어
EKM 에서암호화된키그룹입니다.
KMIP KMIP(Key Management Interoperability Protocol)를참조하십시오.
JDBC(Java Database
Connectivity)
클라이언트가데이터베이스에서데이터에액세스하고쿼리및업데이트하는방
법을정의하는 Java 프로그래밍언어의 API입니다.
JDBC Java Database Connectivity를참조하십시오.
리더 컨트롤러 이중컨트롤러 Dell Compellent Storage Center 의기본컨트롤러입니다. 보통리더
및피어컨트롤러는스토리지 I/O 로드를공유하며, 근본적으로처리량이두배가
되지만리더컨트롤러만외부관리기능을수행합니다. 컨트롤러하나가실패하면
나머지컨트롤러가리더가되거나리더로남아있으며두컨트롤러의역할을모두
수행합니다. 피어컨트롤러를참조하십시오.
레거시 모드 Dell Compellent Storage Center 에서오류도메인은기본및예비프런트엔드포트
의쌍을전담하도록구성되며, 단일오류지점에대한스토리지트래픽을보호하
기위한메커니즘으로중복장비를통해연결됩니다. 오류도메인, 가상포트또는
가상포트모드를참조하십시오.
LTO(Linear Tape-Open) 개방형표준테이프형식입니다.
LUN(Logical Unit Unmber) 논리적단위는스토리지디스크나일련의디스크에서개념적부분(하위단위)입니
다. 각논리적단위에는 LUN(Logical Unit Unmber)이라는주소가있으며, 이주소를
통해논리적단위를고유하게식별할수있습니다.
LTO Linear Tape-Open을참조하십시오.
LTO Key Group Rollover EKM 에서기본키그룹이대폭줄어들었을때사용하도록할당되는일련의키입니
다.
LUN Logical Unit Number 를참조하십시오.
MAC 주소 MAC(Media Access Control) 주소를참조하십시오.
관리형 디스크 Dell Compellent Storage Center 에서스토리지풀과연결하기위해디스크폴더에할
당된스토리지매체장치(디스크, SSD)입니다. 스토리지풀, 디스크폴더를참조하
십시오.
관리 시스템 관리시스템은 Dell OpenManage Server Administrator 를사용하여모니터링및관리
되는시스템입니다.
관리 IP 주소 인텔리전트 IP 활성장치를모니터링하거나관리하기위해이장치에연결하는데
사용하는주소입니다. 주소는관리어플리케이션에의해독점사용되도록관리및
서비스어플리케이션에서공유되도록설정할수있습니다.
관리 네트워크 iSCSI 트래픽(볼륨 I/O)을관리트래픽(GUI 및 CLI 세션, 기타그룹관리통신및내부
그룹작업)에서분리하는선택적관리네트워크입니다.
관리 스테이션 중앙위치에서하나이상의관리되는시스템을원격으로관리하는데사용되는시
스템입니다.
10수동 Replay 사용자가수동으로볼륨의특정시점을생성할수있는 Dell Compellent Storage
Center 기능입니다.
수동 전송 복제 네트워크를통하는대신전송가능한매체를통해수행되는복제입니다. 복제파
트너사이의네트워크링크가너무느리거나크기가큰데이터를전송하는데적
합하지않을경우에사용됩니다.
수동 전송 유틸리티 네트워크대신전송가능한미디를사용하여볼륨복제를수행하는 Dell EqualLogic
의독립실행형유틸리티입니다. 유틸리티에는그래픽및명령행사용자인터페이
스가모두있습니다.
MAC(매체 접근 제어) 주소 네트워크상에서시스템의고유하드웨어번호입니다.
볼륨 마이그레이션 볼륨사이에서데이터를이동하기위한 Dell Compellent Storage Center 명령입니다.
마이그레이션 EKM 컨텍스트에서 Dell Encryption Key Manager 3.0 설치중(이후아님)에키스토어
를기존키스토어로결합하는것입니다.
볼륨 미러링 로컬볼륨을원격 Dell Compellent Storage Center 명령으로복제하고미러링이수동
으로해제될때까지로컬및원격볼륨사이의업데이트를유지하기위한 Dell
Compellent Storage Center 명령입니다.
미러링 물리적드라이브집합이데이터를저장하고하나이상의추가드라이브집합이데
이터를복사하는데이터중복유형입니다. 미러링기능은소프트웨어에의해제공
됩니다. 스트라이핑, RAID를참조하십시오.
NAS 네트워크연결스토리지를참조하십시오.
네트워크 연결 페르소나및 VMRack의필수네트워크연결을정의하는개체입니다. 네트워크연
결은네트워크에요소를추가하여생성됩니다(예: 네트워크에페르소나를추가할
경우).
네트워크 연결 스토리지
(NAS)
NAS 는네트워크에서공유된스토리지를구현하는데사용되는개념중하나입니
다. NAS 시스템에는고유한운영체제와특정스토리지요구를충족하도록최적화
된통합하드웨어와소프트웨어가있습니다.
NTP NTP(Network Time Protocol)는패킷변경된변수지연기간데이터네트워크전반에
컴퓨터시계를동기화하기위한프로토콜입니다.
사용 초과된 공간 씬프로비저닝을지원하는 SAN 에서스토리지공간의크기는실제존재하는것이
아닌사용할수있는공간의크기로구성됩니다(예: 구성된공간 - 사용가능한공
간).
패리티 스트라이프 RAID 배열에서패리티데이터가포함되어있는스트라이프핑된하드드라이브입
니다.
파티션 fdisk 명령을사용하여생성되는하드드라이브의물리적섹션입니다. 이후 format
명령을사용하여파티션을여러개의논리적드라이브로나눌수있습니다.
수동 컨트롤러 핫대기역할을하는 Dell AIM 컨트롤러로, 활성컨트롤러가실패할경우환경관리
를담당할수있습니다.
피어 컨트롤러 이중컨트롤러 Dell Compellent Storage Center 에서피어컨트롤러는리더컨트롤러
와 I/O 로드를공유하지만외부관리기능을수행하지않습니다. 리더컨트롤러가
실패하면피어컨트롤러가두컨트롤러모두에서 I/O 및관리역할을수행합니
다. 리더컨트롤러를참조하십시오.
11페르소나(persona) 디스크에서캡처한서버환경으로, Dell AIM 환경에서어플리케이션을실행하는
데필요한운영체제, 선택적 Dell AIM 에이전트소프트웨어, 네트워크및기타설
정입니다.
풀 볼륨에서사용할수있도록제공되는 SAN의스토리지공간입니다. Dell Compellent
Enterprise 스토리지관리자및 Dell Compellent Storage Center에서는 SAN의총공
간과같습니다. Dell EqualLogic PS 시리즈배열에서는특정풀의멤버에대한총공
간과같습니다.
풀 관리자 특정풀에서만또는그룹의풀집합에서개체를관리할수있는권한이있는 Dell
EqualLogic PS 시리즈그룹의계정입니다. 그룹관리자와비교해보십시오.
기본 그룹 Dell EqualLogic Group Manager 환경내에서복제파트너십의원래볼륨을포함하는
그룹입니다. 보조그룹을참조하십시오.
기본 볼륨 Dell EqualLogic Group Manager 환경내에서복제파트너에대한복제를위해구성
된볼륨입니다.
PS 시리즈 배열 일반적으로 Dell EqualLogic PS 시리즈그룹으로구성되는단일 Dell EqualLogic
iSCSI 스토리지단위입니다. 여러개의 PS 시리즈배열을더큰 PS 시리즈그룹으로
결합하고이를하나의 iSCSI SAN 으로관리할수있습니다.
PS 시리즈 그룹 하나이상의 Dell EqualLogic PS 시리즈스토리지배열으로구성된 iSCSI 스토리지
엔티티로, 단일 IP 주소를통해액세스하고 SAN(Storage Area Network)으로관리할
수있습니다.
공용 서비스 Dell AIM 컨텍스트에서콘솔이나활성컨트롤러의 CLI에연결하는데사용하는컨
트롤러서비스가상 IP 주소입니다.
RAC 원격액세스컨트롤러입니다.
RAID 독립디스크중복배열을참조하십시오.
RAID 0 데이터가사용가능한디스크전체에서스트라이핑되어성능이향상됩니다. RAID
0 은데이터중복을제공하지않습니다.
RAID 10 데이터가사용가능한디스크드라이브와미러링된드라이브전체에서스트라이
핑되어데이터가용성과성능이향상됩니다. 볼륨에서모든데이터의전체사본을
최소하나유지합니다. RAID 10 은최적의읽기/쓰기성능을제공하며다중오류에
대한극복가능성이향상되며데이터를빠른속도로복원할수있습니다.
RAID 5 수학적으로파생된회전패리티스트라이프를사용하여데이터의논리적사본을
유지합니다. 패리티스트라이프는데이터스트라이프에서파생됩니다. 이방법은
RAID 10 에비해중복정보에대한오버헤드를줄여주지만매번쓸때마다패리티
스트라이프계산으로인해 RAID 10 보다쓰기속도가느립니다. 읽기속도는 RAID
10 과비슷합니다.
RAID 50 RAID 레벨 50 은 RAID 레벨 5 및 RAID 레벨 0 의조합입니다. RAID 50에는여러개의
드라이브에서패리티와디스크스트라이핑이모두포함됩니다.
복구 볼륨 데이터복구를목적으로생성된볼륨입니다. Dell EqualLogic PS 시리즈배열에서
복구볼륨은인바운드레플리카집합을장애조치작업의일부로승격하여생성됩
니다. 또한복구템플릿볼륨과복구씬클론도생성할수있습니다. Dell Compellent
Storage Center 에서뷰볼륨은 Replay에서생성됩니다. 레플리카, 뷰볼륨, Replay
를참조하십시오.
12중복성 기본리소스가실패할경우보조리소스가해당기능을맡도록하는정보의또는
하드웨어장비구성요소의중복입니다. Dell Compellent Storage Center 는단일오
류지점이없도록하기위해각구성요소에대해중복성을제공합니다. 단일중복
성은하나의리소스가실패할경우데이터손실을방지합니다. 이중중복성은두
개의리소스가실패할경우데이터손실을방지합니다.
독립 디스크 중복 배열
(RAID).
독립디스크의중복배열입니다. 데이터중복성을제공하는방법입니다. RAID 의
일반적인구현에는 RAID 0, RAID 1, RAID 5, RAID 10 및 RAID 50 이포함됩니다. 미러
링, 스트라이핑을참조하십시오.
Remote Instant Replay Replay 가원격 Dell Compellent Storage Center에복제되는 Dell Compellent Storage
Center 솔루션기능입니다. 로컬및원격 Dell Compellent Storage Center 는활성상
태이며, 단방향복제가독립적인간격으로동기적또는비동기적으로발생할수
있습니다. Dell Compellent Storage Center 복제를위해서는복제라이센스가있는
Enterprise Manager 소프트웨어응용프로그램이필요합니다. Replay, 원격시스템,
복제를참조하십시오.
원격 설정 마법사(RSW) Host Integration Tools/Microsoft Edition 을설치한후에 Dell EqualLogic PS 시리즈배
열을구성할수있는 GUI(그래픽사용자인터페이스)입니다.
원격 시스템 Dell Compellent Storage Center 에서로컬 Dell Compellent Storage Center의원래볼
륨에서복제데이터를수신하도록구성된별도의 SAN입니다. Dell Compellent
Storage Center 복제를위해서는복제라이센스가있는 Enterprise Manager 소프트
웨어응용프로그램이필요합니다. 복제를참조하십시오.
Replay Dell Compellent Storage Center 에서사본이시작되는시점에표시되는상태의데이
터이미지가포함된사용가능한시점사본(PITC )입니다. 사본은로컬또는원격
Dell Compellent Storage Center에저장할수있습니다. 스냅샷, Data Instant Replay,
Remote Instant Replay 를참조하십시오.
Replay 프로파일 Dell Compellent Storage Center 에서 Replay 시점사본을만드는시기와방법은물론
이사본이저장되는기간을결정하는규칙집합입니다. Replay를참조하십시오.
Replay 공간 Dell Compellent Storage Center 에서자동으로예약되는공간으로 Replay에사용됩
니다. 활성공간, 실제공간을참조하십시오.
레플리카(replica) Dell EqualLogic PS 시리즈볼륨의시점표현입니다. 원래볼륨과해당레플리카는
장애방지를수월하게하기위해지리적으로떨어진곳에잠재적으로분리되는다
른 Dell EqualLogic PS 시리즈그룹(복제파트너)에위치합니다.
레플리카 컬렉션 Dell EqualLogic Group Manager 에서볼륨컬렉션의각복제의결과로발생하는레
플리카의집합입니다.
레플리카 컬렉션 집합 Dell EqualLogic Group Manager 에서볼륨컬렉션에대한레플리카컬렉션의집합입
니다.
레플리카 리저브(replica
reserve)
Dell EqualLogic Group Manager 에서특정볼륨에대해따로설정된복제파트너의
위임된공간입니다. 기본그룹의볼륨에대해레플리카리저브를구성해도실제
레플리카리저브는보조그룹에위치합니다.
레플리카 집합 Dell EqualLogic Group Manager 에서볼륨, 템플릿볼륨또는씬클론볼륨에대한전
체레플리카집합입니다.
시스템 복제 하나이상의로컬볼륨에서원격 Storage Center 에복제데이터를보내도록구성된
Dell Compellent Storage Center입니다. 복제, 원격시스템, Remote Instant Replay 를
참조하십시오.
13복제 필요한경우 SAN에서데이터를복구할수있도록기본(로컬) SAN에서보조(원격)
SAN 으로볼륨데이터(델타만)를복사하는프로세스입니다. SAN 사이의거리는
무제한으로설정할수있습니다.
복제 파트너 Dell EqualLogic Group Manager 에서다른파트너로부터레플리카를주고받도록구
성된그룹입니다.
RSW 원격설정마법사를참조하십시오.
실행 가능한 페르소나 Dell AIM 컨텍스트에서시작되어호스트에할당될때까지대기중인네트워크부
팅페르소나입니다.
SAN Storage Area Network 를참조하십시오.
SAN HeadQuarters 하나의그래픽인터페이스에서여러개의 Dell EqualLogic PS 시리즈그룹을모니터
링할수있습니다. 성능데이터와기타중요그룹정보를수집하고포맷합니다.
SCN System Control Network를참조하십시오.
SCN 서비스 Dell AIM 환경에서페르소나및 VMRack 이활성컨트롤러와통신하는데사용하는
컨트롤러서비스가상 IP 주소입니다.
SCSI 소형컴퓨터시스템인터페이스를참조하십시오.
SDK 소프트웨어개발키트를참조하십시오.
보조 제어 모듈 Dell EqualLogic Group Manager 환경안에서보조제어모듈은활성제어모듈에서
캐시데이터를미러링합니다. 활성제어모듈이작동을멈추면보조모듈이네트
워크작업을대신합니다. 활성제어모듈을참조하십시오.
보조 그룹 Dell EqualLogic Group Manager 복제구성에서소스볼륨의레플리카를수신하는그
룹입니다. 기본그룹을참조하십시오.
서버 클러스터 개별컴퓨터오류발생시서비스가중단되는것을막기위해하나의시스템으로
함께작동하는독립서버그룹입니다.
서비스 태그 사용자가기술지원을위해 Dell 에연락할때시스템을식별하기위해사용되는시
스템레이블입니다.
SMTP(Simple Mail Transfer
Protocol)
인터넷의호스트사이에서메시지를보낼수있도록메시지형식과전달절차를
정의합니다.
단순 네트워크 관리 프로
토콜(Simple Network
Management Protocol)의
약자입니다.
네트워크관리자가원격으로워크스테이션을모니터링하고관리할수있도록하
는표준인터페이스입니다.
시뮬레이터 컨트롤러, 콘솔, 물리적및가상네트워크를비롯하여실행중인 Dell AIM 환경을
에뮬레이션하는 Dell AIM SDK의구성요소입니다. SDK를참조하십시오.
소형 컴퓨터 시스템 인터
페이스(SCSI)
소형컴퓨터시스템인터페이스(Small Computer System Interface)의약자입니다. 표
준포트보다데이터전송속도가빠른 I/O 버스인터페이스입니다.
SMART Self-Monitoring Analysis and Reporting Technology의약자입니다. 하드드라이브에
서시스템 BIOS로오류및실패를보고한후화면에오류메시지를표시할수있습
니다.
14Smart 사본 Dell EqualLogic PS 시리즈그룹에서응용프로그램과일관적인개체의 ASM/ME 시
점사본입니다. Smart 사본은사용중인 Auto-Snapshot Manager 버전에따라스냅
샷, 클론또는레플리카유형중하나일수있습니다.
SMP 대칭적다중처리를참조하십시오.
SMTP Simple Mail Transfer Protocol을참조하십시오.
스냅샷 볼륨의시점사본(PITC)입니다. Replay 를참조하십시오.
스냅샷 컬렉션 볼륨컬렉션에서스냅샷작업으로인해발생하는스냅샷집합입니다. 볼륨컬렉션
을참조하십시오.
SNMP 단순네트워크관리프로토콜(Simple Network Management Protocol)의약자입니
다.
SNMP 트랩 컬렉터 Dell AIM 컨텍스트에서관리형스위치와기타장치가 SNMP 트랩을활성컨트롤러
에보내는데사용하는컨트롤러서비스가상 IP 주소입니다.
소프트웨어 개발 키트
(SDK)
특정소프트웨어패키지, 소프트웨어프레임워크, 하드웨어플랫폼, 컴퓨터시스
템, 비디오게임콘솔, 운영체제또는유사플랫폼을위한응용프로그램을만드는
데사용되는개발도구집합입니다.
공간 복구 Windows 는사용중이라고보고하지만실제로는비어있는공간및 Storage Center
가사용할수있는공간을복구하는유틸리티입니다.
스페어 디스크 실패한드라이브를자동으로교체하는데사용되는 SAN 의지정또는미사용드라
이브입니다.
SAN(Storage Area Network) SAN(Storage Area Network)은블록스토리지프로토콜을사용하여고성능, 고가용
성스토리지하위시스템에액세스할수있도록하는특수화된네트워크입니다.
SAN은호스트서버의 HBA(호스트버스어댑터), 스토리지트래픽을라우팅하는
데도움을주는스위치, 디스크스토리지하위시스템등특정장치로구성됩니다.
SAN의주요특징은일반적으로여러호스트가동시에스토리지하위시스템을사
용할수있어확장성과융통성이보장된다는것입니다. NAS와비교해보십시오.
스토리지 클러스터 Dell Compellent Storage Center 에서안정성, 가용성, 서비스가능성및성능(로드밸
런싱을통해)을개선하기위한목적으로상호연결된여러개의 SAN 컨트롤러입니
다. 스토리지클러스터는활성구성을사용하여자동컨트롤러장애조치를제공
합니다. 각컨트롤러에서완전하게미러링되고배터리가지원되는캐시는재시작
시데이터안정성을보장하고, 단일컨트롤러오류발생시컨트롤러간에볼륨을
마이그레이션할수있도록해줍니다.
스토리지 클러스터링 활성구성에서여러컨트롤러를통해자동컨트롤러장애조치를제공하는 Dell
Compellent Storage Center 기능입니다. 완전하게미러링되고배터리가지원되는캐
시는컨트롤러오류발생시내결함성과자동재시작/복구를제공합니다.
스토리지 풀 풀을참조하십시오.
스토리지 프로파일 Dell Compellent Storage Center 에서데이터를저장하는드라이브유형(계층)과각
계층에서사용할 RAID 레벨을정의하는규칙집합입니다.
스토리지 유형 Dell Compellent Storage Center 에서중복성옵션과블록크기를포함하여스토리지
풀의공간이할당되고보호되는방법을제어하는속성집합입니다.
스트라이핑 디스크스트라이핑은배열에서 3 개이상의디스크에데이터를쓰지만각디스크
에서공간의일부만사용합니다. "스트라이프"에서사용하는공간은사용되는각
15디스크에서동일합니다. 가상디스크는배열의같은디스크집합에서여러개의
스트라이프를사용할수있습니다. 미러링및 RAID를참조하십시오.
SMP(대칭적 다중처리) 높은대역폭링크로연결되고운영체제에서관리하는프로세서가 2 개이상설치
된시스템입니다. 각프로세서는 I/O 장치에똑같이액세스할수있습니다.
동기화 동기화복제를참조하십시오.
동기화 복제 응용프로그램이 I/O 완료메시지를수신하기전에다른물리적하드웨어에저장된
별도의두볼륨에같은데이터를자동으로쓰는기능입니다. 두볼륨모두완료또
는실패를기록하므로언제나완벽하게동기화됩니다. 그러나이기능은어플리케
이션의쓰기지연율을증가시킵니다. 동기화를참조하십시오.
SCN(System Control
Network)
컨트롤러, 페르소나및 VMRack 사이의통신을위해 Dell AIM 이사용하는개인네
트워크입니다. 컨트롤러는또한이네트워크를사용하여서버를검색하고여기에
서페르소나와 VMRack을부팅합니다.
시스템 설정 프로그램 암호보호와같은기능을설정하여시스템의하드웨어구성및시스템의작동사
용자지정을허용하는 BIOS 기반프로그램입니다. 시스템설정프로그램은
NVRAM 에저장되므로변경되지않는한모든설정이효과를유지합니다.
시스템 배포 어플라이언
스
디스크이미징, 사용자상태마이그레이션, 원격사이트관리, 시스템수리및복구
는물론컴퓨터인벤토리검사및평가를위한도구를제공하는 IT 전문가를위한
Dell KACE 어플라이언스기반배포관리솔루션입니다. 또한컴퓨터인벤토리검사
및평가와같은사전및사후배포구성작업을자동화하고, 디스크, BIOS, 및 RAID
구성, 소프트웨어배포, 구성관리도자동화합니다.
시스템 관리 어플라이언
스
인벤토리관리, 소프트웨어배포, 보고, 패치관리, 자산관리, 스크립팅, 웹기반인
터페이스를통한서비스데스크지원과같은작업을능률화하는 IT 전문가를위한
Dell KACE 어플라이언스기반시스템관리솔루션입니다.
템플릿 Dell AIM 컨텍스트에서다른페르소나를만들기위해복제할수있지만템플릿변
경을막기위해실행할수없는휴면페르소나입니다.
템플릿 볼륨 씬클론을생성하는읽기전용볼륨입니다.
씬 클론 템플릿볼륨과공간을공유하는볼륨입니다. 씬클론은많은양의공통데이터가
있는여러볼륨에서구성을위한스토리지공간을효율적으로사용할수있게합
니다.
씬 프로비저닝 SAN 에서사용할수있는공간을초과프로비저닝(또는초과서브스크립션)할수
있는기능입니다. 씬프로비저닝을사용하는스토리지개체(예: 볼륨)는잠재적인
최대크기를응용프로그램에보고하지만실제로이보다훨씬적은공간을사용할
수있습니다. 씬프로비저닝을사용하면조직에서전반적인스토리지비용을줄이
고가용성과성능을높일수있습니다.
계층식 스토리지 빠르게자주요구되는데이터가값비싸고빠른매체유형에저장되고, 거의필요
없는데이터가보다저렴하고느린매체유형에저장되는경우에사용되는스토리
지최적화전략입니다.
관리되지 않은 공간 Dell EqualLogic PS 시리즈배열에서기본그룹에서더이상액세스할수없는보조
그룹의위임된공간용량입니다.
업링크 포트 교차케이블없이기타허브나스위치에연결하는데사용되는네트워크허브나
스위치의포트입니다.
16vacate Dell EqualLogic Group Manager 에서멤버가온라인상태인동안에그룹에서멤버를
제거하는것입니다.
뷰 볼륨 Dell Compellent Storage Center 에서이전 Replay 로부터생성된읽기전용볼륨으로,
데이터복구가주요목적입니다. Replay 를참조하십시오.
가상 포트 또는 가상 포트
모드
Dell Compellent Storage Center 컨텍스트에서가상포트를사용하면리저브포트가
필요하지않습니다. 가상포트모드에서작동할경우모든프런트엔드포트가 I/O
를수락하고오류도메인하나의일부가될수있습니다. 가상포트를활성화하는
방법에대한자세한내용은 Dell Compellent Storage Center 시스템설치안내서를참
조하십시오.
vWWPM(가상 World Wide
포트 이름)
SAN 부팅페르소나를생성하기위해 Dell AIM 에서사용되는가상 World Wide 포트
이름입니다.
가상화 여러환경에걸쳐단일컴퓨터나스토리지장치의리소스를공유하기위해소프트
웨어를사용하는기능입니다. 사용자에게는하나의물리적시스템이나장치가여
러운영체제를호스팅할수있는여러개의가상시스템으로표시될수있습니다.
VMRack 에이전트소프트웨어와 Red Hat Xen, VMware ESX 또는 Microsoft Hyper-V 의조합
을실행중인서버의가상머신(VM) 랙입니다.
볼륨 스토리지장치로스트라이핑되는별도의스토리지단위입니다.
볼륨 컬렉션 볼륨에서동시에작업을수행하기위해하나로그룹화된여러개의볼륨입니
다. 스냅샷컬렉션, 레플리카컬렉션을참조하십시오.
볼륨 리저브 여유풀공간에서볼륨에할당된공간입니다. 씬프로비저닝이없으면볼륨리저
브가보고된크기와같습니다.
볼륨 유형 Dell Compellent Storage Center 컨텍스트에서볼륨유형은동적, Replay 활성또는복
제가될수있습니다. 볼륨은최소하나의 Replay 를해당볼륨에서가져갈때까지
동적으로유지됩니다. 볼륨에서 Replay 를가져가면 Replay 활성상태가됩니다. 복
제볼륨은다른 Dell Compellent Storage Center 시스템으로복제되는볼륨입니다.
vRack Dell AIM 컨텍스트에서가상스위치(vRack 스위치)에연결된호스트의논리적그룹
입니다.
vRack 스위치 Dell AIM 컨텍스트에서 vRack의호스트에연결하는가상스위치입니다.
vWWPN 가상 World Wide 포트이름을참조하십시오.
1718Dell Sözlük – Sürüm 2
SözlükSözlük
ACPI Gelişmiş yapılandırma ve güç arayüzü bölümüne bakın.
aktif kontrol modülü Çift kontrol modülü dizilerindeki Dell EqualLogic PS Serisi diziler için bir ağ üzerinde G/Ç'yi aktif
olarak servis eden kontrol modülü. İşlevi durursa ikincil kontrol modülüne geçer. İkincil kontrol
modülüne bakın.
aktif Denetleyici Aktif olarak Dell AIM ortamını yöneten Dell AIM Denetleyici.
aktif alan Dell Compellent Depolama Merkezinde, yeniden oynatmaların dışında kalan hacim tarafından
kullanılan alan miktarı. Bu miktar RAID hizmetlerini içermez. Yeniden oynatmaya bakın.
gerçek alan Dell Compellent Depolama Merkezinde, aktif alan artı bir hacim için yeniden oynatma alanıdır. Aktif
alan, Yeniden oynatma alanına bakın.
gelişmiş yapılandırma ve
güç arayüzü
İşletim sisteminin yapılandırma ve güç yönetimini yönlendirmesini sağlayan standart bir arayüz.
aracı Dell AIM ortamında (Red Hat Xen ve Microsoft Hyper-V, plus personalara dayanan VMRack'ler),
Denetleyicinin öğeleri yönetmek ve bunların ağ özelliklerini yapılandırmak için kullandığı öğeler
üzerinde kurulu isteğe bağlı yazılım.
aracısız persona Dell AIM aracısı kurulu olmayan Dell AIM persona.
ortam sıcaklığı Sistemin bulunduğu bölüm ya da odanın sıcaklığı.
dizi üyesi PS Serisi grubuna yapılandırılmış Dell EqualLogic PS Serisi dizisi. Grupların birden fazla üyesi
olabilir.
dizi seri numarası Dell EqualLogic PS Serisi dizi ortamında, dizi donanımında kodlanan benzersiz Dell EqualLogic PS
Serisi dizi tanımlama dizesi. Servis etiketine bakın.
ASM/ME Otomatik Anlık Görüntü Yöneticisi/Microsoft Edition'a bakın.
ASM/VE Otomatik Anlık Görüntü Yöneticisi/VMware Edition'a bakın.
Varlık Yönetimi Araçları IT profesyonelleri için yazılım ve lisans uyumluluğunu takip eden Dell KACE aracı tabanlı varlık
yönetimi çözümü. Envanter, yazılım varlıkları, sürümleri, yükseltmeleri ve bilgisayarların web tabanlı
bir göstergeden yönetilmelerini otomatik hale getirir.
asset tag (varlık etiketi) Güvenlik ya da izleme amaçları için genellikle bir yönetici tarafından bir sisteme atanan bağımsız bir
kod.
Atanan Diskler Dell Compellent Depolama Merkezinde, hacimler ve tekrar oynatmaları depolamak için yönetilmek
ve kullanılmak amacıyla bir disk klasörüne atanan fiziksel depolama ortamı. Disk klasörü, Depolama
Havuzuna bakın.
atama modu Ana bilgisayarda HBA'ların olup olmamasına dayanarak personaların ve VMRack'lerin nasıl ana
bilgisayarlara atandığının kontrol edilmesini sağlayan mekanizmadır. HBA'ya bakın.
asenk/asenkron eşleme Veriyi yerel depolamaya yazıp ardından veriyi uzaktan bir SAN'da depolamak için kuyruğa alma
işlemi. Yazma dağıtımından önce yerel SAN arızalanırsa eşleme de arızalanabilir. Eşleme, senkron
eşleme, uzaktan anlık tekrar oynatmaya bakın.
otomatik RAID
yapılandırması
Dell EqualLogic PS Serisi grubu kapsamında, kullanıcı tarafından seçilen RAID politikasını dizide
yapılandıran dahili işlem.
3Otomatik Anlık Görüntü
Yöneticisi/Microsoft
Edition (ASM/ME)
Akıllı Kopyalar'ı yönetmenizi sağlayan Microsoft Yönetim Konsolu için eklenti konsol uygulaması.
Otomatik Anlık Görüntü
Yöneticisi/VMware
Edition (ASM/VE)
Akıllı Kopyalar'ı yönetmenizi sağlayan VMware sanal ortamlarıyla birlikte çalışan web tabanlı bir
uygulama.
kullanılabilir alan Tüm sürücülerdeki kullanılabilir toplam depolama miktarı.
arka uç Dell Compellent Depolama Merkezinde, denetleyici veya depolama kümesini (örn. yedek denetleyici
çiftleri) yerel disk kaslarına bağlayan ayrı ve bu işe adanmış bir ağdır.
arka uç ağı Dell Compellent Depolama Merkezi Denetleyicisinde denetleyici ve diskler arasındaki bağlantı.
taban hacmi (Dell
EqualLogic PS Serisi)
Bilgisayara monte edilmiş ve Windows tarafından sürücü harfinden (örn G:) veya montaj
noktasından erişilebilen hacim.
taban hacmi (Dell
EqualLogic Grup
Yöneticisi)
Anlık görüntüleri olan hacim. Anlık görüntüler taban hacmine bağlıdır. Taban hacmi zarar görürse
anlık görüntüler kaldırılır.
Anakart Yönetim
Denetleyicisi (BMC)
IPMI (Akıllı Platform Yönetim Arayüzü) protokolünü uygulayan sunucu yönetim modülü. Dell AIM
kapsamında Denetleyici, bazı sunucu modellerini uzaktan kontrol etmek için BMC'yi kullanır.
blade Dell AIM SDK için blade, ana bilgisayar süper sınıfının bir öğesidir. Dell modüler sistemleri için
blade, kasaya monte edilen bir modüler sunucu anlamına gelir.
BMC Anakart Yönetim Denetleyicisine bakın.
Önyüklenebilir ortam Sistem sabit sürücüden önyükleme yapamazsa, sisteminizi başlatmak için kullanılan CD, SD kart
veya USB bellek anahtarı.
önbellek Verilerin hemen alınabilmesi için verilerin ya da yönergelerin bir kopyasını tutan hızlı depolama
alanı.
CHA Compellent Ana Bilgisayar Adaptörüne Bakın.
Karşılıklı Kimlik
Doğrulama İletişim
Kurallı (CHAP)
Karşılıklı Kimlik Doğrulama İletişim Kurallı, şifreli kimlik sorma yanıt mekanizması kullanan bir ağ
oturum açma protokolüdür. Doğru hesap ismi ve parolayı sağlayan ana bilgisayarlara hacim ve
anlık görüntülere olan erişimi sınırlamak için kullanılır. CHAP ayrıca oturum açma/yönetici hesapları
için de kullanılır.
kanal Dell/AIM ortamında, bağlantı noktalarını değiştirmek için atayabileceğiniz ve sekiz fiziksel NIC
kullanarak bir personaya bağlanabileceğini sekiz fiziksel bağlantıdan biri. Trafik için bir veya iki
kanal tercih etmek amacıyla bir ağ yapılandırabilirsiniz böylece tercih edilen kanal arızalanırsa trafik
görünmeden diğer kanala yeniden yönlendirilir.
CHAP Karşılıklı Kimlik Doğrulama İletişim Kurallı'na (CHAP) bakın.
kasa anahtarı Dell AIM kapsamında, Ethernet anahtarı kasadaki bir yuvada bulunur. Kasa anahtarları Denetleyici
tarafından yönetilir.
istemci sürücü iletişim
sertifikası
EKM kapsamında, istemcinin sunucuyla iletişimine izin veren özel şifreli bir anahtardır.
Küme Düğümü Sunucu kümesindeki bir ana bilgisayar veya depolama kümesindeki SAN gibi kaynak kümesinin
fiziksel bir üyesidir.
4toplama ASM/ME'de toplama, hacim, anlık görüntü veya uygulama bileşenleri gibi depolama nesnelerinin
ilişkili gruplarıdır ve ASM Konsol Ağacında Toplama ana düğümünün altında düğümlerle temsil
edilir. Dell EqualLogic Grup Yöneticisinde, hacim ve eşleme toplamaları ile özel anlık görüntü
toplamaları Hacimler görüntüsü altında bir hiyerarşiyle görünür.
Compellent Ana
Bilgisayar Adaptörü
(CHA)
Her Dell Compellent Depolama Merkezi denetleyicisinde bulunan dahili önbellek kartı/pil. Yazma
önbellek hafızası önbellek kartında yansıtılır. Çift denetleyicili Dell Compellent Depolama
Merkezi'nde, denetleyici 1 önbellek kartı denetleyici 2 için yansıtıcıdır ve denetleyici 2 önbellek kartı
denetleyici 1 için yansıtıcıdır. Tekli denetleyicili Dell Compellent Depolama Merkezi'nde, önbellek
kartı tek denetleyici için yansıtıcıdır.
yapılandırma Dell AIM ortamının tüm içeriğini ve yapılandırmasını açıklayan veritabanıdır.
Koruma Modu Dell Compellent Depolama Merkezi'nde, kalan boş alan kritik eşiğin altına düştüğünde (tipik olarak
%10, 32 GB'ye kadar) veri koruma modu. Koruma modunda Dell Compellent Depolama Merkezi bir
uyarı oluşturur, yeni hacimlerin oluşturulmasını önler ve boş alan yaratmak için tekrar oynatmaları
daha hızlı olarak sona erdirir. Acil durum moduna bakın.
Konsol Dell AIM ortamındaki öğeleri izlemek ve bunlarla çalışmak için kullandığınız web tabanlı kullanıcı
arayüzüdür. Dell AIM Konsolu Dell AIM Denetleyicide bulunur.
kontrol modülü Dell EqualLogic PS Serisi dizilerde fiziksel işlemci ve arayüz bileşenidir. Bir kontrol modülü Dell
EqualLogic PS Serisi ürün yazılımını flash bellekte içerir ve önbellek hafızasında saklanan veriler
için geçici güç sürekliliği sağlar. Birden çok ağ arayüzü ve isteğe bağlı seri bağlantı noktası
vardır. Bir dizi, çalışırken değiştirilebilen çift yedek denetleyici içerebilir. Aktif kontrol modülleri G/
Ç'ye hizmet ederken ikincil kontrol modülü önbelleğinde veri yansıtır.
denetim masası Güç düğmesi ve güç göstergesi gibi gösterge ve kumandaların bulunduğu sistem bölümü.
Kontrol Bağlantı Noktası Depolama isteğinde bulunmak için iSCSI başlatıcıların (sunucuların) bağlandığı hedef iSCSI
bağlantı noktasıdır. Sanal bağlantı noktası modunda yapılandırılan Dell Compellent Depolama
Merkezi'nde iSCSI trafiğini uygun sanal bağlantı noktasına yeniden yönlendirmek için her iSCSI
hata etki alanı için bir kontrol bağlantı noktası oluşturulur.
Denetleyici (Dell AIM) Fiziksel ve sanal donanım, yazılım ve ağ yapılandırmalarını yöneten ve Dell AIM Konsolunu içeren
yazılımdır. Bir çift dirençli Denetleyici kapsamında her Denetleyici kendisine ayrılmış sunucuda
çalışır ama bir yapılandırma veritabanı ve diğer önemli dosyaları paylaşılan dosya sisteminde
paylaşır.
Denetleyici (Dell
Compellent)
Disk toplanması (RAID), G/Ç yönlendirmesi, hata algılama ve veri kurtarması sağlar. Tüm Dell
Compellent Depolama Merkezi alt sistemi için bilgi sağlar. Her Depolama Merkezi sistemi en az bir
tane içerir. Depolama Merkezi ve sistemin performansı ile kullanılabilirliğini iyileştirmek için tavsiye
edilen düzeltici eylemler.
Denetleyici Hizmetleri Dell AIM kapsamında, Denetleyicinin Sistem Kontrol Ağı (SCN), yönetilen anahtarlar, Konsol ve CLı
ile iletişim için kullandığı sanal IP adresi veya adresleri. Varsayılan olarak bu, aktif Denetleyicide tek
bir sanal IP adresidir ama SCN Hizmetleri ve SNMP Tuzak Toplayıcı için özel adresler
belirleyebilirsiniz.
Kopilot Hizmetleri Dell Compellent Depolama merkezinde sistemi proaktif olarak izleyen ve sistemin performansı ile
kullanılabilirliğini iyileştirmek için düzeltici eylemler öneren, merkezi destek, ürün eğitimi ve satış
kaynakları kombinasyonu.
Kopyalama-YansıtmaGeçirme
Hacimlerin farklı disk türleriyle RAID seviyeleri arasında geçirilmesine izin veren Dell Compellent
Depolama Merkezi özelliği.
5ayrıcalık alanı EKM kapsamında oturumlar arasında ayrıcalık bilgisini saklayan bellektir. Ayrıcalık bilgisi kullanıcı
adı, parola ve sertifika gibi güvenlik bilgisidir.
Kriptografik Nesne Veri güvenlik yöntemi.
Veri Toplayıcı Sunucunun arka planında çalışan ve sunucuya bağlı tüm Dell Compellent Depolama Merkezi
sistemlerinden bilgi toplayan Dell Compellent Kurumsal Yönetici bileşenidir.
Anlık Veri Yeniden
Oynatma
Belirli aralıklarla yerel SAN'da boş alan etkili zaman noktası kopyaları (PITC) yakalayan ve böylece
hacmi önceki bir zaman noktasına geri çevirmeye izin veren Dell Compellent Depolama Merkezi
özelliğidir. Bkz. Yeniden oynatma, anlık görüntü.
Veri İlerletme G/Ç aktivite (talep) seviyesine dayanarak veri sayfalarını otomatik olarak üst veya alt performans
aygıtlarına geçiren Dell Compellent Depolama Merkezi özelliğidir. Bkz. katmanlı depolama.
DDR Bkz. Çift Veri Oranı.
atanan alan Dell EqualLogic Grup Yöneticisi kapsamında, bir ortak için alınan eşleri saklamak amacıyla bulunan
bir gruptaki alan.
Dell Şifreleme Anahtar
Yöneticisi (EKM)
Dell Şifreleme Anahtar Yöneticisi (EKM) Dell bant otomasyon çözümleri için şifreleme anahtarlarını
yöneterek LTO bantlarında saklanan verileri güvenlik altına alır.
Dell Uzaktan Erişim
Denetleyicisi (DRAC)
Bant dışı yönetim tesisini sağlayan bir arayüz kartıdır. Denetleyicinin kendi işlemcisi, belleği, ağ
bağlantısı ve sistem veriyoluna erişimi vardır ve sistem yöneticilerinin bir ağ aracılığıyla sistemleri
uzaktan kontrol etmesine izin verir.
aygıt sürücüsü İşletim sistemi ya da diğer programların, çevre birimi ile doğru bir şekilde iletişim kurmasını
sağlayan program.
DHCP Bkz. Dinamik Ana Bilgisayar Yapılandırma Protokolü.
Dijital Çok Amaçlı Disk Dijital çok amaçlı disk veya dijital video diski (DVD).
disk klasörü Dell Compellent Depolama Merkezinde, kullanıcı tarafından görüntülenebilen ve yönetilebilen
fiziksel depolama ortam aygıtları toplamı (diskler, SSD'ler). Disk klasörleri depolama alanının
sağlandığı depolama havuzlarını belirler. Disk klasörleri birden çok depolama havuzuyla ilişkili
olabilse de Dell Compellent Depolama Merkezi performansı tüm diskleri aynı klasöre ve depolama
havuzuna atayarak en yüksek hale getirilebilir.
Disk Konumu Dell Compellent Depolama Merkezinde, kasasındaki disk sürücüsünün sıra-sütun şeklindeki yuva
konumu. Örneğin disk konumu 01-02, üstten birinci sıradaki ve soldan ikinci sütundaki yuva
anlamına gelir.
DNS Bkz. Etki Alanı Adı Sistemi.
Etki Alanı Adı Sistemi
(DNS)
www.example.com gibi Internet etki alanı adlarını, 208.77.188.166 gibi IP adreslerine dönüştürme
yöntemi.
dormant Persona AIM ortamında, bir ana bilgisayar üzerinde çalışmayan (veya çalışmayı beklemeyen) persona.
Çift Veri Hızı (DDR) Çift veri hızı. Verileri bir saat döngüsünün hem yükselen hem de alçalan darbelerinde aktararak veri
hızını potansiyel olarak iki kat artıran, bellek modüllerinde kullanılan bir teknoloji.
DRAC Bkz. Dell Uzaktan Erişim Denetleyicisi.
DRAM Bkz. Dinamik rasgele erişim belleği.
İkili Yedek Dell Compellent Depolama Merkezinde, tipik olarak RAID 10 ve/veya RAID 6'yı kullanarak herhangi
iki sürücünün kaybolmasına karşı koruma sağlayan depolama profili seçeneği.
6DVD Bkz. Dijital Çok Amaçlı Disk.
Dinamik Ana Bilgisayar
Yapılandırma Protokolü
(DHCP).
Bir istemci sistemine otomatik olarak bir IP adresi atama yöntemi.
Dinamik rasgele erişim
belleği (DRAM)
Bir sistemdeki RAM genellikle DRAM çiplerinden oluşur.
EKM Bkz. Dell Şifreleme Anahtar Yöneticisi.
EKM Yöneticisi EKM kapsamında, kullanıcı ve grup oluşturabilen veya silebilen süper kullanıcı.
EKM Şifreleme Yöneticisi
(tklmadmin)
EKM kapsamında, anahtarları veya aygıtları oluşturan veya silen günlük kullanıcı.
Acil Durum Modu Dell Compellent Depolama Merkezinde, daha fazla boş alan olmamasından kaynaklı olarak sistem
daha fazla çalışamadığında erişilen moddur. Acil durum modunda, tüm sunucu G/Ç'leri reddedilir ve
tüm hacimler çevrimdışı olur ve acil durum modundan çıkacak kadar boş alan yaratılmadan tekrar
çevrimdışı olmaz. Bkz. Koruma Modu.
kasa Birden çok disk veya blade'e tek bir arayüz, güç ve soğutma sağlayan fiziksel kasa.
ortam Dell AIM kapsamında, Dell AIM Denetleyici tarafından yönetilen donanım, yazılım ve ağ
yapılandırmaları toplamı.
Eth0 Bkz. Ethernet portu 0.
Eth1 Bkz. Ethernet portu 1.
Ethernet portu 0 (Eth0) Dell Compellent Depolama Merkezinde Eth0, yönetime ayrılan Ethernet arayüzüdür.
Ethernet portu 1 (Eth1) Dell Compellent Depolama Merkezinde Eth1, kümeleme veya uzaktan eşleme için denetleyiciler
arasındaki işlem arası iletişim için ayrılan Ethernet arayüzüdür.
harici ağ Dell AIM ağ kapsamında, Dell AIM ortamının bir parçası olmayan ama fiziksel ve mantıksal olarak
buna bağlı olan ağ.
harici anahtar Dell AIM ortamı kapsamında, Dell AIM ortamının bir parçası olmayan ama fiziksel ve mantıksal
olarak buna bağlı olan anahtar.
Fabric Birleşik yönlendirme altyapısı olarak çalışan birbirine bağlı anahtar kombinasyonu. SAN'daki
aygıtlar arasında birden çok bağlantıya izin verir ve yeni aygıtların sorunsuz olarak girmesini sağlar.
Ağda en az bir anahtar bulunacak şekilde FC (veya iSCSI) topolojisi.
FastTrack En aktif veriyi dış (daha hızlı) disk parçasına dinamik olarak yerleştiren isteğe bağlı Dell Compellent
Depolama Merkezi yardımcı programı.
FAT Bkz. Dosya Ayırma Tablosu.
Hata Etki Alanı Dell Compellent Depolama Merkezi ortamında, Hata Etki Alanı yük devretme setini tanımlar. Sanal
Bağlantı Noktası modunda tüm ön uç bağlantı noktaları bir hata etki alanının parçası olabilir. Legacy
Modunda her birincil ve ayrılmış bağlantı noktası bir hata etki alanı oluşturur.
FC Bkz. Fiber Kanal.
FE Bkz. Ön Uç Ağı.
7Fiber Kanal (FC) Sunucuları denetleyicilere ve arka uç disk kasalarına bağlamak için kullanılan yüksek hızlı bağlantı.
FC bileşenleri HBA'ları, hubları, anahtarları ve kabloları içerir. FC terimi aynı zamanda saniyede 10
Gigabayt'a kadar hızla veri aktarımı sağlayan yüksek hızlı, ikili seri iletişim protokolü anlamına gelir.
Dosya Ayırma Tablosu
(FAT)
Dosya depolamasını organize ve takip etmek için MS-DOS tarafından kullanılan dosya
yapısıdır. Microsoft Windows işletim sistemi isteğe bağlı olarak FAT dosya sistem yapısını
kullanabilir.
Dosya Aktarım Protokolü
(FTP)
Makineler ve ana bilgisayarlar arasında büyük miktarda veri dosyası aktarmak için kullanılan
uygulama seviyesi protokolü.
Ön Uç Ağ (FE) Veri yazımını başlatan Dell Compellent Depolama Merkezi SAN veri yazımı akışının (sunucudan
anahtara, oradan denetleyiciye ve disklere) bileşeni. Genel olarak denetleyicinin ön ucunda bulunan
sunucular (veya anahtarlar). Ancak, uzaktaki bir sisteme veri eşleyen bir Depolama Merkezi
uzaktaki sistemin ön ucudur. Bkz. arka uç.
FTP Bkz. Dosya Aktarım Protokolü.
GB Bkz. Gigabayt.
Gigabayt (GB) 1024 megabayt veya 1.073.741.824 bayt. Ancak sabit sürücü kapasitesine atıfta bulunurken bu
genellikle 1.000.000.000 bayta yuvarlanır.
grup Bkz. PS Serisi grubu.
HBA Bkz. Ana Bilgisayar Veriyolu Adaptörü.
HIT/LE Bkz. Linux için Ana Bilgisayar Entegrasyon Araçları.
HIT/ME Bkz. Windows için Ana Bilgisayar Entegrasyon Araçları.
HIT/VM Bkz. VMware için Ana Bilgisayar Entegrasyon Araçları.
ana bilgisayar Dell AIM ortamında, ana bilgisayar bir fiziksel sürücü (rafa monte veya blade) veya sanal bir makine
olabilir. Dell AIM SDK'de, blade sunucuları, rafa monte sunucuları ve sanal makineleri (VM) içeren
süper sınıf.
ana bilgisayar adaptörü Sistemin veriyolu ile genellikle bir depolama aygıtı olan çevre aygıtı arasında iletişimi gerçekleştiren
bir denetleyici.
Ana Bilgisayar Veriyolu
Adaptörü (HBA)
Bir sunucuyu SAN'a (Depolama Alanı Ağı) bağlayan genellikle ek bir kart olan aygıt. Her HBA, SAN
üzerinde kendi WWPN'si (World Wide Port Number) ile tanımlanır. Ortak HBA türleri Fiber Kanal ve
iSCSI'yı içerir.
Linux (HIT/LE) için Ana
Bilgisayar Entegrasyon
Araçları.
ESX sistemlerini Dell EqualLogic PS Serisi depolama dizileriyle entegre eden araç dizisi. Otomatik
Anlık Görüntü Yöneticisi/VMware Sürümü (ASM/VE), EqualLogic Veri saklama Yöneticisi ve
EqualLogic Sanal Masaüstü Dağıtım Yardımcı Programını içerir.
Windows (HIT/ME) için
Ana Bilgisayar
Entegrasyon Araçları
Bir diziyi yapılandırmanızı ve yönetmenizi sağlayan uygulamalar dizisi. ASM/ME, DSM (Çoklu Yol
G/Ç Aygıtı Özel Modülü) ve RSW'yi (Uzaktan Kurulum Sihirbazı) içerir.
VMware (HIT/VM) için
Ana Bilgisayar
Entegrasyon Araçları
Linux sistemlerini Dell EqualLogic PS Serisi depolama dizileriyle entegre eden araç dizisi. Uzaktan
Kurulum Sihirbazı Komut Satırı Arayüzü (RSWCLI), EqualLogic Ana Bilgisayar Performansı ve
Yapılandırma Ayarlama Dizisi (eqltune) ile EqualLogic Log Bir Araya Getirme Tesisi'ni (eqllog)
içerir.
Kullanıma Hazır Yedek
Disk
Dell Compellent Depolama Merkezi ortamında, Kullanıma hazır yedek disk, yedek bir disktir. Aktif
dizinin arızalanması durumunda denetleyici Kullanıma Hazır Yedek Diski aktif dizinin bir parçası
8haline getirir ve anında veriyi yeniden oluşturur. Kullanıma hazır Yedek disk insan müdahalesi
olmadan aktif diskin bir parçası olsa da, arızalanan sürücüyü en kısa zamanda değiştirmeyi
unutmayın, böylece dizi yeni bir Kullanıma Hazır Yedek Diskle tekrar korunur. Kullanıma hazır
yedek diskler birden fazla disk kasasında bulunabilir. Depolama Merkezi Kullanıma Hazır Yedek
Diski yerini aldığı veri sürücüsünden farklı kapasiteye sahip olabilir.
çalışırken takılabilir Genellikle bir sabit sürücü veya dahili bir soğutma pervanesi gibi bir aygıtı ana makine sistemine
sistem gücü açıkken ve çalışıyorken ekleme veya takma yeteneği. Aynı zamanda çalışırken
değiştirilebilir olarak da adlandırılır.
çalışırken değiştirilebilir Bkz. çalışırken takılabilir.
G/Ç Giriş/Çıkış. Klavye bir giriş aygıtı, monitör ise bir çıkış aygıtıdır. Genel olarak G/Ç aktivitesi
bilgisayar aktivitesinden ayrıştırılabilir.
Kimlik Dell AIM ortamında, ortama eklendiği zaman atanan öğe için benzersiz tanımlayıcı.
iDRAC Bkz. Dell Uzaktan Erişim Denetleyicisi entegrasyonu.
IKEv2-SCSI Sertifika oluşturmak için kullanılan protokol.
görüntü Dell AIM'e özel olarak, Denetleyicinin özel türde bir ana bilgisayar üzerinde görüntüyü önyüklemek
için kullandığı bilgiyle birlikte bir persona veya VMRack tarafından önyüklenen disk veya depolama
dizisinde saklanan gerçek bitler. Birden fazla görüntüyle bir persona veya VMRack
yapılandırabilirsiniz, örneğin, böylece aynı persona ya bir fiziksel sunucuda ya da sanal makinde
önyükleme yapabilir.
infiniBand InfiniBand, işlemcilerin yüksek hızlı çevre birimlerine bağlanması için tasarlanan noktadan noktaya
çift yönlü seri bağlantıları sunar.
Anlık Yeniden Oynatma Bkz. Anlık Veri Yeniden Oynatma.
Dell Uzaktan Erişim
Denetleyicisi (iDRAC)
entegrasyonu.
Internet SCSI protokolünü kullanan bir uzaktan erişim denetleyicisi.
Akıllı Platform Yönetimi
Arabirimi (IPMI).
Bazı sunucularda sunucularındaki yönetim modülleri tarafından gerçekleştirilen ve sunucuları
uzaktan kontrol etmek için kullanılan protokol. Dell sunucularındaki blade yönetim modülleri iPMI
gerçekleştirir.
bağlantı anahtarı Dell AIM ortamında, Denetleyici tarafından yönetilen ve kasa, vRack'ler, diğer bağlantı anahtarları
ve harici anahtarlar gibi öğeleri birbirine bağlamak için kullanılan anahtar.
internet SCSI (iSCSI) Internet SCSI (bkz. SCSI). Standart SCSI komutlarını, IP ağları üzerinde istemci sunucularıyla
(iSCSI başlatıcılar) ağ depolama aygıtları (iSCSI hedefleri) arasında iletişim için içeren protokol.
IPMI Bkz. Akıllı Platform Yönetimi Arabirimi.
iSCSI Bkz. Internet SCSI.
Anahtar Yönetimi Birlikte
Çalışabilirlik Protokolü
(KMIP)
Kurumsal anahtar yönetim sistemleri ve şifreleme sistemleri arasındaki iletişim için konulan
standartlardır.
Anahtar Servis Bağlantı
Noktaları
EKM'de iletişim için işletim sistemi tarafından kullanılan bağlantı noktalarıdır.
Anahtar grubu EKM'de, belli bir bölüm, alan veya donanım türüne atanmış anahtar setidir.
9Anahtarlar EKM'de veri korumak için kullanılan şifreli sertifika.
Anahtar deposu /
Anahtar grubu / Ana
Anahtar Deposu
EKM'deki bir grup şifreli anahtar.
KMIP Bkz. Anahtar Yönetimi Birlikte Çalışabilirlik Protokolü.
Java Veritabanı
Bağlantısı (JDBC)
İstemcinin bir veritabanında veriye nasıl erişeceğini, veriyi nasıl arayacağını ve güncelleyeceğini
belirten Java programlama dili için API.
JDBC Bkz. Java Veritabanı Bağlantısı.
Baş Denetleyici Çift denetleyicili Dell Compellent Depolama Merkezindeki birincil denetleyici. Normalde baş ve yan
denetleyiciler hacmi ikiye katlayarak depolama G/Ç yükünü paylaşır ama yalnızca baş denetleyici
harici yönetim işlevlerini gerçekleştirir. Bir denetleyici arızalanırsa kalan denetleyici baş denetleyici
olur veya olmaya devam eder ve her iki denetleyicinin görevlerini de üstlenir. Bkz. Yan Denetleyici.
Legacy Modu Dell Compellent Depolama Merkezinde, hata etki alanları birincil ve ayrılmış ön uç bağlantı noktası
çiftlerini, yedek cihazla bağlanarak ayırmak için atanır, böylece tekli bağlantı noktası arızasına karşı
depolama trafiğini korumak için bir mekanizma kullanılır. Bkz. Hata Etki Alanı, Sanal bağlantı
noktası veya Sanal Bağlantı Noktası Modu.
Doğrusal Bant-Açık
(LTO)
Açık bir standart bant formatı.
mantıksal birim numarası
(LUN)
Mantıksal birim, bir depolama dizisinin veya disk setinin kavramsal bölümüdür (alt birimidir). Her
mantıksal birimin, tanımlanmasına izin veren mantıksal birim numarası (LUN) vardır.
LTO Bkz. Doğrusal Bant-Açık.
LTO Anahtar Grup
Aktarma
EKM'de, varsayılan anahtar grubu kaldırıldığında kullanılmak üzere atanan bir anahtar seti.
LUN Bkz. mantıksal birim numarası.
MAC adresi Bkz. Ortam Erişim Denetimi adresi.
Yönetilen Diskler Dell Compellent Depolama Merkezinde, aygıtları depolama havuzuyla ilişkilendirmek için disk
klasörüne atanan depolama ortam aygıtları (diskler, SSD'ler). Bkz. Depolama Havuzu, disk klasörü.
yönetilen sistem Yönetilen sistem, Dell OpenManage Sunucu Yöneticisi kullanılarak izlenen ve yönetilen her
sistemdir.
yönetim IP adresi Akıllı IP'si etkin olan aygıtları izlemek veya yönetmek için bu aygıtlara bağlanmak amacıyla
kullanılan adres. Adres, yönetim uygulamaları tarafından özel kullanıma ayrılmış veya yönetim ve
servis uygulamaları tarafından paylaşılıyor olabilir.
yönetim ağı İsteğe bağlı bir yönetim ağı, iSCSI trafiğini (Hacim G/Ç) yönetim trafiğinden (GUI ve CLI oturumları
ve diğer grup yönetim iletişimleri ile gruplar arası işlemler) ayırır.
yönetim istasyonu Bir veya daha fazla yönetilen sistemi merkezi bir konumdan yönetmek için kullanılan sistem.
Manuel Yeniden Oynatma Kullanıcının, hacimlerin manuel olarak zaman noktası kopyalarını oluşturmasını sağlayan Dell
Compellent Depolama Merkezi özelliği.
manuel aktarım eşleme Bir ağ üzerinden değil taşınabilir ortam ile yapılan eşleme. Eşleme çiftleri arasındaki ağ bağlantısı
çok yavaş olduğunda kullanılır aksi halde büyük miktarlarda veri aktarımı için uygun değildir.
10Manuel Aktarım Yardımcı
Programı
Ağ yerine taşınabilir ortamı kullanarak hacim eşlemesi sağlayan Dell EqualLogic'in bağımsız bir
yardımcı programı. Yardımcı program hem grafik hem de komut satırı kullanıcı arabirimine sahiptir.
Ortam Erişim Denetimi
adresi (MAC adresi)
Sisteminizin bir ağ üzerindeki benzersiz donanım numarası.
geçiş hacmi Bir hacimden diğerine veri taşımak için Dell Compellent Depolama Merkezi komutu.
geçiş EKM kapsamında, Dell Şifreleme Anahtar Yöneticisi 3.0 kurulumu sırasında (sonrasında değil) var
olan anahtar deposuna bir anahtar deposu birleştirme.
yansıtma hacmi Yerel bir hacmi uzaktaki bir Dell Compellent Depolama Merkezi'ne eşlemek ve yansıtma manuel
olarak kaldırılana kadar yerel ve uzaktan hacimler arasında güncellemeleri sağlamak için Dell
Compellent Depolama Merkezi komutu.
yansıtma Bir fiziksel sürücü setinin veriyi sakladığı ve bir veya daha fazla ek sürücünün verinin çift kopyasını
sakladığı türde veri yedekleme. İşlevselliğin yansıtılması yazılım tarafından sağlanır. Bkz.
bölüştürme, RAID.
NAS Bkz. Ağa Bağlı Depolama.
ağ bağlantısı Bir personanın veya VMRack'in gerekli ağ bağlantısını tanımlayan nesne. Ağ bağlantısı, örneğin
ağa bir persona eklediğinizde olduğu gibi öğelerin ağa eklenmesiyle oluşturulur.
Ağa Bağlı
Depolama (NAS)
NAS, bir ağ üzerinde paylaşılan depolama oluşturmak için kullanılan kavramlardan biridir. NAS
sistemleri kendi işletim sistemlerine, entegre donanıma ve belli depolama ihtiyaçlarını karşılamak
için optimize edilmiş yazılıma sahiptir.
NTP Ağ Zaman Protokolü (NTP) bilgisayar sistemlerinin saatlerini paket anahtarlı, değişken gecikme
süresi veri ağlarıyla senkronize etmek için olan bir protokoldür.
Fazla talep gören alan Ölçülü kaynak sağlamayı destekleyen SAN'da fiziksel olarak mevcut olmayan ama mevcut olarak
yapılandırılmış depolama alanı miktarı (örn., yapılandırılan alan eksi mevcut alan).
eşlik şeridi RAID dizilerinde, eşlik verisini içeren şeritli sabit sürücü.
bölüm Fdisk komutu kullanılarak oluşturulan sabit sürücüye ait fiziksel bir parça. Biçimlendir komutu
kullanılarak bölümler daha sonra birden fazla mantıksal sürücüye bölünebilir.
pasif Denetleyici Aktif Denetleyici arızalandığında yönetimi devralmak için hazır beklemede olan Dell AIM
Denetleyici.
Yan Denetleyici İkili denetleyiciye sahip Dell Compellent Depolama Merkezinde, yan denetleyici G/Ç yükünü baş
denetleyiciyle paylaşır ama harici yönetim işlevlerini gerçekleştirmez. Baş denetleyici arızalanırsa
yan denetleyici, her iki denetleyicinin G/Ç ve yönetim görevlerini devralır. Bkz. Baş Denetleyici.
persona Diskte yakalanan sürücü ortamı: Bir uygulamayı Dell AIM ortamındaki bir ana bilgisayarda
çalıştırmak için gerekli işletim sistemi, isteğe bağlı Dell AIM aracı yazılımı ve ağ ile diğer ayarlar.
havuz Hacimler tarafından kullanılmak üzere SAN'da bulunan depolama alanı. Dell Compellent Kurumsal
Depolama Yöneticisi ve Dell Compellent Depolama Merkezinde bu, SAN'daki toplam alana eşittir.
Dell EqualLogic PS Serisi dizilerde bu, belli bir havuzun üyelerindeki toplam alana eşittir.
havuz yöneticisi Dell EqualLogic PS Serisi grubundaki, yalnızca belli bir havuzda veya bir grup için olan havuz
setinde nesneleri yönetmeye izinli olan hesap. Grup yöneticisiyle karşılaştırılır.
birincil grup Dell EqualLogic Grup Yöneticisi Ortamında, bir eşleme ortaklığındaki orijinal hacme sahip
grup. Bkz. ikincil grup.
11birincil hacim Dell EqualLogic Grup Yöneticisi ortamında, bir eşleme ortağına eşleme için yapılandırılan hacim.
PS Serisi dizi Tekli Dell EqualLogic iSCSI depo birimi, genellikle Dell EqualLogic PS Serisi grubu olarak
yapılandırılır. Birden çok PS Serisi diziyi daha büyük bir PS Serisi gruba ekleyebilir ve bunları tek bir
iSCSI SAN gibi yönetebilirsiniz.
PS Serisi grubu Tek IP adresiyle eriştiğiniz ve depolama alanı ağı (SAN) olarak yönettiğiniz bir veya daha fazla Dell
EqualLogic PS Serisi depolama dizisinden oluşan iSCSI depolama birimi.
Kamu Hizmetleri Dell AIM kapsamında, Konsol veya aktif Denetleyicideki CLI'ya bağlanmak için kullandığınız
Denetleyici Servisi sanal IP adresi.
RAC Uzaktan Erişim Denetleyicisi.
RAID Bkz. Yedekli Bağımsız Diskler Dizisi (RAID)
RAID 0 Veriler, daha iyi performans için mevcut disklerde şeritlenir. RAID 0, hiçbir veri yedekliliği sağlamaz.
RAID 10 Veriler, mevcut disk sürücülerinde şeritlenir ve yansıtılır, böylece veri ulaşılabilirliği ve daha iyi
performans sağlanır. Hacimdeki tüm verilerin en az bir kopyasını saklar. RAID 10 optimum Okuma /
Yazma performansı, birden çok hatayı kaldırabilen daha yüksek olasılık ve en hızlı veri onarımını
sağlar.
RAID 5 Matematiksel olarak geliştirilen dönen eşlik şeridini kullanarak verilerin mantıksal bir kopyasını
saklar. Eşlik şeridi veri şeritlerinden türetilir. Bu yöntem, yedek bilgi için RAID 10'dan daha az
servise sahiptir ama yazma performansı, eşlik şeridi her yazma için hesaplandığından daha
yavaştır. Okuma performansı RAID 10'a benzerdir.
RAID 50 RAID seviye 50, RAID seviye 5 ile RAID seviye 0'ın bir kombinasyonudur. RAID 50, çoklu
sürücülerde hem eşleme hem de disk şeritlemeyi içerir.
kurtarma hacmi Veri kurtarmak amacıyla oluşturulan hacim. Dell EqualLogic PS Serisi dizilerde, yük devretme
işleminin bir parçası olarak gelen bir eşleme sağlanarak bir kurtarma hacmi oluşturulur. Ayrıca
kurtarma hacimleri ve ince kurtarma klonları da oluşturabilirsiniz. Dell Compellent Depolama
Merkezinde, görüntü hacmi yeniden oynatmadan oluşturulur. Bkz. eşleme, Görüntü Hacmi, Yeniden
oynatma.
Yedeklilik Birincil kaynağın arızalanması durumunda ikincil kaynağın bunun yerini alacağından emin olmak
için bilgilerin veya donanım cihazı bileşenlerinin yinelenmesi. Dell Compellent Destek Merkezi her
bileşen için yedeklilik sağlar böylece tek bir arıza noktası yoktur. Tekli Yedeklilik, kaynaklardan biri
arızalandığında olabilecek veri kaybına karşı koruma sağlar. İkili Yedeklilik, kaynaklardan ikisi de
arızalandığında olabilecek veri kaybına karşı koruma sağlar.
Yedekli Bağımsız Diskler
Dizisi (RAID)
Yedekli bağımsız diskler dizisi. Veri yedekliliği sağlama yöntemi. RAID 0, RAID 1, RAID 5, RAID 10
ve RAID 50 gibi RAID'in bazı ortak uygulamaları. Bkz. yansıtma, şeritleme.
Uzaktan Anlık Yeniden
Oynatma
Yeniden oynatmanın uzaktan Dell Compellent Depolama Merkezine çoğaltıldığı Dell Compellent
Depolama Merkezi çözüm özelliği. Yerel ve uzaktan Dell Compellent Depolama Merkezleri aktifaktiftir ve çift yönlü çoğalma senkronize veya asenkronize olarak bağımsız aralıklarla
gerçekleşebilir. Dell Compellent Depolama Merkezi çoğaltması Kurumsal Yönetici yazılım
uygulamasının Çoğaltma lisansına sahip olmasını gerektirir. Bkz. Yeniden Oynatma, Uzak Sistem,
çoğaltma.
Uzaktan Kurulum
Sihirbazı (RSW)
Ana Bilgisayar Araçları/Microsoft Edition'ı yükledikten sonra Dell EqualLogic PS Serisi dizi
yapılandırmanızı sağlayan grafik kullanıcı arabirimi (GUI).
12Uzak Sistem Dell Compellent Depolama Merkezinde, Dell Compellent Depolama Merkezindeki orijinal hacimden
çoğaltma verisini almak üzere yapılandırılan farklı bir SAN. Dell Compellent Depolama Merkezi
çoğaltması Çoğaltma lisansına sahip Kurumsal Yönetici yazılım uygulamasını gerektirir. Bkz.
çoğaltma.
Yeniden oynatma Dell Compellent Depolama Merkezinde, kopyalama başladığında zaman noktasında göründüğü gibi
veri görüntüsü içeren tam kullanımlı, verilerin zaman noktası kopyası (PITC). Kopya yerel olarak
veya uzak bir Dell Compellent Depolama Merkezinde saklanabilir. Bkz. anlık görüntü, Anlık Veri
Yeniden Oynatma, Uzaktan Anlık Yeniden Oynatma.
Yeniden Oynatma Profili Dell Compellent Depolama Merkezinde, yeniden oynatma zaman noktası kopyalarının ne zaman ve
nasıl çekileceği ile nerede saklanacağını belirleyen kurallar seti. Bkz. Yeniden Oynatma.
Yeniden oynatma alanı Dell Compellent Depolama Merkezinde, yeniden oynatmalar için otomatik olarak ayrılan ve
kullanılan alan miktarı. Bkz. aktif alan, gerçek alan.
eşleme Dell EqualLogic PS Serisi hacminin zaman noktası temsili. Orijinal hacim ve bunun eşlemesi farklı
Dell EqualLogic PS Serisi gruplarında (eşleme çiftleri) potansiyel olarak felaket toleransı sağlamak
için coğrafi olarak ayrılmış şekilde yer alır.
eşleme toplaması Dell EqualLogic Grup Yöneticisinde, bir hacim toplamasının her eşlemesinden ortaya çıkan eşleme
seti.
eşleme toplama seti Dell EqualLogic Grup Yöneticisinde, bir hacim toplaması için replika toplama seti.
eşleme rezervi Dell EqualLogic Grup Yöneticisinde, belli bir hacim için olan eşleme setleri için ayrılan eşleme
çiftindeki atanan alan oranı. Eşleme rezervini birincil gruptaki hacim için yapılandırırsınız ancak
gerçek eşleme rezervi ikincil gruptadır.
eşleme seti Dell EqualLogic Grup Yöneticisinde, bir hacim için tüm eşleme seti, şablon hacim veya ince klon
hacmi.
eşleme sistemi Bir veya daha fazla yerel hacimden uzak bir Depolama Merkezine eşleme verisi göndermek için
yapılandırılan Dell Compellent Depolama Merkezi. Bkz. eşleme, Uzak Sistem, Uzaktan Anlık
Yeniden Oynatma.
eşleme işlemi Gerektiğinde verilerin iki SAN'dan birinden kurtarılması için hacim verilerinin (yalnızca delta) birincil
(yerel) SAN'dan ikincil (uzaktaki) SAN'a kopyalanması işlemi. SAN'lar birbirinden sınırsız bir
uzaklıkta olabilir.
eşleme çifti Dell EqualLogic Grup Yöneticisinde başka bir çiftten eşleme göndermek veya almak için
yapılandırılan grup.
RSW Bkz. Uzaktan Kurulum Sihirbazı.
çalıştırılabilir persona Dell AIM kapsamında, başlatılan ve bir ana bilgisayara atanmayı bekleyen ağ ile yüklenen persona.
SAN Bkz. Depolama Alanı Ağı.
SAN Ana Merkezi Tek bir grafik arayüzünden Dell EqualLogic PS Serisi gruplarını görüntülemenizi sağlar. Performans
verilerini ve diğer önemli grup bilgilerini toplar ve biçimlendirir.
SCN Bkz. Sistem Kontrol Ağı.
SCN Hizmetleri Persona ve VMRack'lerin Dell AIM ortamında aktif Denetleyiciyle iletişim kurmak için kullandığı
Denetleyici Sistemleri sanal IP adresi.
SCSI Bkz. Küçük Bilgisayar Sistemi Arabirimi.
13SDK Bkz. Yazılım Geliştirme Kiti.
ikincil kontrol modülü Dell EqualLogic Grup Yöneticisi ortamında, ikincil denetleyici modülü aktif kontrol modülünden
önbellek verisini yansıtır. Aktif kontrol modülünün çalışması durursa ikincil olan ağ işlemlerini
üstlenir. Bkz. aktif kontrol modülü.
ikincil grup Dell EqualLogic Grup Yöneticisi eşleme yapılandırmasında kaynak hacmin eşlemelerini alan grup.
Bkz. birincil grup.
Sunucu Kümesi Tekli bilgisayar arızaları durumunda kesintisiz hizmet sağlamak için tek bir sistem gibi çalışan
bağımsız bir sunucular grubu.
servis etiketi Dell'i teknik destek için aradığınızda sistemi tanımlamak için kullanılan etiket.
Basit Posta Aktarım
Protokolü (SMTP)
Mesajların Internet'te ana bilgisayarlar arasında gönderilmesini sağlamak için bir mesaj biçimi ve
iletim prosedürü tanımlar.
Basit Ağ Yönetim İletişim
Protokolü (SNMP)
Bir ağ yöneticisinin uzaktan iş istasyonlarını izlemesini ve yönetmesini sağlayan standart bir arayüz.
Simülatör Denetleyici, Konsol ve fiziksel ile sanal ağların dahil olduğu çalışan Dell AIM ortamına öykünen Dell
AIM SDK bileşeni. Bkz. SDK.
Küçük Bilgisayar Sistemi
Arabirimi (SCSI).
Küçük bilgisayar sistemi arabirimi. Standart ana bilgisayarlardan daha hızlı veri aktarımına sahip bir
G/Ç veriyolu arabirimi.
SMART Kendi Kendini İzleme Analizi ve Raporlama Teknolojisi. Sabit sürücülerin BIOS sistemine hatalarla
arızaları rapor etmesini ve ardından ekranda bir hata mesajı görüntülenmesini sağlar.
Akıllı Kopya Dell EqualLogic PS Serisi grubunda nesnelerin ASM/ME zaman noktası ve uygulama uyumlu
kopyası. Akıllı Kopyalar, kullandığınız Otomatik Anlık Görüntü sürümüne bağlı olarak anlık görüntü,
klon veya eşleme türünde olabilir.
SMP Bkz. simetrik çoklu işlem.
SMTP Basit Posta Aktarım Protokolü.
anlık görüntü Bir hacmin zaman noktası kopyası (PITC). Bkz. Yeniden oynatma.
anlık görüntü toplaması Bir hacim toplamasındaki anlık görüntü işleminin sonucu olan anlık görüntü seti. Bkz. hacim
toplama.
SNMP Bkz. Basit Ağ Yönetim İletişim Protokolü.
SNMP Tuzak Toplayıcı Dell AIM kapsamında, yönetilen anahtar ve diğer aygıtların, aktif Denetleyiciye SNMP tuzakları
göndermek için kullandığı Denetleyici Hizmetleri sanal IP adresi.
Yazılım Geliştirme Kiti
(SDK)
Belli bir yazılım paketi, yazılım çerçevesi, donanım platformu, bilgisayar sistemi, video oyun
konsolu, işletim sistemi veya benzer bir platform için uygulamalar oluşturmak amacıyla kullanılan
geliştirme araçları seti.
Alan Kurtarma Windows'un kullanıldığını rapor ettiği ancak Dell Compellent Depolama Merkezi tarafından
kullanılabilecek boş olan alanı kurtaran yardımcı program.
yedek disk Arızalanan sürücüyü değiştirmek için otomatik olarak kullanılan SAN'daki atanmış veya
kullanılmayan bir sürücü.
Depolama Alanı Ağı
(SAN)
Depolama alanı ağı (SAN), blok depolama kurallarını kullanarak yüksek performanslı ve yüksek
kullanımdaki depolama alt sistemlerine erişim sağlayan özel bir ağdır. SAN, ana bilgisayar
sunucularındaki ana bilgisayar veriyolu adaptörleri (HBA'lar), depolama trafiğini yönlendirmeye
14yardım eden anahtarlar ve disk depolama alt sistemleri gibi özel aygıtlardan oluşur. SAN'ın temel
özelliği, depolama alt sistemlerinin birden çok ana bilgisayar için aynı anda kullanılabilir olmasıdır,
böylece ölçülebilir ve esnek olurlar. NAS ile karşılaştırın.
Depolama Kümesi Dell Compellent Depolama Merkezinde, güvenilirliği, kullanılabilirliği, hizmet verebilirliği ve (yük
dengelemesiyle) performansı iyileştirmek amacıyla birbirine bağlı çoklu SAN denetleyiciler.
Depolama Merkezi otomatik denetleyici yük devretmesi sağlamak için aktif-aktif yapılandırma
kullanır. Her denetleyicideki tam olarak yansıtılan, pille desteklenen önbellek, yeniden başlatmada
veri güvenilirliği sağlar ve hacimlerin tekli denetleyici arızası durumunda denetleyiciler arasında
taşınmasını sağlar.
Depolama Kümelemesi Aktif-aktif yapılandırmada çoklu denetleyicilerle otomatik denetleyici yük devretmesi sağlayan Dell
Compellent Depolama Merkezi özelliği. Tam yansımalı, pille desteklenen önbellek hata toleransı ve
denetleyicinin arızalanması durumunda otomatik yeniden başlatma/kurtarma sağlar.
Depolama Havuzu Bkz. havuz.
Depolama Profili Dell Compellent Depolama Merkezinde, verinin depolanacağı sürücü türünü (katman) ve her
katman için kullanılacak RAID seviyesini belirleyen kurallar seti.
Depolama Türü Dell Compellent Depolama Merkezinde, depolama havuzundan alanın nasıl ayrılacağını ve
korunacağını kontrol eden yedeklilik seçenekleri ve blok boyutu gibi öznitelikler seti.
şeritleme Disk şeritleme, bir dizide veriyi üç veya daha fazla diske yazar ama her diskte alanın bir kısmını
kullanır. "Şerit" tarafından kullanılan alanın miktarı kullanılan her diskte aynıdır. Sanal bir disk bir
dizideki aynı disk setinde birden çok şerit kullanabilir. Bkz. yansıtma ve RAID.
simetrik çoklu işlem
(SMP)
Yüksek bant genişliği bağlantısı ile birbirine bağlı ve bir işletim sistemi (her işlemcinin G/Ç
aygıtlarına eşit erişim hakkı olduğu) tarafından yönetilen iki ya da daha fazla işlemciye sahip sistemi
tanımlamak için kullanılır.
eşitleme Bkz. Senkron Eşleme.
Senkron Eşleme Aynı veriyi, uygulama G/Ç tamamlama mesajını almadan önce farklı fiziksel donanımda saklanan iki
ayrı hacme atomik olarak yazan özellik. Her ikisi de ya tam ya da arızalı olarak yazılır, böylece her
iki hacim de her zaman tam olarak senkronizedir. Ancak özellik, uygulama için yazma gecikmesini
artırabilir. Bkz. eşitleme.
Sistem Kontrol Ağı (SCN) Dell AIM'in Denetleyici, personalar, ve VMRack'ler arasındaki iletişim için kullandığı özel
ağ. Denetleyici bu ağı aynı zamanda sunucuları keşfetmek ve bunların üzerindeki personalar ile
VMRack'leri başlatmak için kullanır.
Sistem Kurulum
programı
Sistem donanımının yapılandırılmasını ve parola koruma gibi özellikler ayarlayarak sistem
çalışmasının özelleştirilmesini sağlayan BIOS tabanlı program. Sistem Kurulum programı
NVRAM'da saklandığından, tüm ayarlar değiştirilene kadar etkili olarak kalır.
Sistem Dağıtım Araçları BT profesyonelleri için; disk görüntüleme, kullanıcı durum taşıması, uzaktan alan yönetimi, sistem
onarımı ve kurtarması ile bilgisayar envanter taraması ve değerlendirmesi gibi araçlar sağlayan
dağıtım yönetim çözümü. Ayrıca bilgisayar envanter taraması ve değerlendirmesi gibi dağıtım
öncesi ve sonrası yapılandırma görevlerini otomatik hale getirir ve disk, BIOS ile RAID
yapılandırması, yazılım dağıtımı ile yapılandırma yönetimini de otomatik hale getirir.
Sistem Yönetim Araçları BT profesyonelleri için envanter yönetimi, yazılım dağılımı, raporlar, ek yönetimi, varlık yönetimi,
yazma ve hizmet desteği gibi temel görevleri web tabanlı bir arabirimden gerçekleştirilmesini
sağlayan Dell KACE araçları tabanlı sistem yönetim çözümü.
15şablon Dell AIM kapsamında, (şablondaki değişiklikleri engellemek için) çalıştıramayacağınız ama diğer
personaları oluşturmak için klonlayabileceğiniz dormant persona.
şablon hacmi İnce klonları oluşturabileceğiniz salt okunur hacim.
ince klon Şablon hacmiyle alan paylaşan hacim. İnce klonlar, çok miktarda ortak veriye sahip olan çoklu
hacimleri içeren yapılandırmalar için depolama alanının etkili kullanımını sağlar.
Ölçülü kaynak sağlama SAN'da mevcut olan alanı fazla ön hazırlama (fazla abone olma) özelliği. Ölçülü kaynak sağlamayı
kullanan (hacimler gibi) depolama nesneleri potansiyel maksimum boyutlarını uygulamalara rapor
eder ama bundan çok daha az alan kullanabilir. Ölçülü kaynak sağlama kurumların genel depolama
giderlerini azaltmalarını, kullanılabilirliği artırmalarını ve daha iyi bir performansa kavuşmalarını
sağlar.
katmanlı depolama Hızlı ve sık olarak gereken verilerin genellikle pahalı, hızlı medya türlerinde ve nadir gerekli olan
verilerin daha az pahalı ve daha yavaş ortamlarda saklandığı depolama optimizasyon stratejisi.
yönetilmeyen alan Dell EqualLogic PS Serisi dizilerde birincil gruptan erişilmeyen ikincil gruptaki atanmış alan
kapasitesi.
yer-uydu bağlantı noktası Bir ağ hub'ı ya da anahtarı üzerinde bulunan ve bir çapraz bağlantı kablosu olmadan diğer hub ya
da anahtarlara bağlanmak için kullanılan yuva.
boşaltma Dell EqualLogic Grup Yöneticisinde, üyenin çevrim içi kaldığı şekilde üyeyi bir gruptan çıkarma.
Görüntü Hacmi Dell Compellent Depolama Merkezinde, veri kurtarma birincil amacıyla önceki bir yeniden
oynatmadan oluşturulmuş olan salt okunur hacim. Bkz. Yeniden oynatma.
Sanal Bağlantı Noktası
veya Sanal Bağlantı
Noktası Modu
Dell Compellent Depolama Merkezi kapsamında, Sanal Bağlantı Noktaları rezerv bağlantı noktası
ihtiyacını ortadan kaldırır. Sanal Bağlantı Noktası Modunda çalışırken tüm ön uç bağlantı noktaları
G/Ç'ı kabul eder ve Hata Etki Alanının bir parçası olabilir. Sanal Bağlantı Noktalarının devreye
alınmasıyla ilgili bilgi için Dell Compellent Depolama Merkezi Sistem Kurulum Kılavuzu'na bakın.
sanal World Wide Port
Adı (vWWPM)
Dell AIM'de SAN ile başlatılan personalar oluşturmak için kullanılan Sanal World Wide Port Adı.
Virtualization
(Sanallaştırma)
Tekli bir bilgisayar veya depolama aygıtının kaynaklarını çoklu ortamlarda paylaşmak için yazılım
kullanma yeteneği. Tekli bir fiziksel sistem veya aygıt kullanıcıya, çoklu işletim sistemlerini taşımaya
elverişli çoklu sanal sistem olarak görünebilir.
VMRack Aracı yazılım ile Red Hat Xen, VMware ESX veya Microsoft Hyper-V bir kombinasyonunu çalıştıran
sunucudaki sanal makinelerin (VM'ler) rafı.
hacim Depolama dizisi veya dizilerine şeritlenmiş olan depolama birimi.
hacim toplama Hacimlerde eş zamanlı olarak işlem gerçekleştirmek amacıyla gruplanmış hacim grupları. Bkz. anlık
görüntü toplaması, eşleme toplaması.
hacim rezervi Boş havuz alanından bir hacme ayrılan alan miktarı. Ölçülü kaynak sağlama olmadan hacim rezervi
rapor edilen boyutla aynıdır.
Hacim Türü Dell Compellent Depolama Merkezi kapsamında, Hacim Türü: dinamik, Yeniden oynatma açık veya
Eşleme olabilir. Hacim, en az bir yeniden oynatma bu hacimden alınana kadar dinamiktir. Bir
Yeniden oynatma hacimden alındıktan sonra Yeniden Oynatma açık hale gelir. Eşleme hacmi diğer
bir Dell Compellent Depolama Merkezi sistemine Eşlenendir.
vRack Dell AIM kapsamında, sanal bir anahtara (vRack anahtarı) bağlı olan bir mantıksal ana bilgisayar
grubudur.
16vRack anahtarı Dell AIM kapsamında, vRack'teki ana bilgisayarları bağlayan sanal bir anahtar.
vWWPN Bkz. sanal World Wide Port Adı.
1718Dell 词汇表 – 版本 2
词汇表词汇表
ACPI 请参阅高级配置和电源接口。
主动控制模块 对于双控制模块阵列中的 Dell EqualLogic PS Series 阵列,也就是在网络上主动提供 I/O
服务的控制模块。如果它停止正常工作,会故障转移到备用控制模块。请参阅备用控
制模块。
主动控制器 主动管理 Dell AIM 环境的 Dell AIM 控制器。
有效空间 在 Dell Compellent Storage Center 中,卷使用的空间大小(不包含重播)。此容量不包
括 RAID 的额外开销。请参阅重播。
实际空间 在 Dell Compellent Storage Center 中,卷有效空间加上重播空间的量。请参阅有效空间、
重播空间。
高级配置和电源接口
(ACPI)
用于启用操作系统以指导配置和电源管理的标准接口。
代理程序 在 Dell AIM 环境中(基于 Red Hat Xen 和 Microsoft Hyper-V 的 VMRack,加上角色),
安装在元件上的可选软件,控制器使用该软件管理元件和配置其网络属性。
无代理角色 没有安装 Dell AIM 代理程序的 Dell AIM 角色。
环境温度 系统所在的区域或房间的温度。
阵列成员 配置到 PS Series 组中的 Dell EqualLogic PS Series 阵列。组可以有多个成员。
阵列序列号 在 Dell EqualLogic PS Series 阵列环境中,被编码入阵列硬件中,独一无二的 Dell
EqualLogic PS Series 阵列标识字符串。请参阅服务标签。
ASM/ME 请参阅自动快照管理器/Microsoft 版。
ASM/VE 请参阅自动快照管理器/VMware 版。
资产管理工具 为 IT 专家准备的基于工具的 Dell KACE 资产管理解决方案,可用来跟踪软件和许可证
合规性。它通过基于 Web 的仪表板对资源清册、软件资产、版本、升级和计算机进行
自动化管理。
资产标签 分配给系统的独立代码,通常由管理员分配,用于安全保护或跟踪。
已分配磁盘 在 Dell Compellent Storage Center 中,为了便于管理和被用来存储卷和重播而分配给磁
盘文件夹的物理存储介质。请参阅磁盘文件夹、存储池。
分配模式 用于控制如何根据主机中 HBA 的可用性将角色和 VMRack 分配给主机的机制。请参阅
HBA。
异步复制 将数据先写入本地存储,然后在远程 SAN 上排队存储数据的过程。如果本地 SAN 在写
入操作被发送之前发生故障,复制可能会失败。请参阅复制、同步复制、和远程即时
重播。
自动 RAID 配置 在 Dell EqualLogic PS Series 组环境中,在阵列上配置用户选定的 RAID 策略的内部过
程。
自动快照管理器/
Microsoft 版 (ASM/ME)
用于 Microsoft 管理控制台的管理单元控制台应用程序,可让您管理智能副本。
自动快照管理器/
VMware 版 (ASM/VE)
与 VMware 虚拟环境一起使用的、基于 Web 的应用程序,可让您管理智能副本。
3可用空间 所有驱动器上的总可用存储量。
后端 在 Dell Compellent Storage Center 中,将控制器或存储群集(例如,控制器的冗余对)
连接到本地磁盘柜的专用单独网络。
后端网络 Dell Compellent Storage Center 控制器中控制器与磁盘之间的连接。
基卷(Dell EqualLogic
PS Series)
挂载到计算机上,并可通过其 Windows 分配的驱动器号(例如 G:)或挂载点访问的
卷。
基卷(Dell EqualLogic
Group Manager)
拥有快照的卷。快照取决于基卷。如果基卷已破坏,则快照已被删除。
底板管理控制器
(BMC)
实施 IPMI(智能平台管理接口)协议的服务器管理模块。在 Dell AIM 环境中,控制器
使用 BMC 远程控制某些型号的服务器。
刀片 对于 Dell AIM SDK,刀片是主机超类的元件。对于 Dell 模块化系统,刀片是指安装到
机柜中的模块化服务器。
BMC 请参阅底板管理控制器。
可启动介质 在无法从硬盘驱动器启动系统时用于启动系统的 CD、SD 卡或 USB 存储卡。
缓存 用于保存数据或指令的副本以进行快速数据检索的高速存储区域。
CHA 请参阅 Compellent 主机适配器。
质询握手身份验证协
议 (CHAP)
质询握手身份验证协议是使用加密的质询响应机制的网络登录协议,用于将对卷和快
照的访问限制于那些提供正确的用户名和密码的主机。CHAP 也可用于登录/管理员帐
户。
通道 在 Dell/AIM 环境中,您可以将最多八个物理连接之一分配给交换机端口并可以使用最
多八个物理 NIC 连接到角色。您可以将网络配置为首选一个或两个通道用于其通信
量,因此首选通道发生故障时通信量会透明地重新路由到其他通道。
CHAP 请参阅质询握手身份验证协议。
机箱式交换机 在 Dell AIM 环境中,机箱托架中的以太网交换机。机箱式交换机通过控制器进行管理。
客户端设备通信证书 在 EKM 环境中,允许客户端与服务器通信的特殊加密密钥。
群集节点 资源群集的物理成员,例如服务器群集中的主机或存储群集中的 SAN。
集合 在 ASM/ME 中,集合是存储对象(例如卷、快照或应用程序组件)的相关组,它通过
集合主节点下 ASM 控制台树中的节点表示。在 Dell EqualLogic Group Manager 中,卷和
副本集合以及自定义快照集合出现在卷视图下的层次结构中。
Compellent 主机适配
器 (CHA)
每个 Dell Compellent Storage Center 控制器中安置的内部缓存卡/电池。写入缓存存储
器镜像到缓存卡。在双控制器 Dell Compellent Storage Center 中,控制器 1 的缓存卡容
纳控制器 2 的镜像,控制器 2 的缓存卡容纳控制器 1 的镜像。在单控制器 Dell
Compellent Storage Center 中,缓存卡容纳单一控制器的镜像。
配置 描述 Dell AIM 环境整个内容和配置的数据库。
保留模式 在 Dell Compellent Storage Center 中,当剩余可用空间降至临界阈值(通常为 10%,最
多 32 GB)时进入数据保留模式。在保留模式下,Dell Compellent Storage Center 会生成
警报,阻止创建新卷,并以较快的速率开始让重播过期以释放空间。请参阅紧急模式。
控制台 基于 Web 的用户界面,用于监控 Dell AIM 环境中的元件并与它们一起工作。Dell AIM
控制台通过 Dell AIM 控制器托管。
4控制模块 Dell EqualLogic PS Series 阵列中的物理处理器和接口组件。控制模块包含闪存中的
Dell EqualLogic PS Series 固件并为缓存存储器中存储的数据提供临时电源连续性。控
制模块有多个网络接口和一个可选的串行端口。阵列可包含两个可热交换的双冗余控
制器。主动控制模块提供 I/O 服务,而备用控制模块镜像其缓存中的数据。
控制面板 系统的一部分,包含指示灯和控件(例如电源按钮和电源指示灯)。
控制端口 iSCSI 发起程序(服务器)连接以发出存储请求的目标 iSCSI 端口。在配置用于虚拟端
口模式的 Dell Compellent Storage Center 中,将为每个 iSCSI 故障域创建一个控制端口,
从而将 iSCSI 通信量重定向到相应的虚拟端口上。
控制器 (Dell AIM) 管理物理和虚拟硬件、软件以及网络配置并托管 Dell AIM 控制台的软件。在一对弹性
控制器的环境中,每个控制器在专用服务器上运行,但在共享文件系统上共享一个配
置数据库以及其他密钥文件。
控制器 (Dell
Compellent)
提供磁盘聚合 (RAID)、I/O 路由、错误检测和数据恢复。为整个 Dell Compellent Storage
Center 子系统提供智能管理。每个 Storage Center 系统包含至少一个控制器。Storage
Center 和推荐的纠错操作以改进系统的性能和可用性。
控制器服务 在 Dell AIM 环境中,控制器用户用于与系统控制网络 (SCN)、托管的交换机、控制台
和 CLI 等进行通信的一个或多个虚拟 IP 地址。默认情况下,这是主动控制器上的单一
虚拟 IP 地址,但您可以指定唯一的地址用于 SCN 服务和 SNMP Trap Collector。
Copilot 服务 在 Dell Compellent Storage Center 内,集中式支持、产品培训和销售资源的组合,能够
主动监控系统并建议纠错操作以改进系统的性能和可用性。
复制-镜像-迁移 允许卷在不同磁盘类型和 RAID 级别之间迁移的 Dell Compellent Storage Center 功能。
凭证存储 在 EKM 环境中,容纳跨会话凭证信息的存储库。凭证信息是诸如用户名、密码和证书
等的安全数据。
加密对象 一种保护数据的方法。
数据收集器 在服务器后台运行的 Dell Compellent Enterprise Manager 组件,用于收集连接到该服务
器的所有 Dell Compellent Storage Center 系统上的信息。
数据即时重播 一项 Dell Compellent Storage Center 功能,能够以定义的间隔捕获本地 SAN 上卷的高空
间效率时间点副本 (PITC),从而提供将卷回滚到以前时间点的能力。请参阅重播、快
照。
数据分级管理 一项 Dell Compellent Storage Center 功能,根据 I/O 活动(需求)级别将数据页自动迁移
到性能较高或较低的设备。请参阅分层存储。
DDR 请参阅双倍数据速率。
委派空间 在 Dell EqualLogic Group Manager 环境中,组中留出用于存储合作伙伴所接收副本的空
间。
Dell Encryption Key
Manager (EKM)
Dell Encryption Key Manager (EKM) 通过管理 Dell 磁带自动化解决方案的密钥,进而保护
存储在 LTO 磁带上的数据。
Dell 远程访问控制器
(DRAC)
提供带外管理工具的接口卡。该控制器有自己的处理器、内存、网络连接和系统总线
访问权限,并允许系统管理员跨网络远程控制系统。
设备驱动程序 使得操作系统或某些其他程序能够与外围设备正确接口的程序。
DHCP 请参阅动态主机配置协议。
数字多用途磁盘 数字多用途光盘或数字视频光盘 (DVD)。
5磁盘文件夹 在 Dell Compellent Storage Center 中,可由用户查看和管理的物理存储介质设备(磁盘、
SSD)的集合。磁盘文件夹可确定从其分配卷存储空间的存储池。尽管磁盘文件夹可
关联多个存储池,但通过将所有磁盘分配给同一文件夹和存储池可最大发挥出 Dell
Compellent Storage Center 的性能优势。
磁盘位置 在 Dell Compellent Storage Center 中,磁盘驱动器在其机柜内的插槽位置,以行-列表
示。例如,磁盘位置 01-02 指插槽位于从上数的第一行和从左数的第二列。
DNS 请参阅域名系统。
域名系统 (DNS) 将 Internet 域名(如 www.example.com)转换成 IP 地址(如 208.77.188.166)的方法。
休眠角色 在 AIM 环境中,当前没有在主机上运行(或等待运行)的角色。
双倍数据速率 (DDR) 双倍数据速率。内存模块中使用的一种技术,可在时钟周期的上升脉冲和下降脉冲均
传输数据,有可能成倍提高数据速率。
DRAC 请参阅 Dell 远程访问控制器。
DRAM 请参阅动态随机存取存储器。
双冗余 在 Dell Compellent Storage Center 中,用于防止失去两个驱动器中任何一个的存储配置
文件选项(通常通过使用 RAID 10 和/或 RAID 6)。
DVD 请参阅数字多用途光盘。
动态主机配置协议
(DHCP)
一种将 IP 地址自动分配给客户端系统的方法。
动态随机存取存储器
(DRAM)
系统的 RAM 通常全部由 DRAM 芯片组成。
EKM 请参阅 Dell Encryption Key Manager。
EKM 管理员 在 EKM 环境中,可创建或删除用户和组的超级用户。
EKM 加密管理员
(tklmadmin)
在 EKM 环境中,创建或删除密钥和设备的日常用户。
紧急模式 在 Dell Compellent Storage Center 中,当系统由于没有更多可用空间而无法再操作时进
入的模式。在紧急模式下,所有服务器 I/O 都将被拒绝,所有卷都将脱机且无法恢复联
机,直到释放足够的磁盘空间以退出紧急模式。请参阅保留模式。
机柜 为多个磁盘或刀片提供单个接口、电源和冷却功能的物理机柜。
环境 在 Dell AIM 环境中,通过 Dell AIM 控制器管理的硬件、软件和网络配置的集合。
Eth0 请参阅以太网端口 0。
Eth1 请参阅以太网端口 1。
以太网端口 0 (Eth0) 在 Dell Compellent Storage Center 中,Eth0 是专用于管理的以太网接口。
以太网端口 1 (Eth1) 在 Dell Compellent Storage Center 中,Eth1 是专用于控制器之间的进程间通信(用于群
集或远程复制)的以太网接口。
外部网络 在 Dell AIM 环境环境中,并非 Dell AIM 环境的组成部分,但从物理和逻辑上连接到该
环境的网络。
外部交换机 在 Dell AIM 环境环境中,并非 Dell AIM 环境的组成部分,但从物理和逻辑上连接到该
环境的交换机。
6结构 充当统一路由基础设施的互连交换机的组合。它允许在 SAN 上的设备之间有多个连
接并且可透明地添加新设备。在网络上存在至少有一台交换机的 FC(或 iSCSI)拓扑。
FastTrack 可选的 Dell Compellent Storage Center 公用程序,用于动态地将最活跃数据放在外部(更
快)磁盘磁轨上。
FAT 请参阅文件分配表。
故障域 在 Dell Compellent Storage Center 环境内,故障域标识了故障转移集合。在虚拟端口模
式下,所有前端端口均可成为一个故障域的组成部分。在传统模式下,每个主要端口
和保留端口可创建一个故障域。
FC 请参阅光纤信道。
FE 请参阅前端网络。
光纤信道 (FC) 用于将服务器连接到控制器和后端磁盘柜的高速互连。FC 组件包括 HBA、总线、集线
器、交换机和电缆。术语 FC 还指允许数据传输速率高达每秒 10 千兆位的高速、全双
工串行通信协议。
文件分配表 (FAT) MS-DOS 用于组织和记录文件存储的文件系统结构。Microsoft Windows 操作系统可选
择使用 FAT 文件系统结构。
文件传输协议 (FTP) 用于在计算机或主机之间传输批量数据文件的应用程序层协议。
前端网络 (FE) Dell Compellent Storage Center 中的组件,启动数据写入的 SAN 数据流写入(从服务器
到交换机,再到控制器,然后到磁盘)。一般而言,服务器(或交换机)是控制器的
前端。不过,将数据复制到远程系统的 Storage Center 系统相对于远程系统为前端。请
参阅后端。
FTP 请参阅文件传输协议。
GB 请参阅千兆字节。
千兆字节 (GB) 1024 兆字节或 1,073,741,824 字节。不过,当指硬盘驱动器容量时,该术语通常取整为
1,000,000,000 字节。
组 请参阅 PS Series 组。
HBA 请参阅主机总线适配器。
HIT/LE 请参阅适用于 Linux 的主机集成工具。
HIT/ME 请参阅适用于 Windows 的主机集成工具。
HIT/VM 请参阅适用于 VMware 的主机集成工具。
主机 在 Dell AIM 环境中,主机可为物理服务器(机架安装式或刀片)或虚拟机。在 Dell AIM
SDK 中,为包括刀片服务器、机架安装式服务器和虚拟机 (VM) 的超类。
主机适配器 用于实现系统总线与外围设备(通常是存储设备)之间通信的控制器。
主机总线适配器 (HBA) 将服务器连接到 SAN(存储区域网络)的设备,通常为附加卡。每个 HBA 在 SAN 上通
过其 WWPN(全球通用端口号)进行唯一标识。常见的 HBA 类型包括光纤信道和
iSCSI。
适用于 Linux 的主机集
成工具 (HIT/LE)
一套将 ESX 系统与 Dell EqualLogic PS Series 存储阵列集成的工具,包括自动快照管理
器/VMware 版 (ASM/VE)、EqualLogic Datastore Manager 和 EqualLogic Virtual Desktop
Deployment 公用程序。
7适用于 Windows 的主
机集成工具 (HIT/ME)
一套可以配置和管理阵列的应用程序,包括 ASM/ME、DSM(多路径 I/O 设备特定模
块)和 RSW(远程设置向导)。
适用于 VMware 的主
机集成工具 (HIT/VM)
一套将 Linux 系统与 Dell EqualLogic PS Series 存储阵列集成的工具,包括远程设置向导
命令行界面 (RSWCLI)、EqualLogic 主机性能和配置优化套件 (eqltune) 和 EqualLogic 日志
收集工具 (eqllog)。
热备用磁盘 在 Dell Compellent Storage Center 环境中,热备用磁盘是一个备份磁盘。如果活动阵列
发生故障,控制器会将热备用磁盘并入当前阵列并立即重建数据。尽管热备用可在无
人为干预下变为活性磁盘,请记住尽快更换发生故障的驱动器,使得阵列再次通过新
的热备用进行保护。热备用可跨多个磁盘柜。Storage Center 热备用的容量可与其更
换的数据驱动器不同。
热插拔 在系统通电且正在运行的情况下,将某一设备(通常是硬盘驱动器或内部冷却风扇)
插入或安装到主机系统中的功能。也称为热交换。
热交换 请参阅热插拔。
I/O 输入/输出。键盘是输入设备,显示器是输出设备。通常,I/O 活动与计算活动可区分
开来。
ID 在 Dell AIM 环境中,其中元件的唯一标识符,在其添加到该环境时进行分配。
iDRAC 请参阅集成 Dell 远程访问控制器。
IKEv2-SCSI 一种用于证书创建的协议。
映像 特定于 Dell AIM,存储在角色或 VMRack 启动的磁盘或存储阵列上的实际字位,伴随控
制器用于在特定类型主机上启动该映像的信息。例如,您可以使用多个映像配置角色
或 VMRack,以便同一角色可在物理服务器或虚拟机上启动。
infiniBand infiniBand 提供点对点双向串行链路,用于连接处理器和高速外围设备。
即时重播 请参阅数据即时重播。
集成 Dell 远程访问控
制器 (iDRAC)
使用 Internet SCSI 协议的远程访问控制器。
智能平台管理接口
(IPMI)
一种通过某些服务器中的管理模块实施的协议,用于远程控制服务器。Dell 服务器中
的刀片管理模块实施 iPMI。
互连交换机 Dell AIM 环境中的交换机,通过控制器管理,用于互连元件,例如机箱、vRack、其他
互连交换机和外部交换机。
internet SCSI (iSCSI) Internet SCSI(请参阅 SCSI)。一种封装标准 SCSI 命令用于 IP 网络上客户端服务器
(iSCSI 启动程序)和网络存储设备(iSCSI 目标)之间通信的协议。
IPMI 请参阅智能平台管理接口。
iSCSI 请参阅 Internet SCSI。
密钥管理互操作性协
议 (KMIP)
设置用于企业密钥管理系统和加密系统之间通信的标准。
密钥服务端口 操作系统用于在 EKM 中通信的端口。
密钥组 在 EKM 中,分配给特定部门、区域或硬件类型的一组密钥。
密钥 用于保护 EKM 中数据的加密证书。
密钥库/密钥组/主密钥
库
EKM 中的一组加密密钥。
8KMIP 请参阅密钥管理互操作性协议。
Java 数据库连接
(JDBC)
Java 编程语言的 API,定义客户端如何去访问、查询和更新数据库中数据的方式。
JDBC 请参阅 Java 数据库连接。
主控制器 双控制器 Dell Compellent Storage Center 中的主控制器。通常,主控制器和对等控制器
共享存储 I/O 负载,基本上为双倍吞吐量,但只有主控制器执行外部管理功能。如果一
个控制器发生故障,剩余的控制器将变为或保持为主控制器并承担两个控制器的责任。
请参阅对等控制器。
传统模式 在 Dell Compellent Storage Center 中,故障域被配置为通过冗余设备连接的、专属成对
主要和保留的前端端口,作为针对单点故障保护存储通信量的机制。请参阅故障域、
虚拟端口或虚拟端口模式。
线性磁带开放 (LTO) 一种开放式标准磁带格式。
逻辑单元号码 (LUN) 逻辑单元是一个存储磁盘或一组磁盘的概念性分支(子单元)。每个逻辑单元都有可
唯一标识该单元的地址,称为逻辑单元号 (LUN)。
LTO 请参阅线性磁带开放。
LTO 密钥组叠加 在 EKM 中,一旦默认密钥组用完后被指定使用的一组密钥。
LUN 请参阅逻辑单元号。
MAC 地址 请参阅介质访问控制地址。
托管磁盘 在 Dell Compellent Storage Center 中,分配给磁盘文件夹以便将这些设备与存储池关联
起来的存储介质设备(磁盘、SSD)。请参阅存储池、磁盘文件夹。
托管系统 托管系统是使用 Dell OpenManage Server Administrator 监控和管理的任何系统。
管理 IP 地址 用于连接到启用智能 IP 的设备以便监控或管理该设备的地址。该地址可以专门由管
理应用程序独占使用或共享以供管理和服务应用程序使用。
管理网络 将 iSCSI 通信量(卷 I/O)与管理通信量(GUI 和 CLI 会话,以及其他组管理通信和组间
操作)分开的可选管理网络。
管理工作站 用于从中央位置远程管理一个或多个托管系统的系统。
手动重播 允许用户手动创建卷的时间点副本的 Dell Compellent Storage Center 功能。
手动传送复制 通过可携带介质而不是网络完成的复制。在复制伙伴之间的网络链路过慢或不适合传
输大量数据的情况下使用。
手动传输公用程序 Dell EqualLogic 的一个独立公用程序,通过可携带介质而不是网络执行卷复制。该公用
程序有图形和命令行用户界面。
介质访问控制地址
(MAC 地址)
您的系统在网络上的唯一硬件编号。
迁移卷 一条 Dell Compellent Storage Center 命令,用于将数据从一个卷移动到另一个卷。
迁移 在 EKM 环境中,在 Dell Encryption Key Manager 3.0 安装期间(而不是之后)将一个密
钥库组合到现有密钥库中。
卷镜像 一条 Dell Compellent Storage Center 命令,用于将本地卷复制到远程 Dell Compellent
Storage Center,并在本地卷和远程卷之间保持更新,直到镜像被手动断开。
镜像 一种数据冗余类型,使用一组物理驱动器存储数据,并使用一组或多组额外的驱动器
存储这些数据的副本。镜像功能由软件提供。请参阅分拆、RAID。
9NAS 请参阅网络连接存储。
网络连接 定义角色和 VMRack 所需网络连接的对象。在将元件添加到网络时创建网络连接,例
如,当您将角色添加到网络时。
网络连接存储 (NAS) NAS 是用于在网络上实施共享存储的概念之一。NAS 系统有其自己的操作系统、集成
硬件和软件,它们经过优化,可以满足特定的存储需要。
NTP 网络时间协议 (NTP) 是通过数据包交换、可变延迟数据网络同步计算机系统时钟的协
议。
过度订阅空间 在支持精简配置的 SAN 中,配置为可用但物理上不存在的存储空间量(即,已配置空
间减去可用空间)。
奇偶校验分拆 在 RAID 阵列中,包含奇偶校验数据的已分拆硬盘驱动器。
分区 使用 fdisk 命令创建的硬盘驱动器的物理区域。随后可使用 format 命令将分区划分为
多个逻辑驱动器。
被动控制器 充当热备用的 Dell AIM 控制器,准备在主动控制器发生故障时接管管理环境。
对等控制器 在双控制器 Dell Compellent Storage Center 中,对等控制器与主控制器共享 I/O 负载但不
执行外部管理功能。如果主控制器发生故障,对等控制器将承担两个控制器的 I/O 和管
理责任。请参阅主控制器。
角色 磁盘中捕获的服务器环境:在 Dell AIM 环境中的主机上运行应用程序所需的操作系统、
可选的 Dell AIM 代理程序软件以及网络和其他设置。
池 SAN 中可供卷使用的存储空间。在 Dell Compellent Enterprise Storage Manager 和 Dell
Compellent Storage Center 中,这等同于 SAN 中的总空间。在 Dell EqualLogic PS Series
阵列中,这等同于特定池成员中的总空间。
池管理员 Dell EqualLogic PS Series 组中的一个帐户,拥有仅在组的一个特定池或一组池中管理对
象的权限。请与组管理员进行比较。
主要组 在 Dell EqualLogic Group Manager 环境内,包含复制伙伴关系中的原始卷的组。请参阅
备用组。
主要卷 在 Dell EqualLogic Group Manager 环境内,配置用于复制到复制伙伴的卷。
PS Series 阵列 单个 Dell EqualLogic iSCSI 存储单元,通常配置为 Dell EqualLogic PS Series 组。您可以
将多个 PS Series 阵列加入到较大的 PS Series 组并将其作为单个 iSCSI SAN 进行管理。
PS Series 组 包含一个或多个 Dell EqualLogic PS Series 存储阵列的 iSCSI 存储实体,可通过单一 IP 地
址访问并作为存储区域网络 (SAN) 进行管理。
公共服务 在 Dell AIM 环境中,用于连接到主动控制器上的控制台或 CLI 的控制器服务虚拟 IP 地
址。
RAC 远程访问控制器。
RAID 请参阅独立磁盘冗余阵列。
RAID 0 数据跨可用磁盘拆分以提供改进的性能。RAID 0 不提供任何数据冗余。
RAID 10 数据跨可用磁盘驱动器拆分并镜像,提供数据可用性和改进的性能。保存至少卷上所
有数据的一个完整副本。RAID 10 提供最佳读/写性能,提高了承受多次故障的机率,
并可实现最快的数据还原。
10RAID 5 通过数学方式推导出的旋转奇偶校验条带来保持数据的逻辑副本。奇偶校验条带来自
数据条带。此方法的冗余信息开销比 RAID 10 少,不过由于在每次写入时计算奇偶校验
条带而导致写入性能比 RAID 10 差。读取性能与 RAID 10 类似。
RAID 50 RAID 级别 50 是 RAID 级别 5 和 RAID 级别 0 的组合。RAID 50 包括跨多个驱动器的奇偶
校验和磁盘拆分。
恢复卷 出于恢复数据目的而创建的卷。在 Dell EqualLogic PS Series 阵列中,通过升级入站副
本集作为故障转移操作的组成部分而创建了恢复卷。您还可以创建恢复模板卷和恢复
精简克隆。在 Dell Compellent Storage Center 中,视图卷创建自重播。请参阅副本、视
图卷、重播。
冗余 复制信息或硬件设备组件以确保在主要资源发生故障时,备用资源可接管其功能。Dell
Compellent Storage Center 为每个组件提供冗余来避免发生单点故障。单冗余可防止在
任一资源发生故障时丢失数据。双冗余可在任何两个资源发生故障时防止丢失数据。
独立磁盘冗余阵列
(RAID)
独立磁盘冗余阵列。一种提供数据冗余的方法。一些常见的 RAID 实施包括 RAID 0、
RAID 1、RAID 5、RAID 10 和 RAID 50。请参阅镜像、拆分。
远程即时重播 Dell Compellent Storage Center 解决方案功能,该功能将重播复制到远程 Dell Compellent
Storage Center。本地和远程 Dell Compellent Storage Centers 是主动-主动状态,并且可
按独立的间隔进行同步或异步双向复制。Dell Compellent Storage Center 复制需要
Enterprise Manager 软件应用程序及复制许可证。请参阅重播、远程系统、复制。
远程设置向导 (RSW) 用于在安装了 Host Integration Tools/Microsoft 版后配置 Dell EqualLogic PS Series 阵列的
图形用户界面 (GUI)。
远程系统 在 Dell Compellent Storage Center 中,一个单独的 SAN 配置为从本地 Dell Compellent
Storage Center 上的原始卷接收复制数据。Dell Compellent Storage Center 复制需要
Enterprise Manager 软件应用程序及复制许可证。请参阅复制。
重播 在 Dell Compellent Storage Center 中,包含在发起复制的时间点出现之数据映像的完全
可用的数据时间点副本 (PITC)。该副本可本地存储或在远程 Dell Compellent Storage
Center 上存储。请参阅快照、数据即时重播、远程即时重播。
重播配置文件 在 Dell Compellent Storage Center 中,确定何时以及如何制作重播时间点副本及其保存
时长的一组规则。请参阅重播。
重播空间 在 Dell Compellent Storage Center 中,自动保留并用于重播的空间量。请参阅主动空间、
实际空间。
副本 Dell EqualLogic PS Series 卷的时间点表示。原始卷及其副本位于不同的 Dell EqualLogic
PS Series 组(复制伙伴)上,这些组可能有一些地理距离间隔以便于灾难容错。
副本集合 在 Dell EqualLogic Group Manager 中,卷集合的每次复制所形成的一组副本。
副本集合集 在 Dell EqualLogic Group Manager 中,卷集合的一组副本集合。
副本保留 在 Dell EqualLogic Group Manager 中,复制伙伴上留出用于特定卷副本集的委派空间部
分。您可配置副本保留用于主要组中的卷,但实际副本保留位于备用组中。
副本组 在 Dell EqualLogic Group Manager 中,卷、模板卷或精简克隆卷的一组完整副本。
复制系统 配置为将复制数据从一个或多个本地卷发送到远程 Storage Center 的Dell Compellent
Storage Center。请参阅复制、远程系统、远程即时重播。
复制 将卷数据(仅增量)从主要(本地)SAN 复制到备用(远程)SAN,以便数据必要时
可从任一 SAN 进行恢复的过程。SAN 可相隔无限距离。
复制伙伴 在 Dell EqualLogic Group Manager 中,配置为从另一个伙伴发送或接收副本的组。
11RSW 请参阅远程设置向导。
可运行的角色 在 Dell AIM 环境中,已启动并等待分配给主机的网络启动角色。
SAN 请参阅存储区域网络。
SAN HeadQuarter 使您能够从单个图形界面监控多个 Dell EqualLogic PS Series 组。它会收集并格式化性
能数据和其他重要的组信息。
SCN 请参阅系统控制网络。
SCN 服务 Dell AIM 环境中的角色和 VMRack 用于与主动控制器进行通信的控制器服务虚拟 IP 地
址。
SCSI 请参阅小型计算机系统接口。
SDK 请参阅软件开发工具包。
备用控制模块 在 Dell EqualLogic Group Manager 环境内,备用控制模块从主动控制模块镜像缓存数据。
如果主动控制模块停止正常工作,备用控制模块会接管网络操作。请参阅主动控制模
块。
备用组 在 Dell EqualLogic Group Manager 复制配置中,接收源卷副本的组。请参阅主要组。
服务器群集 一组独立的服务器,作为单个系统一起工作以在单个计算机出现故障的情况下提供不
中断的服务。
服务标签 系统上的标签,用于在致电 Dell 寻求技术支持时来唯一标识系统。
简单邮件传输协议
(SMTP)
定义消息格式和转发程序以便能够在 Internet 上的主机之间发送邮件。
简单网络管理协议
(SNMP)
使网络管理员可远程监控和管理工作站的标准接口。
模拟器 Dell AIM SDK 的一个组件,可模拟运行的 Dell AIM 环境,包括控制器、控制台以及物理
网络和虚拟网络。请参阅 SDK。
小型计算机系统接口
(SCSI)
小型计算机系统接口。一种 I/O 总线接口,具有比标准端口更快的数据传输速率。
SMART 自我监控分析和报告技术,允许硬盘驱动器向系统 BIOS 报告错误和故障,然后将错误
信息显示在屏幕上。
智能副本 Dell EqualLogic PS Series 组中对象的 ASM/ME 时间点、应用程序一致性副本。智能副本
的类型可以是快照、克隆或副本,具体视您所使用的 Auto-Snapshot Manager 版本而
定。
SMP 请参阅对称多处理。
SMTP 请参阅简单邮件传输协议。
快照 卷的时间点副本 (PITC)。请参阅重播。
快照集合 卷集合上的快照操作形成的一组快照。请参阅卷集合。
SNMP 请参阅简单网络管理协议。
SNMP 陷阱收集器 在 Dell AIM 环境中,管理用于将 SNMP 陷阱发送到主动控制器的交换机和其他设备的
控制器服务虚拟 IP 地址。
软件开发工具包 (SDK) 一组开发工具,用于创建特定软件包、软件框架、硬件平台、计算机系统、视频游戏
控制台、操作系统或类似平台的应用程序。
12空间恢复 用于恢复 Windows 报告为正在使用但实际为空、可供 Dell Compellent Storage Center 使
用的空间的公用程序。
备用磁盘 SAN 中指定或未使用的驱动器,用于自动替换发生故障的驱动器。
存储区域网络 (SAN) 存储区域网络 (SAN) 是可以访问使用块存储协议的高性能和高可用性存储子系统的专
用网络。SAN 由特定设备组成,例如主机服务器中的主机总线适配器 (HBA)、帮助路
由存储通信量的交换机以及磁盘存储子系统。SAN 的主要特征是存储子系统通常可同
时用于多台主机,从而使其可扩展并非常灵活。请与 NAS 进行比较。
存储群集 在 Dell Compellent Storage Center 中,出于改进可靠性、可用性、易于维修和性能(通
过负载平衡)目的而互连的多个 SAN 控制器。Storage Center 使用主动-主动配置提供
自动控制器故障转移功能。每个控制器中完全镜像的、电池供电的缓存可确保重新启
动时的数据可靠性并允许卷在单个控制器出现故障的情况下在控制器之间迁移。
存储群集化 一项 Dell Compellent Storage Center 功能,它通过主动-主动配置中的多个控制器提供自
动控制器故障转移功能。完全镜像的、电池供电的缓存在控制器出现故障的情况下提
供容错和自动重启/恢复功能。
存储池 请参阅池。
存储配置文件 在 Dell Compellent Storage Center 中,一组用于定义在其上存储数据的驱动器类型(层)
以及用于每个层的 RAID 级别的规则。
存储类型 在 Dell Compellent Storage Center 中,一组用于控制如何从存储池分配和保护空间的属
性,包括冗余选项和块大小。
拆分 磁盘拆分会跨阵列中的三个或更多个磁盘写入数据,但仅使用每个磁盘中的部分空
间。“条带”所用的空间量在每个所用的磁盘上相同。虚拟磁盘可在阵列中的同一组磁
盘上使用多个条带。另请参阅镜像和 RAID。
对称多处理 (SMP) 用于描述一个系统,该系统具有两个或多个通过高带宽链路连接但由操作系统管理的
处理器,其中每个处理器对 I/O 设备具有同等的访问权限。
同步 请参阅同步复制。
同步复制 在应用程序接收 I/O 完成消息之前,将相同的数据自动写入两个存储在不同物理硬件上
的单独卷中的功能。两个写入都完成或失败,因此两个卷始终完全同步。不过,该功
能会增加应用程序的写入延迟。请参阅同步。
系统控制网络 (SCN) Dell AIM 用于在控制器、角色和 VMRack 之间进行通信的专用网络。控制器还使用此网
络查找服务器以及启动服务器上的角色和 VMRack。
系统设置程序 一个基于 BIOS 的程序,可以通过设置功能(例如密码保护)配置系统的硬件和自定
义系统的操作。由于系统设置程序存储在 NVRAM 中,因此任何设置在更改前都保持
有效。
系统部署工具 一个基于工具的 Dell KACE 部署管理解决方案,适用于 IT 专家,提供用于磁盘映像、
用户状态迁移、远程站点管理、系统修理和恢复以及计算机资源清册扫描和评估的工
具。此外,它将自动处理部署前和部署后配置任务,例如计算机资源清册扫描和评估;
它还会自动进行磁盘、BIOS 和 RAID 配置、软件分发以及配置管理。
系统管理工具 一个基于工具的 Dell KACE 系统管理解决方案,适用于 IT 专家,将通过基于 Web 的界
面进行的任务,例如资源清册管理、软件分发、报告、修补程序管理、资产管理、脚
本编写和服务台支持,实现了流水线作业。
模板 在 Dell AIM 环境中,您可以克隆用于创建其他角色但不能运行(以防止更改模板)的
休眠角色。
模板卷 可用于创建精简克隆的只读卷。
13精简克隆 与模板卷共享空间的卷。精简克隆可有效使用存储空间用于配置具有大量通用数据的
多个卷。
精简配置 可让您过度配置(或过度订阅)SAN 中可用空间的功能。使用精简配置的存储对象(例
如,卷)会向应用程序报告其潜在的最大大小,但可能实际使用的空间要少得多。精
简配置使组织可缩减其总体存储开支,提高可用性和实现更好的性能。
分层存储 存储优化策略,其中快速、且经常需要的数据存储在昂贵、高速介质类型上,而较少
需要的数据则存储在便宜、慢速介质类型上。
未托管的空间 在 Dell EqualLogic PS Series 阵列中,不再能从主要组访问的,备用组上的委派空间容
量。
上行链路端口 网络集线器或交换机上用于连接其他集线器或交换机(无需绞接电缆)的端口。
空出 在 Dell EqualLogic Group Manager 中,在保持组成员联机时从组中移除该成员。
视图卷 在 Dell Compellent Storage Center 中,利用以前的重播创建的只读卷,主要目的为用于
恢复数据。请参阅重播。
虚拟端口或虚拟端口
模式
在 Dell Compellent Storage Center 环境中,虚拟端口不再需要保留端口。在虚拟端口模
式下操作时,所有前端端口都会接受 I/O 并可成为一个故障域的组成部分。有关启用虚
拟端口的信息,请参阅《Dell Compellent Storage Center 系统设置指南》。
虚拟全球通用端口名
称 (vWWPM)
Dell AIM 中用于创建 SAN 引导角色的虚拟全球通用端口名称。
Virtualization(虚拟化)使用软件跨多个环境共享单一计算机或存储设备资源的能力。单一物理系统或设备可
能对用户显示为能够托管多个操作系统的多个虚拟系统。
VMRack 其上运行代理程序软件以及 Red Hat Xen、VMware ESX 或 Microsoft Hyper-V 的组合的服
务器上虚拟机 (VM) 的机架。
卷 拆分为一个或多个存储设备的独立存储单元。
卷集合 出于在卷上同时执行操作目的而组合在一起的多个卷。请参阅快照集合、复制集合。
卷保留 从可用池空间分配给卷的空间量。如果没有精简配置,卷保留与报告的大小相同。
卷类型 在 Dell Compellent Storage Center 环境中,卷类型可以是“动态”、“重播启用”或“复制”。
卷是动态的,直到制作了该卷的至少一个重播。一旦制作了卷的重播,它将变为“重播
启用”。“复制”卷是被复制到其他 Dell Compellent Storage Center 系统的卷。
vRack 在 Dell AIM 环境中,连接到虚拟交换机(vRack 交换机)的主机逻辑组。
vRack 交换机 在 Dell AIM 环境中,连接 vRack 中主机的虚拟交换机。
vWWPN 请参阅虚拟全球通用端口名称。
14
Dell™ PowerEdge™
T605 Systems
Getting Started With
Your System
Guide de mise en route
Primeiros passos com o sistema
Procedimientos iniciales con el sistemaDell™ PowerEdge™
T605 Systems
Getting Started With
Your SystemNotes, Notices, and Cautions
NOTE: A NOTE indicates important information that helps you make better use
of your computer.
NOTICE: A NOTICE indicates either potential damage to hardware or loss of data
and tells you how to avoid the problem.
CAUTION: A CAUTION indicates a potential for property damage, personal injury,
or death.
____________________
Information in this document is subject to change without notice.
© 2007 Dell Inc. All rights reserved.
Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly
forbidden.
Trademarks used in this text: Dell and the DELL logo are trademarks of Dell Inc.; AMD and AMD Opteron
are registered trademarks of Advanced Micro Devices; Microsoft, Windows and Windows Server are
registered trademarks of Microsoft Corporation; Red Hat and Red Hat Enterprise Linux are registered
trademarks of Red Hat, Inc.; SUSE is a registered trademark of Novell Inc.
Other trademarks and trade names may be used in this document to refer to either the entities claiming
the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks
and trade names other than its own.
Model SCM
November 2007 P/N GM693 Rev. A00Getting Started With Your System 3
System Features
This section describes the major hardware and software features of your
system. It also provides information about other documents you may
need when setting up your system and how to obtain technical assistance.
• One or two dual-core or quad-core AMD™ Opteron™ processors.
NOTE: Use the System Setup program to view processor information.
See theHardware Owner’s Manual.
• A minimum of 1 GB (single-processor systems) or 2 GB (two-processor
systems) of 533 or 667 MHz registered parity DDR-II memory modules.
Memory is upgradable to a maximum of 32 GB (two-processor systems)
by installing combinations of 512-MB, 1-GB, 2-GB, or 4-GB memory
modules in the eight memory module sockets on the system board.
• Support for up to four 3.5-inch, internal non-hot-pluggable or hotpluggable (when available) Serial Attached SCSI (SAS) or SATA hard
drives. A controller expansion card is required for SAS hard drives or
for more than two SATA hard drives.
• One 3.5-inch peripheral drive bay for the optional diskette drive, and
two 5.25-inch bays for the following supported drives: DVD-ROM,
combination CD-RW/DVD, DVD+RW, or tape backup device.
NOTE: DVD devices are data only.
• An intrusion switch that signals the appropriate systems management
software if the cover is opened.
• A 650-W non-redundant power supply, or an optional hot-pluggable
675-W power supply in a 1 + 1 redundant configuration.4 Getting Started With Your System
The system board includes the following integrated features:
• SATA controller that supports up to two cabled SATA hard drives,
and up to two of the following supported devices: DVD-ROM,
CD-RW/DVD combination drive, DVD+RW, or SATA tape
backup device.
NOTE: DVD devices are data only.
• One 133-MHz PCI-X expansion slot, three PCI Express (PCIe) x4
expansion slots, and one PCIe x8 expansion slot.
• An integrated ATI RN50 2D graphics controller with a minimum of 32 MB
of graphics memory. Maximum resolution is 1280 x 1024 with 65,536
colors; graphics are supported in the following resolutions: 640 x 480,
800 x 600, 1024 x 768, and 1280 x 1024.
• An integrated Gigabit NIC, capable of supporting 1000-Mbps, 100-Mbps,
or 10-Mbps data rates, with support for PXE, Wake-on-LAN, TCP/IP
Offload Engine (TOE), and iSCSI offload and boot.
• An integrated Trusted Platform Module (TPM) version 1.2 used for
security applications, capable of generating and storing keys and storing
passwords and digital certificates. (Not available in China.)
• Eight USB 2.0-compliant connectors (two on the front, one internal
for a bootable memory key, and five on the back) capable of supporting
a diskette drive, a DVD-ROM drive, a keyboard, a mouse, or a USB flash
drive.
• Optional Remote Access Controller (RAC) for remote systems
management.
• Standard Baseboard Management Controller (BMC) with serial
and LAN access.
• Back-panel connectors include serial, video, five USB connectors,
and one NIC connector.
• Front-panel connectors include two USB connectors.
• Front-panel LCD for system ID and error messaging.
For more information about specific features, see “Technical Specifications”
on page 10.Getting Started With Your System 5
Supported Operating Systems
Your system supports the following operating systems:
• Microsoft® Windows Server® 2008 Standard and Enterprise (32-bit x86)
Editions
• Microsoft Windows Server 2008 Standard and Enterprise (x64) Editions
• Microsoft Windows® Small Business Server 2008 Standard and Premium
Editions
• Microsoft Windows Server 2003 Standard and Enterprise (32-bit x86)
Editions with SP2
• Microsoft Windows Server 2003 Standard and Enterprise (x64) Editions
with SP2
• Microsoft Windows Server 2003 R2 Standard and Enterprise (32-bit x86)
Editions with SP2
• Microsoft Windows Server 2003 R2 Standard and Enterprise (x64)
Editions with SP2
• Microsoft Windows Small Business Server 2003 R2 Standard
and Premium Editions with SP2
• Red Hat® Enterprise Linux® ES and AS (version 4.5) (x86_32)
• Red Hat Enterprise Linux ES and AS (version 4.5) (x86_64)
• Red Hat Enterprise Linux Server 5 (x86_32)
• Red Hat Enterprise Linux Server 5 (x86_64)
• SUSE® Linux Enterprise Server 9 (SP4) (x86_64)
• SUSE Linux Enterprise Server 10 (x86_64)
NOTE: For the latest information on supported operating systems,
see www.dell.com.6 Getting Started With Your System
Other Information You May Need
CAUTION: The Product Information Guide provides important safety and
regulatory information. Warranty information may be included within this
document or as a separate document.
• The Hardware Owner’s Manual provides information about system
features and describes how to troubleshoot the system and install
or replace system components.
• CDs included with your system provide documentation and tools
for configuring and managing your system.
• Updates are sometimes included with the system to describe changes
to the system, software, and/or documentation.
NOTE: Always check for updates on support.dell.com and read the updates
first because they often supersede information in other documents.
• Release notes or readme files may be included to provide last-minute
updates to the system or documentation or advanced technical reference
material intended for experienced users or technicians.
• Operating system documentation describes how to install (if necessary),
configure, and use the operating system software.
• Documentation for any components you purchased separately provides
information to configure and install these options.
Obtaining Technical Assistance
If you do not understand a procedure in this guide or if the system
does not perform as expected, see your Hardware Owner’s Manual.
Dell Enterprise Training and Certification is available; see
www.dell.com/training for more information. This service may not be
offered in all locations.Getting Started With Your System 7
Installation and Configuration
CAUTION: Before performing the following procedure, read and follow the safety
instructions and important regulatory information in your Product Information
Guide.
NOTICE: Make sure there are no physical obstructions within 30 cm (12 inches)
of the front of the system and 61 cm (24 inches) of the rear of the system.
This may cause a decrease in airflow, which could cause your system to overheat.
This section describes the steps to set up your system for the first time.
Unpack the System
Upack your system and identify each item. Keep all shipping materials in case
you need them later.8 Getting Started With Your System
Connect the Keyboard, Mouse, and Monitor
Connect the keyboard, mouse, and monitor (optional).
The connectors on the back of your system have icons indicating which
cable to plug into each connector. Be sure to tighten the screws (if any)
on the monitor's cable connector.
Connect the System to Power
Connect the monitor’s power cable to the monitor (optional), and connect
the system’s power cable(s) to the system.Getting Started With Your System 9
Installing the Power Cord Retention Bracket
Attach the power cord retention bracket on the right bend of the power
supply handle. Bend the system power cable into a loop as shown in the
illustration and attach to the bracket’s cable clasp. Repeat the procedure
for the second power supply.
Plug the other end of the power cable(s) into a grounded electrical outlet
or a separate power source such as an uninterrupted power supply (UPS)
or a power distribution unit (PDU).
Turn on the System and Monitor
Press the power button on the system and the monitor (optional). The power
indicators should light. Adjust the monitor's controls until the displayed
image is satisfactory.10 Getting Started With Your System
Complete the 0perating System Setup
If you purchased a preinstalled operating system, see the operating system
documentation that ships with your system. To install an operating system
for the first time, see the Quick Installation Guide. Be sure the operating system
is installed before installing hardware or software not purchased with the
system.
Technical Specifications
Processor
Processor type One or two dual- or quad-core
AMD™ Opteron™ processors
Expansion Bus
Bus type PCIe and PCI-X
Expansion slots
PCIe One x8 full-height, full-length 3.3-V
(slot 4)
Three x4 full-height, full-length 3.3-V
(slots 1 through 3)
PCI-X One full-height, full-length 3.3-V (slot 5)
One internal USB key socket
Memory
Architecture 128-bit DDR II SDRAM DIMMs, rated
for 533-MHz or 667-MHz operation
Memory module sockets Eight 240-pin
Memory module capacities 512 MB, 1 GB, 2 GB, or 4 GB
Minimum RAM 1 GB (one processor) or 2 GB
(two processors)
Maximum RAM 16 GB (one processor) or 32 GB
(two processors)Getting Started With Your System 11
Drives
Hard drives Up to four 3.5-inch internal non-hot-plug
or hot-plug (when available) SAS or SATA
Diskette drive One optional internal 3.5-inch, 1.44-MB
Optical drives Up to two optional internal DVD-ROM
(SATA or PATA), DVD+RW (SATA or
PATA), or CD-RW/DVD combination
(SATA) drives
NOTE: DVD devices are data only.
External optional USB DVD
Tape drive One optional internal half-height,
5.25-inch SAS, SATA, or SCSI
External optional USB tape backup
device
Flash drive External optional USB
Internal optional USB
Connectors
Back
NIC One RJ-45 (for Broadcom Gigabit LOM)
Serial 9-pin, DTE, 16550-compatible
USB Five 4-pin, USB 2.0-compliant
Video 15-pin VGA
Front
USB Two 4-pin, USB 2.0-compliant
Internal
USB One 4-pin, USB 2.0-compliant12 Getting Started With Your System
Video
Video type Integrated
Video memory 32 MB (minimum)
Power
AC power supply
Wattage 650 W (non-redundant power supply)
675 W (redundant power supply)
Voltage 100-240VAC, 6.0-3.0A, 50/60 Hz
Heat dissipation 624 BTU/Hour (non-redundant
power supply)
574 BTU/Hour (redundant power supply)
CMOS backup battery CR 2032 3.0-V lithium ion coin cell
Physical
Height 456 mm (17.95 inches)
Width 210 mm (8.27 inches)
Depth 635 mm (25 inches)
Weight (maximum configuration) 27 kg (59.52 lb)Getting Started With Your System 13
Environmental
NOTE: For additional information about environmental measurements for specific
system configurations, see dell.com/environmental_datasheets.
Temperature
Operating 10° to 35°C (50° to 95°F)
Storage –40° to 65°C (–40° to 149°F)
Relative humidity
Operating 20% to 80% (noncondensing)
with a maximum humidity gradient
of 10% per hour
Storage 5% to 95% (noncondensing)
Maximum vibration
Operating 0.26 Grms, 5 to 350 Hz at 0.0002 G2/Hz
Storage 1.54 Grms, 10 to 250 Hz
at 0.003 to 0.01 G2/Hz
Maximum shock
Operating 27 G +/– 10% with pulse duration
of 2.6 msec +/– 10%
Storage 71 G +/– 10% with pulse duration
of 2 msec +/– 10%, 32G +/– 5% with
velocity change of 235 ips +/– 5%
Altitude
Operating –15.2 to 3,048 m (–50 to 10,000 ft)
Storage –15.2 to 10,600 m (–50 to 35,000 ft)
Airborne contaminant level
Class G2 or lower as defined
by ISA-S71.04-198514 Getting Started With Your SystemSystèmes Dell™
PowerEdge™ T605
Guide de mise en routeRemarques, avis et précautions
REMARQUE : Une REMARQUE indique des informations importantes
qui peuvent vous aider à mieux utiliser votre ordinateur.
AVIS : Un AVIS vous avertit d'un risque de dommage matériel ou de perte
de données et vous indique comment éviter le problème.
PRÉCAUTION : Une PRÉCAUTION indique un risque potentiel d'endommagement
du matériel, de blessure corporelle ou de mort.
____________________
Les informations contenues dans ce document peuvent être modifiées sans préavis.
© 2007 Dell Inc. Tous droits réservés.
La reproduction de ce document de quelque manière que ce soit sans l'autorisation écrite de Dell Inc.
est strictement interdite.
Marques utilisées dans ce document : Dell et le logo DELL sont des marques de Dell Inc. ;
AMD et AMD Opteron sont des marques déposées d'Advanced Micro Devices ; Microsoft, Windows
et Windows Server sont des marques déposées de Microsoft Corporation ; Red Hat et Red Hat Enterprise
Linux sont des marques déposées de Red Hat, Inc. ; SUSE est une marque déposée de Novell Inc.
D'autres marques et noms de marques peuvent être utilisés dans ce document pour faire référence
aux entités se réclamant de ces marques et de ces noms ou à leurs produits. Dell Inc. dénie tout intérêt
propriétaire vis-à-vis des marques et des noms de marque autres que les siens.
Modèle SCM
Novembre 2007 N/P GM693 Rév. A00Guide de mise en route 17
Caractéristiques du système
Cette section décrit les principales caractéristiques matérielles et logicielles
du système. Elle contient également des informations sur d'autres documents
pouvant être utiles à la configuration du système et indique comment obtenir
une assistance technique.
• Un ou deux processeurs AMD™ Opteron™ double coeur ou quadruple
coeur.
REMARQUE : Utilisez le programme de configuration du système pour
visualiser les informations concernant les processeurs. Reportez-vous
au document Hardware Owner's Manual (Manuel du propriétaire).
• Barrettes de mémoire DDR-II à registres et avec parité, représentant
un minimum de 1 Go (systèmes monoprocesseur) ou de 2 Go (systèmes
bi-processeur) et cadencées à 533 ou 667 MHz. La mémoire est extensible
à un maximum de 32 Go (systèmes bi-processeur) via l'installation de
combinaisons de barrettes de 512 Mo, 1 Go, 2 Go ou 4 Go dans les huit
emplacements mémoire de la carte système.
• Prise en charge d'un maximum de quatre disques durs internes SAS
(Serial Attached SCSI) ou SATA de 3,5 pouces, enfichables à chaud ou
non (selon disponibilité). Une carte contrôleur d'extension est requise
pour les disques durs SAS, ou si vous utilisez plus de deux disques durs
SATA.
• Une baie de périphérique de 3,5 pouces pouvant accueillir le lecteur de
disquette en option, et deux baies de 5,25 pouces prenant en charge les
lecteurs suivants : lecteur de DVD-ROM, lecteur combo CD-RW/DVD,
lecteur de DVD+RW ou unité de sauvegarde sur bande.
REMARQUE : Les périphériques DVD sont uniquement des périphériques
de données.
• Un détecteur d'intrusion qui transmet une alerte aux logiciels de gestion
de systèmes appropriés en cas d'ouverture du capot de l'ordinateur.
• Un bloc d'alimentation de 650W non redondant, ou un bloc
d'alimentation de 675 W enfichable à chaud dans une configuration
redondante 1 + 1 (en option).18 Guide de mise en route
La carte système offre les caractéristiques suivantes :
• Contrôleur SATA prenant en charge jusqu'à deux disques durs SATA
connectés par câble, et jusqu'à deux périphériques parmi les suivants :
lecteur de DVD-ROM, lecteur combo CD-RW/DVD, lecteur de
DVD+RW ou périphérique SATA de sauvegarde sur bande.
REMARQUE : Les périphériques DVD sont uniquement des périphériques
de données.
• Un logement d'extension PCI-X à 133-MHz, trois logements d'extension
PCI Express (PCIe) x4 et un logement d'extension PCIe x8.
• Un contrôleur vidéo 2D intégré ATI RN50 avec au moins 32 Mo
de mémoire vidéo. La résolution maximale prise en charge est de
1280 x 1024 avec 65536 couleurs. Les graphiques sont pris en charge
dans les résolutions suivantes : 640 x 480, 800 x 600, 1024 x 768
et 1280 x 1024.
• Un NIC Gigabit intégré prenant en charge des débits de données
de 1000, 100 ou 10 Mbps, ainsi que les fonctions suivantes :
PXE, Wake-on-LAN, moteur de décentralisation TCP/IP (TOE),
déchargement et amorçage iSCSI.
• Puce TPM (Trusted Platform Module) intégrée version 1.2, utilisée
pour la sécurité des applications et pouvant générer et mémoriser des
clés, des mots de passe et des certificats numériques (non disponible
en Chine).
• Huit connecteurs USB 2.0 (deux à l'avant, cinq à l'arrière et
un connecteur interne pour une clé de mémoire amorçable).
Ces connecteurs permettent de brancher un lecteur de disquette
ou de DVD-ROM, un clavier, une souris ou un lecteur flash USB.
• Un contrôleur RAC (Remote Access Controller) en option, pour la
gestion de systèmes à distance.
• Un contrôleur BMC (Baseboard Management Controller) standard
avec accès série et réseau local.
• Panneau arrière comprenant des connecteurs série et vidéo, des ports
USB (5) et un connecteur de NIC.Guide de mise en route 19
• Panneau avant comprenant deux connecteurs USB.
• Écran LCD du panneau avant affichant l'ID du système et les messages
d'erreur.
Pour plus d'informations sur des caractéristiques spécifiques,
voir “Spécifications techniques”, à la page 24.
Systèmes d'exploitation pris en charge
Le système prend en charge les systèmes d'exploitation suivants :
• Microsoft® Windows Server® 2008, éditions Standard et Enterprise
(32 bits, x86)
• Microsoft Windows Server 2008, éditions Standard et Enterprise (64 bits)
Editions
• Microsoft Windows® Small Business Server 2008, éditions Standard
et Premium
• Microsoft Windows Server 2003 éditions Standard et Enterprise
(32 bits, x86) avec SP2
• Microsoft Windows Server 2003 éditions Standard et Enterprise (64 bits)
avec SP2
• Microsoft Windows Server 2003 R2 éditions Standard et Enterprise
(32 bits, x86) avec SP2
• Microsoft Windows Server 2003 R2 éditions Standard et Enterprise
(64 bits) avec SP2
• Microsoft Windows Small Business Server 2003 R2 éditions Standard
et Premium avec SP2
• Red Hat® Enterprise Linux® ES et AS (version 4.5, x86_32)
• Red Hat Enterprise Linux ES et AS (version 4.5, x86_64)
• Red Hat Enterprise Linux Server 5 (x86_32)
• Red Hat Enterprise Linux Server 5 (x86_64)
• SUSE® Linux Enterprise Server 9 (SP4, x86_64)
• SUSE Linux Enterprise Server 10 (x86_64)
REMARQUE : Pour obtenir les informations les plus récentes sur les systèmes
d'exploitation pris en charge, rendez-vous sur le site www.dell.com.20 Guide de mise en route
Autres informations utiles
PRÉCAUTION : Le document Product Information Guide (Guide d'information
sur le produit) contient d'importantes informations se rapportant à la sécurité
et aux réglementations. Les informations sur la garantie se trouvent soit dans
ce document, soit à part.
• Le document Hardware Owner's Manual (Manuel du propriétaire)
contient des informations sur les caractéristiques du système, ainsi
que des instructions relatives au dépannage et à l'installation ou
au remplacement de composants.
• Les CD fournis avec le système contiennent des documents
et des outils relatifs à la configuration et à la gestion du système.
• Des mises à jour sont parfois fournies avec le système. Elles décrivent
les modifications apportées au système, aux logiciels et/ou à la
documentation.
REMARQUE : Vérifiez toujours si des mises à jour sont disponibles sur
le site support.dell.com et lisez-les en premier, car elles remplacent souvent
les informations contenues dans les autres documents.
• Si des notes d'édition ou des fichiers lisez-moi (readme) sont fournis,
ils contiennent des mises à jour de dernière minute apportées au système
ou à la documentation, ou bien des informations techniques avancées
destinées aux utilisateurs expérimentés ou aux techniciens.
• La documentation du système d'exploitation indique comment installer
(au besoin), configurer et utiliser le système d'exploitation.
• La documentation fournie avec les composants achetés séparément
contient des informations permettant de configurer et d'installer
ces options.Guide de mise en route 21
Obtention d'une assistance technique
Si vous ne comprenez pas une procédure décrite dans ce guide ou
si le système ne réagit pas comme prévu, reportez-vous au document
Hardware Owner's Manual (Manuel du propriétaire).
Des formations et certifications Dell Enterprise sont disponibles. Pour plus
d'informations, consultez le site www.dell.com/training. Ce service n'est
disponible que dans certains pays.
Installation et configuration
PRÉCAUTION : Avant de commencer la procédure suivante, lisez et appliquez
les consignes de sécurité et les informations importantes sur les réglementations
figurant dans le document Product Information Guide (Guide d'information sur
le produit).
AVIS : Vérifiez que l'espace situé autour du système est dégagé sur au moins
30 cm (12 pouces) à l'avant et 61 cm (24 pouces) à l'arrière. Si cette condition
n'est pas respectée, le système risque de surchauffer en raison d'une ventilation
insuffisante.
Cette section décrit les opérations à effectuer lors de la configuration initiale
du système.
Déballage du système
Sortez le système de son emballage et identifiez chaque élément. Conservez
les matériaux d'emballage au cas où vous en auriez besoin ultérieurement.22 Guide de mise en route
Connexion du clavier, de la souris et du moniteur
Connectez le clavier et la souris, ainsi que le moniteur (si nécessaire).
Utilisez les icônes des connecteurs situés à l'arrière du système pour
savoir où insérer chaque câble. N'oubliez pas de serrer les vis situées
sur le connecteur du câble du moniteur, s'il en est équipé.
Branchement du système sur le secteur
Branchez les câbles d'alimentation appropriés (un sur le moniteur [si nécessaire]
et un sur le système).Guide de mise en route 23
Installation du support de fixation du câble d'alimentation
Fixez le support du câble sur la partie droite de la poignée du bloc d'alimentation. Faites une boucle comme indiqué dans l'illustration et insérez le câble
d'alimentation dans le clip du support. Recommencez cette procédure pour
le second bloc d'alimentation.
Branchez ensuite l'autre extrémité du câble sur une prise de courant mise
à la terre ou sur une source d'alimentation autonome (onduleur ou unité
de distribution de l'alimentation [PDU]).
Mise sous tension du système et du moniteur
Appuyez sur le bouton d'alimentation du système, puis sur celui du
moniteur (si nécessaire). Les voyants d'alimentation doivent s'allumer.
Réglez le moniteur jusqu'à ce que l'image soit correctement affichée.24 Guide de mise en route
Finalisation de l'installation du système
d'exploitation
Si vous avez acheté un système d'exploitation préinstallé, consultez tout
d'abord la documentation associée, qui a été fournie avec l'ordinateur.
Si vous installez un système d'exploitation pour la première fois, consultez
le document Quick Installation Guide (Guide d'installation rapide).
Veillez à installer le système d'exploitation avant tout élément matériel
ou logiciel acheté séparément.
Spécifications techniques
Processeur
Type de processeur Un ou deux processeurs AMD™ Opteron™
double coeur ou quadruple coeur
Bus d'extension
Type de bus PCIe et PCI-X
Logements d'extension
PCIe Un emplacement x8 pleine longueur/
pleine hauteur à 3,3 V (logement 4)
Trois emplacements x4 pleine
longueur/pleine hauteur à 3,3 V
(logements 1 à 3)
PCI-X Un emplacement pleine longueur/
pleine hauteur à 3,3 V (logement 5)
Un connecteur interne pour clé USBGuide de mise en route 25
Mémoire
Architecture Barrettes DIMM de SDRAM DDR II
(128 bits), cadencées à 533 ou 667 MHz
Connecteurs mémoire Huit à 240 broches
Capacité des barrettes de mémoire 512 Mo, 1 Go, 2 Go ou 4 Go
RAM minimale 1 Go (avec un seul processeur) ou 2 Go
(avec deux processeurs)
RAM maximale 16 Go (avec un seul processeur) ou 32 Go
(avec deux processeurs)
Lecteurs
Disques durs Jusqu'à quatre disques durs SAS ou SATA
internes de 3,5 pouces, enfichables à chaud
ou non (selon disponibilité)
Lecteur de disquette Un lecteur interne 3,5 pouces de 1,44 Mo
(en option)
Lecteurs optiques Jusqu'à deux lecteurs internes en option
parmi les suivants : DVD-ROM (SATA
ou PATA), DVD+RW (SATA ou PATA)
ou CD-RW/DVD (SATA)
REMARQUE : Les périphériques DVD sont
uniquement des périphériques de données.
Un lecteur de DVD USB externe
(en option)
Lecteur de bande Un lecteur interne de 5,25 pouces,
mi-hauteur, de type SAS, SATA ou SCSI
(en option)
Unité de sauvegarde sur bande USB
externe (en option)
Lecteur Flash USB externe en option
USB interne en option26 Guide de mise en route
Connecteurs
Arrière
NIC Un connecteur RJ-45 (pour carte Broadcom Gigabit
avec fonction LAN sur la carte mère [LOM])
Série Connecteur DTE à 9 broches, compatible 16550
USB Cinq connecteurs à 4 broches, compatibles USB 2.0
Vidéo VGA, 15 broches
Avant
USB Deux connecteurs à 4 broches, compatibles USB 2.0
Interne
USB Un connecteur à 4 broches, compatible USB 2.0
Vidéo
Type de vidéo Intégrée
Mémoire vidéo 32 Mo (minimum)
Alimentation
Bloc d'alimentation en CA
Puissance 650 W (bloc d'alimentation non redondant)
675 W (bloc d'alimentation redondant)
Tension 100-240 VCA ; 6,0-3,0 A ; 50/60 Hz
Dissipation thermique 624 BTU/h (157,25 kcal/h – bloc d'alimentation
non redondant)
574 BTU/h (144,65 kcal/h – bloc d'alimentation
redondant)
Pile de sauvegarde CMOS Pile bouton au lithium-ion CR2032 (3 V)
Caractéristiques physiques
Hauteur 456 mm (17,95 pouces)
Largeur 210 mm (8,27 pouces)
Profondeur 635 mm (25 pouces)
Poids (configuration maximale) 27 kg (59,52 livres)Guide de mise en route 27
Environnement
REMARQUE : Pour plus d'informations concernant les mesures d'exploitation
liées à différentes configurations spécifiques, rendez-vous à l'adresse
dell.com/environment_datasheets.
Température
Fonctionnement De 10° à 35°C (50 à 95°F)
Stockage De -40° à 65°C (-40° à 149°F)
Humidité relative
Fonctionnement De 20% à 80% (sans condensation)
avec un gradient d'humidité maximal
de 10% par heure
Stockage De 5% à 95% (sans condensation)
Tolérance maximale aux vibrations
Fonctionnement 0,26 Grms ; 5 à 350 Hz à 0,0002 G2/Hz
Stockage 1,54 Grms ; 10 à 250 Hz ;
0,003 à 0,01 G2/Hz
Choc maximal
Fonctionnement 27 G +/- 10% avec une durée
d'impulsion de 2,6 msec +/- 10%
Stockage 71 G +/- 10% avec une durée d'impulsion
de 2 msec +/- 10%, 32G +/- 5% avec un
changement de vitesse de 235 ips +/- 5%
Altitude
Fonctionnement -15,2 à 3048 m (-50 à 10000 pieds)
Stockage -15,2 à 10600 m (-50 à 35000 pieds)
Contaminants en suspension dans l'air
Classe G2 ou inférieure selon
la norme ISA-S71.04-198528 Guide de mise en routeSistemas Dell™
PowerEdge™ T605
Primeiros passos
com o sistemaNotas, avisos e advertências
NOTA: As NOTAS fornecem informações importantes que o ajudam a utilizar
melhor o computador.
AVISO: As mensagens de AVISO informam sobre possíveis danos ao hardware
ou perda de dados e indicam como evitar o problema.
ADVERTÊNCIA: As mensagens de ADVERTÊNCIA indicam possíveis danos
de propriedade, ferimentos pessoais ou morte.
____________________
As informações contidas neste documento estão sujeitas a alterações sem aviso prévio.
© 2007 Dell Inc. Todos os direitos reservados.
Fica proibida a reprodução por quaisquer meios sem a permissão por escrito da Dell Inc.
Marcas comerciais utilizadas neste texto: Dell e o logotipo da DELL são marcas comerciais da Dell Inc.;
AMD e AMD Opteron são marcas registradas da Advanced Micro Devices; Microsoft, Windows
e Windows Server são marcas registradas da Microsoft Corporation; Red Hat e Red Hat Enterprise
Linux são marcas registradas da Red Hat, Inc.; SUSE é marca registrada da Novell Inc.
Outras marcas e nomes comerciais podem ser mencionados neste documento em referência
às entidades proprietárias das marcas e nomes ou seus produtos. A Dell Inc. renuncia ao direito
de qualquer participação em nomes e marcas comerciais que não sejam de sua propriedade.
Modelo SCM
Novembro de 2007 N/P GM693 Rev. A00Primeiros passos com o sistema 31
Recursos do sistema
Esta seção descreve os principais recursos de hardware e software do sistema.
Também fornece informações sobre outros documentos de que talvez
necessite quando configurar o sistema e sobre como obter assistência técnica.
• Um ou dois processadores AMD™ Opteron™ Dual core ou Quad core.
NOTA: Use o programa de configuração do sistema para visualizar
informações sobre o processador. Consulte o Manual do proprietário
de hardware.
• Mínimo de 1 GB (sistemas com um processador) ou 2 GB (sistemas
com dois processadores) com módulos de memória DDR-II de paridade
registrada de 533 ou 667 MHz. A memória pode ser atualizada até
o máximo de 32 GB (sistemas com dois processadores) por meio da
instalação de combinações de módulos de memória de 512 MB, 1 GB,
2 GB ou 4 GB nos oito soquetes para módulos de memória existentes
na placa do sistema.
• Suporte para até quatro unidades de disco rígido SAS (Serial Attached
SCSI) ou SATA de 3,5 polegadas, internas e com ou sem conexão
automática (se disponível). É necessária uma placa de expansão de
controlador para as unidades de disco rígido SAS ou para mais de
duas unidades SATA.
• Um compartimento periférico de 3,5 polegadas para a unidade de
disquete opcional e dois compartimentos de 5,25 polegadas para
as seguintes unidades compatíveis: DVD-ROM, combinação de
CD-RW/DVD, DVD+RW ou dispositivo de backup de fita.
NOTA: Os dispositivos de DVD destinam-se somente a dados.
• Uma chave de violação que sinaliza ao software de gerenciamento
de sistemas adequado quando a tampa superior é aberta.
• Uma fonte de alimentação de 650 W não redundante ou uma com
conexão automática opcional. Fonte de alimentação de 675 W em
uma configuração redundante 1 + 1.32 Primeiros passos com o sistema
A placa de sistema inclui os seguintes recursos:
• Controlador SATA que suporta até duas unidades de disco rígido SATA
cabeadas e até dois dos seguintes dispositivos compatíveis: DVD-ROM,
combinação de unidades CD-RW/DVD, DVD+RW ou dispositivo
de backup de fita.
NOTA: Os dispositivos de DVD destinam-se somente a dados.
• Um slot de expansão PCI-X de 133 MHz, três PCI Express (PCIe) x4
e um PCIe x8.
• Um controlador gráfico ATI RN50 2D integrado com memória gráfica
mínima de 32 MB. A resolução máxima é de 1280 x 1024 com 65.536 cores
e os gráficos têm suporte nas seguintes resoluções: 640 x 480, 800 x 600,
1024 x 768 e 1280 x 1024.
• Uma placa NIC Gigabit integrada, capaz de suportar taxas de dados de
1000 Mbps, 100 Mbps ou 10 Mbps, com suporte para PXE, Wake-on-LAN,
TCP/IP Offload Engine (TOE) e inicialização/descarregamento iSCSI.
• Um módulo de plataforma confiável (Trusted Platform Module, TPM)
integrado versão 1.2, usado para aplicativos de segurança, capaz de gerar
e armazenar chaves de memória e armazenar senhas e certificados digitais
(não disponível na China).
• Oito conectores compatíveis com USB 2.0 (dois na parte frontal, um
na parte interior para dispositivos de memória de inicialização e cinco
na parte traseira) capazes de suportar unidades de disquete, uma unidade
de DVD-ROM, um teclado, um mouse ou uma unidade flash USB.
• Controlador de acesso remoto (RAC) para o gerenciamento remoto
de sistemas.
• Processador de serviço (BMC) padrão com acesso serial e LAN.
• Os conectores do painel traseiro incluem um conector serial,
um conector de vídeo, um conector paralelo cinco conectores USB
e um conector NIC.
• Os conectores do painel frontal incluem dois conectores USB.
• Um visor LCD de 1x5 pol. no painel frontal para visualização
da identificação do sistema e de mensagens de erro.
Para obter mais informações sobre recursos específicos, consulte a seção
“Especificações técnicas” na página 39.Primeiros passos com o sistema 33
Sistemas operacionais admitidos
O sistema admite os seguintes sistemas operacionais:
• Microsoft® Windows Server® 2008, edições Standard e Enterprise
(x86 de 32 bits)
• Microsoft Windows Server 2003, nas edições x64 Standard e Enterprise
• Microsoft Windows® Small Business Server 2003, nas edições Standard
e Premium
• Microsoft Windows Server 2003, edições Standard e Enterprise
(x86 de 32 bits)
• Microsoft Windows Server 2003, nas edições x64 Standard e Enterprise
• Microsoft Windows Server 2003 R2, edições Standard e Enterprise
com SP2 (x86 de 32 bits)
• Microsoft Windows Server 2003 R2, edições Standard e Enterprise
com SP2 (x64)
• Microsoft Windows Server Small Business Server 2003 R2
nas edições Standard e Premium com SP2
• Red Hat® Enterprise Linux® ES e AS (versão 4.5) (x86_32)
• Red Hat Enterprise Linux ES e AS (versão 4.5) (x86_64)
• Red Hat Enterprise Linux Server 5 (x86_32)
• Red Hat Enterprise Linux Server 5 (x86_64)
• SUSE® Linux Enterprise Server 9 (SP4) (x86_64)
• SUSE Linux Enterprise Server 10 (x86_64)
NOTA: Para obter as informações mais recentes sobre os sistemas operacionais
compatíveis, consulte o site www.dell.com.34 Primeiros passos com o sistema
Outras informações úteis
ADVERTÊNCIA: O Guia de informações do produto fornece informações
importantes sobre segurança e regulamentação. As informações sobre garantia
podem estar incluídas neste documento ou serem fornecidas como um documento
separado.
• O Manual do proprietário de hardware fornece informações sobre os
recursos do sistema e descreve como solucionar problemas do sistema
e instalar ou substituir seus componentes.
• Os CDs incluídos com o sistema fornecem documentação e ferramentas
para a configuração e o gerenciamento do sistema.
• Às vezes, atualizações são fornecidas com o sistema para descrever
mudanças ao sistema, software e/ou à documentação.
NOTA: Verifique sempre as atualizações disponíveis no site support.dell.com
(em Inglês) e leia sempre as atualizações em primeiro lugar, pois estas
geralmente substituem informações contidas em outros documentos.
• Talvez existam notas de versão e arquivos leia-me incluídos, para fornecer
atualizações de última hora do sistema ou documentação/material para
referência técnica avançada destinados a usuários experientes ou técnicos.
• A documentação do sistema operacional descreve como instalar
(se necessário), configurar e utilizar o software do sistema operacional.
• A documentação para quaisquer componentes adquiridos em separado
fornece informações para configurar e instalar esses opcionais.Primeiros passos com o sistema 35
Como obter assistência técnica
Se não compreender algum procedimento descrito neste guia ou se o sistema
não apresentar o desempenho esperado, consulte o Manual do proprietário
de hardware.
Existem recursos de treinamento e certificação empresarial da Dell; visite
o site www.dell.com/training (em inglês) para obter mais informações.
Esse serviço pode não ser oferecido em todos os locais.
Instalação e configuração
ADVERTÊNCIA: Antes de executar o seguinte procedimento, leia e siga as
instruções de segurança e as informações importantes sobre regulamentação
contidas no Guia de informações do produto.
AVISO: Verifique se não há obstruções físicas a menos de 30 cm (12 pol.)
da parte frontal e de 61 cm (24 pol.) da parte traseira do sistema. As obstruções
podem diminuir o fluxo de ar, o que causaria superaquecimento do sistema.
Esta seção descreve as etapas para a configuração do sistema pela
primeira vez.
Remoção do sistema da embalagem
Remova o sistema da embalagem e identifique cada item. Mantenha todos
os materiais de envio para o caso de precisar deles mais tarde.36 Primeiros passos com o sistema
Conexão do teclado, mouse e monitor
Conecte o teclado, o mouse e o monitor (opcional).
Os conectores na parte de trás do sistema possuem ícones indicando quais
cabos devem ser ligados a cada conector. Certifique-se de apertar os parafusos
(se houver) no conector do cabo do monitor.
Conecte o sistema à energia
Conecte o cabo de alimentação ao monitor (opcional) e o cabo de alimentação
do sistema ao mesmo.Primeiros passos com o sistema 37
Instalação do suporte de retenção do cabo de alimentação
Conecte o suporte de retenção do cabo de alimentação na dobra direita da
alça da fonte de alimentação. Dobre o cabo de alimentação do sistema em
forma de laço conforme apresentado na ilustração e conecte-o ao colchete
do cabo localizado no suporte. Repita o procedimento para a segunda fonte
de alimentação.
Conecte a outra extremidade dos cabos de alimentação a uma tomada elétrica
aterrada ou a uma fonte de energia separada como, por exemplo, uma UPS
(Uninterruptible Power Supply [fonte de alimentação ininterrupta]) ou
uma PDU (Power Distribution Unit [unidade de distribuição de energia]). 38 Primeiros passos com o sistema
Ligação do sistema e do monitor (opcional)
Pressione o botão liga/desliga do sistema e do monitor. As luzes indicadoras
de energia deverão se acender. Ajuste os controles do monitor até que
a imagem exibida seja satisfatória.
Conclua a configuração do sistema operacional
Caso tenha adquirido um sistema operacional pré-instalado, consulte
a respectiva documentação fornecida com o sistema. Para instalar um
sistema operacional pela primeira vez, consulte o Guia de instalação rápida.
Certifique-se de que o sistema operacional esteja instalado antes de instalar
qualquer hardware ou software que não tenha sido adquirido com o sistema.Primeiros passos com o sistema 39
Especificações técnicas
Processador
Tipo de processador Um ou dois processadores
AMD™ Opteron™ Dual core
ou Quad core
Barramento de expansão
Tipo de barramento PCIe e PCI-X
Slots de expansão
PCIe Um de altura e comprimento completos
x8 de 3,3 V (slot 4)
Três de altura e comprimento completos
x4 de 3,3 V (slots 1 a 3)
PCI-X Um de altura e comprimento completos
x8 de 3,3 V (slot 5)
Um soquete interno de chave USB
Memória
Arquitetura DIMMs SDRAM DDR II de 128 bits,
ajustados para operação a 533 MHz
ou 667 MHz
Soquetes dos módulos de memória Oito de 240 pinos
Capacidades dos módulos de memória 512 MB, 1 GB, 2 GB ou 4 GB
RAM mínima 1 GB (um processador) ou 2 GB
(dois processadores)
RAM máxima 16 GB (um processador) ou 32 GB
(dois processadores)40 Primeiros passos com o sistema
Unidades
Unidades de disco rígido Até quatro SAS ou SATA de 3,5 polegadas
internos com (se disponível) ou sem conexão
automática
Unidade de disquete Uma unidade interna opcional
de 3,5 polegadas de 1,44 MB
Unidades ópticas Até duas unidades internas opcionais de
DVD-ROM (SATA ou PATA), DVD+RW
(SATA ou PATA) ou combinação
de CD-RW/DVD (SATA)
NOTA: Os dispositivos de DVD destinam-se
somente a dados.
Unidade óptica USB externa de DVD-ROM
opcional
Unidade de fita Uma unidade SAS, SATA ou SCSI opcional
interna de meia altura e 5,25 polegadas
Dispositivo de backup em fita USB externo
opcional
Unidade flash USB externa opcional
USB interna opcional
Conectores
Parte posterior
NIC Um RJ-45 (para Broadcom Gigabit LOM)
Serial DTE de 9 pinos, compatível com 16550
USB Cinco de 4 pinos, compatível com USB 2.0
Vídeo VGA de 15 pinos
Parte frontal
USB Dois de 4 pinos, compatível com USB 2.0
Interna
USB Dois de 4 pinos, compatível com USB 2.0Primeiros passos com o sistema 41
Vídeo
Tipo de vídeo Integrado
Memória de vídeo 32 MB (mínimo)
Energia
Fonte de alimentação CA
Potência 650 W (fonte de energia não-redundante)
675 W (fonte de energia redundante)
Voltagem 100 a 240 VCA, 6,0A a 3,0A, 50 Hz a 60 Hz
Dissipação de calor 624 BTU/hora (fonte de energia
não-redundante)
574 BTU/hora (fonte de energia redundante)
Bateria de backup do CMOS Pilha do tipo moeda, de íon de lítio,
CR 2032 de 3,0 V
Características físicas
Altura 456 mm (17,95 pol.)
Largura 210 mm (8,27 pol.)
Profundidade 635 mm (25 pol.)
Peso (configuração máxima) 27 kg (59,52 lb)42 Primeiros passos com o sistema
Características ambientais
NOTA: Para obter informações adicionais sobre os valores ambientais para
configurações de sistema específicas, visite o site dell.com/environmental_datasheets
(em inglês).
Temperatura
De funcionamento 10 °C a 35 °C (50 °F a 95 °F)
De armazenamento –40 °C a 65 °C (–40 °F a 149 °F)
Umidade relativa
De funcionamento 20% a 80% (sem condensação) com variação
de umidade máxima de 10% por hora
De armazenamento 5% a 95% (sem condensação)
Vibração máxima
Em funcionamento 0,26 gRMS; de 5 Hz a 350 Hz; a 0,0002 G2/Hz
Em armazenamento 1,54 gRMS; de 10 Hz a 250 Hz; a 0,003 G2/Hz
Choque máximo
Em funcionamento 27 G +/– 10% com duração de pulso
de 2,6 msec +/– 10%
Em armazenamento 71 G +/– 10% com duração de pulso
de 2 msec +/– 10%, 32 G +/– 5% com
mudança de velocidade de 235 ips +/– 5%
Altitude
De funcionamento –15,2 m a 3.048 m (–50 pés a 10.000 pés)
De armazenamento –15,2 m a 10.600 m (–50 pés a 35.000 pés)
Nível de poluentes
transportados pelo ar
Classe G2 ou inferior, conforme definido
pelo ISA-S71.04-1985Sistemas Dell™
PowerEdge™ T605
Procedimientos iniciales
con el sistemaNotas, avisos y precauciones
NOTA: Una NOTA proporciona información importante que le ayudará a utilizar
mejor el ordenador.
AVISO: Un AVISO indica la posibilidad de daños en el hardware o la pérdida
de datos, e informa de cómo evitar el problema.
PRECAUCIÓN: Un mensaje de PRECAUCIÓN indica el riesgo de daños
materiales, lesiones o incluso la muerte.
____________________
La información contenida en este documento puede modificarse sin previo aviso.
© 2007 Dell Inc. Todos los derechos reservados.
Queda estrictamente prohibida la reproducción de este documento en cualquier forma
sin la autorización por escrito de Dell Inc.
Marcas comerciales utilizadas en este texto: Dell y el logotipo de DELL son marcas comerciales
de Dell Inc.; AMD y AMD Opteron son marcas comerciales registradas de Advanced Micro Devices;
Microsoft, Windows y Windows Server son marcas comerciales registradas de Microsoft Corporation;
Red Hat y Red Hat Enterprise Linux son marcas comerciales registradas de Red Hat, Inc.; SUSE es una
marca comercial registrada de Novell Inc.
Otras marcas y otros nombres comerciales pueden utilizarse en este documento para hacer referencia
a las entidades que los poseen o a sus productos. Dell Inc. renuncia a cualquier interés sobre la
propiedad de marcas y nombres comerciales que no sean los suyos.
Modelo SCM
Noviembre de 2007 N/P GM693 Rev. A00Procedimientos iniciales con el sistema 45
Componentes del sistema
En esta sección se describen los principales componentes de hardware y
software del sistema. También se ofrece información sobre otros documentos
que puede necesitar para instalar el sistema y sobre cómo obtener asistencia
técnica.
• Uno o dos procesadores AMD™ Opteron™ de doble núcleo o de cuatro
núcleos.
NOTA: Utilice el programa de configuración del sistema para visualizar la
información del procesador. Consulte el Manual del propietario del hardware.
• Módulos de memoria DDR-II de paridad registrada a 533 o 667 MHz
de un mínimo de 1 GB (sistemas con un solo procesador) o 2 GB
(sistemas con dos procesadores). La memoria puede ampliarse a
un máximo de 32 GB (sistemas con dos procesadores) mediante la
instalación de combinaciones de módulos de memoria de 512 MB,
1 GB, 2 GB o 4 GB en los ocho zócalos de módulo de memoria de
la placa base.
• Compatibilidad con hasta cuatro unidades de disco duro internas
de 3,5 pulgadas SCSI de conexión serie (SAS) o SATA sin acoplamiento
activo o de acoplamiento activo (si está disponible). Es necesaria una
tarjeta de expansión de la controladora para las unidades de disco duro
SAS o para más de dos unidades de disco duro SATA.
• Un compartimiento para unidades periféricas de 3,5 pulgadas para la
unidad de disquete opcional y dos compartimientos de 5,25 pulgadas
para las unidades admitidas siguientes: unidad de DVD-ROM, unidad
combinada de CD-RW/DVD, DVD+RW o dispositivo de copia de
seguridad en cinta.
NOTA: Los dispositivos de DVD son sólo de datos.
• Un interruptor de intrusión que indica el software de administración
de sistemas adecuado si se abre la cubierta.
• Una fuente de alimentación sin redundancia de 650 W, o una fuente
de alimentación de acoplamiento activo opcional de 675 W en una
configuración redundante 1 + 1.46 Procedimientos iniciales con el sistema
La placa base incluye los componentes integrados siguientes:
• Controladora SATA que admite hasta dos unidades de disco duro SATA
cableadas y hasta dos de los siguientes dispositivos compatibles: unidad
de DVD-ROM, unidad combinada de CD-RW/DVD, DVD+RW
o dispositivo de copia de seguridad en cinta SATA.
NOTA: Los dispositivos de DVD son sólo de datos.
• Una ranura de expansión PCI-X a 133 MHz, tres ranuras de expansión
PCI Express (PCIe) x4 y una ranura de expansión PCIe x8.
• Una controladora gráfica 2D ATI RN50 integrada con un mínimo de
32 MB de memoria gráfica. La resolución máxima es de 1 280 x 1 024
con 65 536 colores; se admiten gráficos en las resoluciones siguientes:
640 x 480, 800 x 600, 1 024 x 768 y 1 280 x 1 024.
• Una NIC Gigabit integrada que admite velocidades de transferencia
de datos de 1 000 Mbps, 100 Mbps o 10 Mbps compatible con PXE,
Wake-on-LAN, motor de descarga TCP/IP (TOE) y descarga e inicio
de iSCSI.
• Un módulo de plataforma segura (TPM) versión 1.2 integrado para
aplicaciones de seguridad, que permite generar y almacenar claves,
contraseñas y certificados digitales (no disponible en China).
• Ocho conectores compatibles con USB 2.0 (dos en la parte frontal, uno
interno para una memoria USB de inicio y cinco en la parte posterior)
que admiten una unidad de disquete, una unidad de DVD-ROM,
un teclado, un ratón o una unidad flash USB.
• Controladora de acceso remoto (RAC) opcional para la administración
remota de sistemas.
• Controladora de administración de la placa base (BMC) estándar
con acceso serie y a LAN.
• Conectores serie y de vídeo, cinco conectores USB y un conector
de NIC en el panel posterior.
• Dos conectores USB en el panel frontal.
• LCD del panel frontal para la ID y los mensajes de error del sistema.
Para obtener más información sobre componentes específicos, consulte
“Especificaciones técnicas” en la página 53.Procedimientos iniciales con el sistema 47
Sistemas operativos admitidos
El sistema admite los sistemas operativos siguientes:
• Microsoft® Windows Server® 2008 Standard Edition y Enterprise Edition
(x86 de 32 bits)
• Microsoft Windows Server 2008 Standard Edition y Enterprise (x64)
Edition
• Microsoft Windows® Small Business Server 2008 Standard Edition
y Premium Edition
• Microsoft Windows Server 2003 Standard Edition y Enterprise Edition
con SP2 (x86 de 32 bits)
• Microsoft Windows Server 2003 Standard Edition y Enterprise (x64)
Edition con SP2
• Microsoft Windows Server 2003 R2 Standard Edition y Enterprise Edition
con SP2 (x86 de 32 bits)
• Microsoft Windows Server 2003 R2 Standard Edition y Enterprise (x64)
Edition con SP2
• Microsoft Windows Small Business Server 2003 R2 Standard Edition
y Premium Edition con SP2
• Red Hat® Enterprise Linux® ES y AS (versión 4.5) (x86_32)
• Red Hat Enterprise Linux ES y AS (versión 4.5) (x86_64)
• Red Hat Enterprise Linux Server 5 (x86_32)
• Red Hat Enterprise Linux Server 5 (x86_64)
• SUSE® Linux Enterprise Server 9 (SP4) (x86_64)
• SUSE Linux Enterprise Server 10 (x86_64)
NOTA: Para obtener la información más reciente sobre sistemas operativos
admitidos, visite www.dell.com.48 Procedimientos iniciales con el sistema
Otra información útil
PRECAUCIÓN: La Guía de información del producto contiene información
importante sobre seguridad y normativas. La información sobre la garantía
puede estar incluida en este documento o constar en un documento aparte.
• En el Manual del propietario del hardware se proporciona información
sobre los componentes del sistema y se describe cómo solucionar
problemas del sistema e instalar o sustituir componentes.
• Los CD que se facilitan con el sistema proporcionan documentación
y herramientas para configurar y administrar el sistema.
• Algunas veces, con el sistema se incluyen actualizaciones que describen
los cambios realizados en el sistema, en el software o en la documentación.
NOTA: Compruebe si hay actualizaciones en support.dell.com y, si las hay,
léalas antes de proceder a la instalación, puesto que a menudo sustituyen
la información contenida en otros documentos.
• Es posible que se incluyan notas de la versión o archivos Léame para
proporcionar actualizaciones de última hora relativas al sistema o a
la documentación, o material de consulta técnica avanzada destinado
a técnicos o usuarios experimentados.
• En la documentación del sistema operativo se describe cómo instalar
(si es necesario), configurar y utilizar el software del sistema operativo.
• En la documentación de los componentes adquiridos por separado
se incluye información para configurar e instalar las opciones
correspondientes.Procedimientos iniciales con el sistema 49
Obtención de asistencia técnica
Si no comprende algún procedimiento descrito en esta guía o si el sistema no
funciona del modo esperado, consulte el Manual del propietario del hardware.
Tiene a su disposición el servicio de formación y certificación Dell para
empresas. Para obtener más información, visite www.dell.com/training.
Es posible que este servicio no se ofrezca en todas las regiones.
Instalación y configuración
PRECAUCIÓN: Antes de realizar el procedimiento siguiente, lea y siga
las instrucciones de seguridad y la información importante sobre normativas
incluidas en la Guía de información del producto.
AVISO: Asegúrese de que no haya obstrucciones físicas a menos de unos 30 cm
de la parte frontal del sistema y a unos 61 cm de la parte posterior del sistema.
Esto podría reducir el flujo de aire y causar un sobrecalentamiento del sistema.
En esta sección se describen los pasos para configurar el sistema
por primera vez.
Desembalaje del sistema
Desembale el sistema e identifique cada elemento. Guarde el material
de embalaje por si lo necesita más adelante.50 Procedimientos iniciales con el sistema
Conexión del teclado, el ratón y el monitor
Conecte el teclado, el ratón y el monitor (opcional).
Los conectores de la parte posterior del sistema incluyen iconos que indican
qué cable debe enchufarse en cada conector. Asegúrese de apretar los tornillos
(si los hay) del conector del cable del monitor.
Conexión del sistema a la alimentación
Conecte el cable de alimentación del monitor al monitor (opcional) y conecte
el cable (o cables) de alimentación del sistema al sistema.Procedimientos iniciales con el sistema 51
Instalación del soporte de retención del cable de alimentación
Fije el soporte de retención del cable de alimentación en el codo derecho
del asa de la fuente de alimentación. Doble el cable de alimentación del
sistema en forma de bucle, tal como se muestra en la ilustración, y fíjelo
a la abrazadera correspondiente del soporte. Repita el procedimiento para
la segunda fuente de alimentación.
Conecte el otro extremo del cable de alimentación a una toma eléctrica con
conexión a tierra o a otra fuente de energía, como por ejemplo un sistema
de alimentación ininterrumpida (SAI) o una unidad de distribución de
alimentación (PDU). 52 Procedimientos iniciales con el sistema
Encendido del sistema y del monitor
Presione el botón de encendido del sistema y del monitor (opcional).
Los indicadores luminosos de alimentación deberían encenderse. Ajuste
los controles del monitor hasta que la imagen mostrada sea satisfactoria.
Finalización de la configuración
del sistema operativo
Si ha adquirido un sistema operativo preinstalado, consulte la documentación
del sistema operativo que se suministra con el sistema. Para instalar un sistema
operativo por primera vez, consulte la Guía de instalación rápida. Asegúrese
de que el sistema operativo está instalado antes de instalar hardware o software
no adquirido con el sistema.Procedimientos iniciales con el sistema 53
Especificaciones técnicas
Procesador
Tipo de procesador Uno o dos procesadores
AMD™ Opteron™ de doble núcleo
o de cuatro núcleos
Bus de expansión
Tipo de bus PCIe y PCI-X
Ranuras de expansión
PCIe Una ranura x8 de 3,3 V de altura
y longitud completas (ranura 4)
Tres ranuras x4 de 3,3 V de altura y
longitud completas (ranuras de la 1 a la 3)
PCI-X Una ranura de 3,3 V de altura y longitud
completas (ranura 5)
Un zócalo para memoria USB interna
Memoria
Arquitectura Módulos DIMM SDRAM DDR II
de 128 bits, clasificados para funcionar
a 533 o 667 MHz
Zócalos de módulo de memoria Ocho de 240 patas
Capacidades de módulo de memoria 512 MB, 1 GB, 2 GB o 4 GB
RAM mínima 1 GB (un procesador) o 2 GB
(dos procesadores)
RAM máxima 16 GB (un procesador) o 32 GB
(dos procesadores)54 Procedimientos iniciales con el sistema
Unidades
Unidades de disco duro Hasta cuatro unidades de disco duro
internas de 3,5 pulgadas SAS o SATA
sin acoplamiento activo o de acoplamiento
activo (si está disponible)
Unidad de disquete Una unidad interna opcional
de 3,5 pulgadas y 1,44 MB
Unidades ópticas Hasta cuatro unidades internas
opcionales de DVD-ROM (SATA
o PATA), DVD+RW (SATA o PATA)
o CD-RW/DVD combinada (SATA)
NOTA: Los dispositivos de DVD son sólo
de datos.
Unidad de DVD USB externa opcional
Unidad de cinta Una unidad interna opcional SAS, SATA
o SCSI de 5,25 pulgadas de media altura
Dispositivo de copia de seguridad en cinta
de la unidad USB externa opcional
Unidad flash Unidad USB externa opcional
Unidad USB interna opcional
Conectores
Parte posterior
NIC Un RJ-45 (para Broadcom Gigabit LOM)
Serie 9 patas, DTE, compatible con 16550
USB Cinco de 4 patas compatibles con USB 2.0
Vídeo VGA de 15 patas
Parte frontal
USB Dos de 4 patas compatibles con USB 2.0
Internos
USB Uno de 4 patas compatible con USB 2.0Procedimientos iniciales con el sistema 55
Vídeo
Tipo de vídeo Integrado
Memoria de vídeo 32 MB (como mínimo)
Alimentación
Fuente de alimentación de CA
Potencia 650 W
(fuente de alimentación sin redundancia)
675 W
(fuente de alimentación redundante)
Voltaje 100-240 V CA, 6,0-3,0 A, 50/60 Hz
Disipación de calor 624 BTU/h (182,7 W)
(fuente de alimentación sin redundancia)
574 BTU/h (168 W)
(fuente de alimentación redundante)
Batería de reserva de CMOS Batería de tipo botón de litio-ion
de 3,0 V CR2032
Características físicas
Altura 456 mm
Anchura 210 mm
Profundidad 635 mm
Peso (configuración máxima) 27 kg56 Procedimientos iniciales con el sistema
Especificaciones ambientales
NOTA: Para obtener información adicional sobre medidas ambientales relativas a
configuraciones de sistema específicas, vaya a dell.com/environmental_datasheets.
Temperatura
En funcionamiento De 10 a 35 °C
En almacenamiento De –40 a 65 °C
Humedad relativa
En funcionamiento Del 20 al 80% (sin condensación) con un
gradiente de humedad máxima del 10%
por hora
En almacenamiento Del 5 al 95% (sin condensación)
Vibración máxima
En funcionamiento 0,26 Grms, de 5 a 350 Hz a 0,0002 G2/Hz
En almacenamiento 1,54 Grms, de 10 a 250 Hz
a 0,003-0,01 G2/Hz
Impacto máximo
En funcionamiento 27 G +/– 10% con duración del impulso
de 2,6 ms +/– 10%
En almacenamiento 71 G +/– 10% con duración del impulso
de 2 ms +/– 10%, 32 G +/– 5% con
cambio de velocidad de 235 ips +/– 5%
Altitud
En funcionamiento De –15,2 a 3 048 m
En almacenamiento De –15,2 a 10 600 m
Nivel de contaminación atmosférica
Clase G2 o menos de acuerdo
con ISA-S71.04-1985
www.dell.com | support.dell.com/manuals
Alienware X51
Owner’s Manual
Regulatory model: D05S
Regulatory type: D05S001
book.book Page 1 Tuesday, January 17, 2012 10:32 PMNotes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better
use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or
loss of data, and tells you how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage,
personal injury, or death.
____________________
Information in this document is subject to change without notice.
© 2012 Dell Inc. All rights reserved.
Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc.
is strictly forbidden.
Trademarks used in this text: Dell™ and the DELL logo are trademarks of Dell Inc.
Alienware® is a registered trademark of Alienware Corporation.
Microsoft®, Windows®, and the Windows start button logo are either trademarks or registered
trademarks of Microsoft Corporation in the United States and/or other countries.
Other trademarks and trade names may be used in this document to refer to either the entities claiming
the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and
trade names other than its own.
2012 - 01 Rev. A00
book.book Page 2 Tuesday, January 17, 2012 10:32 PMContents 3
Contents
1 About Your Computer. . . . . . . . . . . . . . . . . 5
Front View . . . . . . . . . . . . . . . . . . . . . . . . . 5
Back View . . . . . . . . . . . . . . . . . . . . . . . . . 6
Specifications . . . . . . . . . . . . . . . . . . . . . . . 6
2 Before You Begin. . . . . . . . . . . . . . . . . . . . 7
Turn Off Your Computer and
Connected Devices. . . . . . . . . . . . . . . . . . 7
Safety Instructions . . . . . . . . . . . . . . . . . . 7
3 Working Inside Your Computer . . . . . . . . . 9
4 System Setup . . . . . . . . . . . . . . . . . . . . . . 11
Overview. . . . . . . . . . . . . . . . . . . . . . . . . 11
Entering System Setup. . . . . . . . . . . . . . . . . . 11
System Setup Screens . . . . . . . . . . . . . . . 12
System Setup Options . . . . . . . . . . . . . . . 12
Boot Sequence . . . . . . . . . . . . . . . . . . . 16
book.book Page 3 Tuesday, January 17, 2012 10:32 PM4 Contents
5 Flashing the BIOS . . . . . . . . . . . . . . . . . 19
6 Contacting Alienware . . . . . . . . . . . . . . 21
Websites . . . . . . . . . . . . . . . . . . . . . . 21
book.book Page 4 Tuesday, January 17, 2012 10:32 PMAbout Your Computer 5
1
About Your Computer
Front View
NOTE: Your Alienware X51 computer supports dual orientation. You can place your
computer vertically or horizontally. The rotatable AlienHead allows you to change
the direction of the AlienHead depending on the orientation of your computer.
1 power button 2 optical-drive eject button
3 optical drive 4 rotatable AlienHead
5 microphone connector 6 headphone connector
7 USB 2.0 connectors (2)
1
2
3
4
5
6
7
book.book Page 5 Tuesday, January 17, 2012 10:32 PM6 About Your Computer
Back View
Specifications
For more information on specifications of your computer,
see support.dell.com/manuals.
1 optical S/PDIF connector 2 HDMI connector
3 USB 2.0 connectors (4) 4 USB 3.0 connectors (2)
5 audio connectors (6) 6 hard-drive activity light
7 AC-adapter connector 8 discrete graphics card
9 security-cable slot 10 network connector and
network lights
11 coaxial S/PDIF connector
1
2
3
4
5
6
7
11
10
9
8
book.book Page 6 Tuesday, January 17, 2012 10:32 PMBefore You Begin 7
2
Before You Begin
Turn Off Your Computer and Connected Devices
CAUTION: To avoid losing data, save and close all open files and exit all open
programs before you turn off your computer.
1 Save and close all open files and exit all open programs.
2 Click Start and click Shut Down.
Microsoft Windows shuts down and then the computer turns off.
NOTE: If you are using a different operating system, see the documentation
of your operating system for shut-down instructions.
3 Disconnect your computer and all attached devices from their
electrical outlets.
4 Disconnect all telephone cables, network cables, and attached devices
from your computer.
5 Press and hold the power button, while the computer is unplugged,
to ground the system board.
Safety Instructions
Use the following safety guidelines to protect your computer from potential
damage and ensure your personal safety.
WARNING: Before you begin, read the safety information that shipped with your
computer. For additional safety best practices information, see the Regulatory
Compliance Homepage at dell.com/regulatory_compliance.
CAUTION: To avoid damaging the computer, ensure that the work surface is flat
and clean.
CAUTION: Only a certified service technician is authorized to remove the
computer cover and access any of the components inside the computer. See the
safety instructions for complete information about safety precautions and
protecting against electrostatic discharge.
book.book Page 7 Tuesday, January 17, 2012 10:32 PM8 Before You Begin
CAUTION: When you disconnect a cable, pull on its connector or on its pull-tab,
not on the cable itself. Some cables have connectors with locking tabs or
thumb-screws that you must disengage before disonnecting the cable. When
disconnecting cables, keep them evenly aligned to avoid bending any connector
pins. When connecting cables, ensure that the connectors and ports are correctly
oriented and aligned.
CAUTION: To disconnect a network cable, first unplug the cable from your
computer and then unplug the cable from the network device.
NOTE: Ensure that you remove the security cable from the security-cable slot,
if applicable.
book.book Page 8 Tuesday, January 17, 2012 10:32 PMWorking Inside Your Computer 9
3
Working Inside Your Computer
CAUTION: Only a certified service technician is authorized to remove the
computer cover and access any of the components inside the computer. See the
safety instructions for complete information about safety precautions and
protecting against electrostatic discharge.
For information on removing and replacing the internal component of
your computer, contact Alienware. See "Contacting Alienware" on page 21.
book.book Page 9 Tuesday, January 17, 2012 10:32 PM10 Working Inside Your Computer
book.book Page 10 Tuesday, January 17, 2012 10:32 PMSystem Setup 11
4
System Setup
Overview
Use the system setup to:
• get information about the hardware installed in your computer, such as the
amount of RAM, the size of the hard drive, and so on
• change the system configuration information
• set or change a user-selectable option, such as the user password, type of
hard drive installed, enabling or disabling base devices, and so on
NOTE: Before you change system setup, it is recommended that you note the
system-setup screen information for future reference.
Entering System Setup
1 Turn on (or restart) your computer.
2 During POST, when the DELL logo is displayed, watch for the F2 prompt
to appear and then press immediately.
NOTE: The F2 prompt indicates that the keyboard has initialized. This prompt
can appear very quickly, so you must watch for it, and then press . If you
press before the F2 prompt, this keystroke is lost. If you wait too long and
the operating system logo appears, continue to wait until you see the
Microsoft Windows desktop. Then, turn off your computer and try again.
See "Turn Off Your Computer and Connected Devices" on page 7.
book.book Page 11 Tuesday, January 17, 2012 10:32 PM12 System Setup
System Setup Screens
The system setup screen displays current or changeable configuration
information for your computer. Information on the screen is divided into
three areas: the setup item, active help screen, and key functions.
System Setup Options
NOTE: Depending on your computer and installed devices, the items listed in this
section may appear, or may not appear exactly as listed.
Setup Item — This field appears on
the left side of the system setup
window. The field is a scrollable list
containing features that define the
configuration of your computer,
including installed hardware, power
conservation, and security features.
Scroll up and down the list with the
up- and down-arrow keys. As an option
is highlighted, the Help Screen
displays more information about that
option and available settings.
Help Screen — This field appears on the
right side of the system setup window and
contains information about each option
listed in the Setup Item. In this field you
can view information about your computer
and make changes to your current settings.
Press the up-arrow and down-arrow keys to
highlight an option. Press to
make that selection active and return to
the Setup Item.
NOTE: Not all settings listed in the Setup
Item are changeable.
Key Functions — This field appears below the Help Screen and lists keys and their
functions within the active system setup field.
Main
BIOS Information
Product Information
Build Date Displays the BIOS release date.
Product Name Displays the product name.
BIOS Version Displays the BIOS version number.
Set Service Tag Allows you to enter the service tag of your computer.
Asset Tag Displays the asset tag of the computer.
book.book Page 12 Tuesday, January 17, 2012 10:32 PMSystem Setup 13
Memory Information
Total Memory Displays the total memory of the computer.
Memory Available Displays the amount of memory available on the
computer.
Memory Technology Displays the type of memory technology used.
Memory Speed Displays the memory speed.
CPU Information
Processor ID Displays the processor identification code.
CPU Speed Displays the processor speed.
Cache L2 Displays the processor L2 cache size.
Cache L3 Displays the processor L3 cache size.
Advanced — Standard CMOS Features
System Date
(mm:dd:yy)
Displays current date.
System Time
(hh:mm:ss)
Displays the current time.
Device Information
SATA Port1 Displays the SATA 1 drive integrated in the
computer.
SATA Port2 Displays the SATA 2 drive integrated in the
computer.
SATA Port3 Displays the SATA 3 drive integrated in the
computer.
Wait for ‘F1’ If
Errors
If enabled, the system will HALT during boot to
display system errors.
Advanced — Advanced BIOS
Features
Bootup Num-Lock Select power-on state for num-lock.
OptionROM Display
Screen
Allows you to display or hide the RAID Option ROM
screen during POST.
book.book Page 13 Tuesday, January 17, 2012 10:32 PM14 System Setup
Advanced — CPU Configuration
Hyper-threading
Technology
If disabled only one thread per enabled core is active.
XD Bit Capability Enable XD Bit Capability to allow the processor to
distinguish between the bits of code that can be
executed and the ones that cannot be executed.
Intel(R) SpeedStep
tech
If enabled, the processor clock speed and core
voltage are adjusted dynamically based on the
processor load.
Intel(R) C-State tech Allows you to enable the number of cores in each
processor package. Options 1-5.
Advanced — Integrated
Devices
USB Controller Allows you to enable or disable the integrated USB
controller.
HD Audio Allows you to enable or disable the integrated audio
controller.
Onboard LAN
Controller
Allows you to enable or disable the onboard LAN
controller.
Launch PXE OpROM Allows you to enable or disable the boot option for
legacy network devices.
PCH SATA
Configuration
SATA Mode Displays the SATA mode.
Advanced — Power Management Setup
Suspend Mode Sets the energy-saving mode of the ACPI function.
AC Recovery Sets what action the computer takes when power is
restored.
Auto Power On Allows the computer to start up at a certain time.
Auto Power On Date Allows you to set RTC Wake Up Date.
Auto Power On Hour Allows you to set RTC Wake Up Hour.
Auto Power On Minute Allows you to set RTC Wake Up Minute.
Auto Power On Second Allows you to set RTC Wake Up Second
book.book Page 14 Tuesday, January 17, 2012 10:32 PMSystem Setup 15
Security
Supervisor Password: Allows you to change the supervisor password.
User Password: Allows you to change the user password. You cannot
use the user password to enter the BIOS setup,
during POST.
Set Supervisor
Password
Allows you to set a supervisor password.
Set User Password Allows you to set a supervisor password.
Boot
Set Boot Priority
1st Boot Device Displays the first boot device.
Default: USB floppy-drive.
2nd Boot Device Displays the second boot device.
Default: USB hard-drive.
3rd Boot Device Displays the third boot device.
Default: USB optical-drive.
4th Boot Device Displays the fourth boot device.
Default: hard-drive.
5th Boot Device Displays the fifth boot device.
Default: optical-drive.
6th Boot Device Displays the sixth boot device.
Default: network boot.
7th Boot Device Displays the seventh boot device.
Default: UEFI.
Hard Disk Drive BBS
Priorities
Sets the hard drive boot priority. The items displayed
are dynamically updated according to the hard drives
detected.
USB Disk BBS Drive
Priorities
Sets the USB drive boot priority.
CD/DVD ROM Drive BBS
Priorities
Sets the CD/DVD drive boot priority.
book.book Page 15 Tuesday, January 17, 2012 10:32 PM16 System Setup
Boot Sequence
This feature allows you to change the boot sequence for devices.
Boot Options
• Diskette Drive —The computer attempts to boot from the floppy disk
drive. If no operating system is on the drive, the computer generates an
error message.
• Hard Drive — The computer attempts to boot from the primary hard
drive. If no operating system is on the drive, the computer generates an
error message.
• CD/DVD/CD-RW Drive — The computer attempts to boot from the
optical drive. If no disc is in the drive, or if the disc is not bootable,
the computer generates an error message.
• USB Storage Device — Insert the memory device into a USB connector
and restart the computer. When F12 Boot Options appears in the
lower-right corner of the screen, press . The BIOS detects the
device and adds the USB flash option to the boot menu.
NOTE: To boot to a USB device, the device must be bootable. To ensure that
your device is bootable, check the device documentation.
• Network — The computer attempts to boot from the network. If no
operating system is found on the network, the computer generates an
error message.
Exit
Provides options to Save Changes and Reset, Discard Changes
and Reset, and Restore Defaults.
book.book Page 16 Tuesday, January 17, 2012 10:32 PMSystem Setup 17
Changing Boot Sequence for the Current Boot
You can use this feature to change the current boot sequence, for example,
to boot from the optical drive to run Dell Diagnostics from the Drivers and
Utilities disc. The previous boot sequence is restored at the next boot.
1 If you are booting from a USB device, connect the USB device to a
USB connector.
2 Turn on (or restart) your computer.
3 When F2 Setup, F12 Boot Options appears in the lower-right
corner of the screen, press .
NOTE: If you wait too long and the operating system logo appears, continue to wait
until you see the Microsoft Windows desktop. Then shut down your computer and
try again.
The Boot Device Menu appears, listing all available boot devices.
4 On the Boot Device Menu choose the device you want to boot from.
For example, if you are booting to a USB memory key, highlight USB
Storage Device and press .
Changing Boot Sequence for Future Boots
1 Enter system setup. See "Entering System Setup" on page 11.
2 Use the arrow keys to highlight the Boot menu option and press
to access the menu.
NOTE: Write down your current boot sequence in case you want to restore it.
3 Press the up- and down-arrow keys to move through the list of devices.
4 Press plus (+) or minus (–) to change the boot priority of the device.
book.book Page 17 Tuesday, January 17, 2012 10:32 PM18 System Setup
book.book Page 18 Tuesday, January 17, 2012 10:32 PMFlashing the BIOS 19
5
Flashing the BIOS
The BIOS may require flashing when an update is available or when replacing
the system board. To flash the BIOS:
1 Turn on the computer.
2 Go to support.dell.com/support/downloads.
3 Locate the BIOS update file for your computer:
NOTE: The Service Tag for your computer is located on a label at the back of
your computer.
If you have your computer’s Service Tag:
a Click Enter a Tag.
b Enter your computer’s Service Tag in the Enter a service tag: field,
click Go, and proceed to step 4.
If you do not have your computer’s Service Tag:
a Click Select Model.
b Select the type of product in the Select Your Product Family list.
c Select the product brand in the Select Your Product Line list.
d Select the product model number in the Select Your Product Model list.
NOTE: If you have selected a different model and want to start over again,
click Start Over on the top right of the menu.
e Click Confirm.
4 A list of results appears on the screen. Click BIOS.
5 Click Download Now to download the latest BIOS file.
The File Download window appears.
6 Click Save to save the file on your desktop. The file downloads to your
desktop.
7 Click Close if the Download Complete window appears.
The file icon appears on your desktop and is titled the same as the
downloaded BIOS update file.
8 Double-click the file icon on the desktop and follow the instructions on
the screen.
book.book Page 19 Tuesday, January 17, 2012 10:32 PM20 Flashing the BIOS
book.book Page 20 Tuesday, January 17, 2012 10:32 PMContacting Alienware 21
6
Contacting Alienware
NOTE: Dell provides several online and telephone-based support and service
options for your Alienware computer. These services may vary by country and
product and may not be available in your area.
To contact Dell for sales, technical support, or customer service issues:
1 Go to dell.com/contactdell.
2 Select your region, country, or language.
3 Select the segment for contact.
4 Select the appropriate service or support link based on your need.
5 Choose the method of contacting Dell that is convenient for you.
If you are in the United States, call 1-800-ALIENWARE for help on your
Alienware computer.
Websites
For the latest information, FAQ’s, and solutions to most common issues,
see support.dell.com/Alienware.
book.book Page 21 Tuesday, January 17, 2012 10:32 PM
Intel® Active Management Technology(主动管理技
术)v6.0
管理员指南
概览
产品概览
开箱即用体验
操作模式
设置和配置概览
菜单及默认设置
MEBx 设置概览
ME 常规设置
AMT 配置
Intel 快速呼叫帮助
ME 常规设置
AMT 配置
设置和配置
方法概览
配置服务 - 使用 USB 设备
配置服务 - USB 设备步骤
系统部署
操作系统驱动程序
管理
Intel AMT Web GUI
AMT 重定向 (SOL/IDE-R)
AMT 重定向概览
Intel Management and
Security Status 应用程序
Intel Management and Security Status 应用
程序
故障排除
故障排除
如果您购买的是 Dell™ n 系列计算机,则本说明文件中关于 Microsoft® Windows® 操作系统的任何参考内容均不适用。
本说明文件中的信息如有更改,恕不另行通知。
© 2010 Dell Inc. 版权所有,翻印必究。
未经 Dell Inc. 书面许可,严禁以任何形式复制这些材料。
本文中使用的商标:Dell、Latitude 和 DELL 徽标是 Dell Inc. 的商标;Intel 是 Intel Corporation 在美国 及其他国家和地区的商标或注册商标;Microsoft 和
Windows 是 Microsoft Corporation 在美国及/或其他国家和地区的商标或注册商标。
本说明文件中述及的其他商标和商品名称是指拥有相应标记和名称的公司或其制造的产品。Dell Inc. 对其他公司的商标和产品名称不拥有任何所有权。
2010 年 4 月 修订版 A00返回目录页面
概览
Intel® 主动管理技术 (Intel AMT) 有助于公司轻松管理其联网计算机。
搜索网络上的计算机资产(无论计算机处于打开或关闭状态)– Intel AMT 使用存储在非易失性系统内存中的信息来访问计算机。即使计
算机处于关闭状态,也能对其进行访问(也称为带外访问或 OOB 访问)。
假如操作系统发生故障,也可远程修复计算机 — 在软件或操作系统发生故障的情况下,可使用 Intel AMT 远程访问计算机以完成修复。
此外,IT 管理员还可在 Intel AMT 带外事件记录和警报的协助下轻松检测计算机故障。
保护网络免受外来威胁,同时通过网络轻松地将软件和病毒防护应用程序保持最新。
软件支持
现有多家独立软件供应商 (ISV) 致力于开发可与 Intel AMT 功能配合使用的软件包。通过对其进行应用,当 IT 管理员从远程管理公司内部的联
网计算机资产时,便可为其提供多种选择。
功能和优点
Intel AMT
功能 优点
带外 (OOB) 访问 无论电源或操作系统状态为何,都可对平台进行远程管理
远程故障排除和恢复 大大减少现场查访次数,提高 IT 技术人员的工作效率
预警机制 减少停机时间并将修复次数降至最低
计算机要求
本说明文件中的计算机包括 Intel® 5 Series Chipset Family/Intel® PCH 平台,由 Intel Management Engine 管理。要配置 Intel
Management Engine 并在客户端计算机运行,必须先满足以下针对安装和设置的固件和软件要求:
SPI 闪存设备,使用 Intel AMT 6.0 闪存映像编程,集成了 BIOS、Intel Management Engine 和 GbE 组件映像。
BIOS 设置为启用 Intel AMT,可从 F12 菜单访问 MEBx。
要启用 Microsoft 操作系统内的所有 Intel Management Engine 功能,必须在客户端系统上安装和配置设备驱动程序 (Intel®
MEI/SOL/LMS),以便在客户端系统运行的功能得以正常运行。
*
本页面上的信息由 Intel 提供。
注: Intel Management Engine BIOS Extension (MEBx) 是 Intel 专为 Dell™ 提供的可选 ROM 模块,它将包含于 Dell BIOS
中。MEBx 专为 Dell 计算机而定制。
返回目录页面返回目录页面
开箱即用体验
以下资料随 Intel™ 主动管理技术 (Intel AMT) 计算机一同提供:
出厂安装
Intel AMT 6.0 从 Dell 工厂出厂时处于出厂默认状态。
安装与快速参考指南
Intel AMT 概览(内含指向《Dell 技术指南》的链接)。
《Dell 技术指南》
高级别 Intel AMT 概览、设置、预配置和支持。
备份介质
ResourceCD 内附固件和关键驱动程序。
有关 Intel AMT 的详细信息,请参阅《管理员指南》。该指南发布在 Web 上,可从 support.dell.com 上的计算机手册中获取。
返回目录页面返回目录页面
操作模式
Intel® AMT 的早期版本支持两种操作模式 - 中小型企业 (SMB) 模式和企业模式。在当前版本中,可通过集成其功能以提供较早企业模式的功
能。
适用于 SMB 客户的新配置选项包括:手动设置和配置,及自动设置和配置。
设置
Intel AMT 5.0(默认设置)
Intel AMT 6.0(默认设置)
企业模式 SMB 模式
“TLS mode”(TLS 模式) “Enabled”(已启用) “Disabled”(已禁用) “Disabled”(已禁用),可稍后启用
Web UI “Disabled”(已禁用) “Enabled”(已启用) “Enabled”(已启用)
“IDER/SOL/KVM Redirection
network interface
enabled”(IDER/SOL/KVM
重定向网络接口已启用)
“Disabled”(已禁用) “Enabled”(已启用),如果可在
Intel® MEBx 中启用此功能 “Enabled”(已启用),可稍后禁用
“Legacy Redirection
Mode”(传统重定向模式)(控
件 FW,监听接入重定向连接)
“Disabled”(已禁用) “Enabled”(已启用),如果可在
Intel MEBx 中启用此功能
“Disabled”(已禁用)(要与传统
SMB 控制台配合使用,需设置
为“Enabled”(已启用))
注: KVM 仅受集成图形 CPU 支持。系统应处于集成图形模式。
按照以下步骤执行手动配置:
111使用系统 BIOS 和 FW 刷新映像。
111 通过按 F12 菜单和键入默认密码“admin”,导航至 Intel MEBx。 登录后,更改密码。
111 导航至“Intel ME General Settings”(Intel ME 常规设置)菜单。
111 选择“Activate Network Access”(激活网络访问)。
111 屏幕显示确认信息时,选择“Y”(是)。
111 退出 Intel MEBx。
注: 您也可以使用 Intel Activator 工具,通过外部方式或操作系统,完成激活操作。
返回目录页面返回目录页面
设置和配置概览
下面是与 Intel® AMT 设置和配置相关的重要术语列表。
设置和配置 — 在 Intel AMT 管理的计算机中填写用户名、密码及网络参数的过程,以便从远程管理计算机。
配置服务 — 完成 Intel AMT 预配置的第三方应用程序。
Intel AMT WebGUI — 一种基于 Web 浏览器的界面,用于进行有限的远程计算机管理。
在使用 Intel AMT 之前,必须在计算机中对其进行设置和配置。通过 Intel AMT 设置,可让计算机开始使用 Intel AMT 模式,并启用网络连接
性。在计算机的整个使用过程中,该设置通常只需执行一次。一旦启用 Intel AMT,管理软件便可通过网络对其进行检测。
一旦在企业模式下设置 Intel AMT 后,便可开始启动针对其自身功能的配置。当所有必需的网络条件均已满足时,您只需将计算机连接至电源和
网络,Intel AMT 便会自动初始化其自身的配置。配置服务(第三方应用程序)将为您完成该操作流程。随后,Intel AMT 便可用于远程管理。此
配置通常只需数秒时间。当设置并配置 Intel AMT 之后,可根据需要为您的业务环境重新配置该技术。
一旦在 SMB 模式下设置 Intel AMT ,计算机便无需通过网络进行任何配置。它是手动设置的,并可与 Intel AMT Web GUI 搭配使用。
Intel AMT 的设置和配置状态
设置和配置 Intel AMT 的操作也被称作“预配置”。具备 Intel AMT 功能的计算机可处于以下三种设置和配置状态 (SCS) 中的任一种状态:
出厂默认设置状态
设置状态
预配置状态
出厂默认设置状态为完全取消配置状态。在此状态下,安全凭证尚未建立,且 Intel AMT 功能还无法用于管理应用程序。在出厂默认设置状态
下,Intel AMT 采用出厂时所定义的设置。
设置状态为已进行部分配置的状态。在此状态下,已使用初始网络和传输层安全 (TLS) 信息对 Intel AMT 进行设置,这些信息包括:初始管理员
密码、预配置密文 (PPS) 以及预配置标识符 (PID)。设置 Intel AMT 之后,Intel AMT 便可接收来自配置服务的企业配置设置。
预配置状态为完全配置状态。在此状态下,已使用电源选项对 Intel Management Engine (ME) 进行配置,并使用 Intel AMT 的安全设置、凭
证以及激活 Intel AMT 功能的设置对其自身进行配置。配置 Intel AMT 之后,各项功能便可与管理应用程序进行交互。
预配置方法
TLS-PKI
TLS-PKI 也称为“远程配置”。SCS 使用 TLS-PKI(公共密钥基础结构)证书安全地连接到已启用 Intel AMT 的计算机。生成该证书的方法有以
下几种:
SCS 可使用已预编程到计算机的某一默认证书进行连接,详见本说明文件的“MEBx 界面”一节。
SCS 可创建自定义证书,该证书可通过现场查访方式,使用经过特殊格式化的 USB 驱动器闪存在 AMT 计算机上进行部署,详见本说明文
件的“配置服务”一节。
SCS 可使用在 Dell 出厂时已通过自定义工厂集成 (CFI) 进程预编程的自定义证书。
TLS-PSK
TLS-PSK 也称为“一触式配置”。SCS 使用 PSK(预共享密钥)与 AMT 计算机建立安全连接。SCS 可创建这些包含 52 个字符的密钥,然后采
用以下两种现场查访方法之一将其部署到 AMT 计算机上:
可将密钥手动键入到 MEBx 中。
SCS 可创建自定义密钥列表,并将其保存到经特殊格式化的 USB 驱动器闪存中。随后,每台 AMT 计算机在 BIOS 引导时便可从经特殊
格式化的 USB 驱动器闪存恢复自定义密钥,详见本说明文件的“配置服务”一节。
返回目录页面返回目录页面
MEBx 设置概览
Intel® Management Engine BIOS Extension (MEBx) 为您提供了平台级别的配置选项,以便配置 Management Engine (ME) 平台的工作
方式。这些选项包括启用和禁用各个功能以及设置电源配置的选项。
本部分详细介绍了 MEBx 配置的选项和限制(如果有)。
注: 所有“ME Platform Configuration”(ME 平台配置)设置的更改均未在 MEBx 中进行缓存。在退出 MEBx 之前,系统不会将它们
提交到 ME 非易失性存储器 (NVM)。因此,如果 MEBx 崩溃,系统不会将在该点前所做的更改提交到 ME NVM。
访问 MEBx 配置用户界面
通过执行以下步骤,可在计算机上访问 MEBx 配置用户界面:
111 打开(或重新启动)计算机。
111 屏幕上显示蓝色 DELL™ 徽标时,立即按 键并选择 MEBx。
如果等待时间过长,系统已显示操作系统徽标,则请继续等待直至看到 Microsoft® Windows® 桌面。然后关闭计算机并再试一次。
111 键入 ME 密码。按 键。默认密码为“admin”。此外,用户可更改该密码。
注: 访问 MEBx 的另一种方法是按 键启动一次性引导菜单。屏幕上显示菜单时,使用上箭头和下箭头键选择“Intel
Management Engine BIOS Extension (MEBx)”。按 键。
随即出现如下所示的 MEBx 屏幕。主菜单显示三个功能选项:
“Intel ME General Settings”(Intel ME 常规设置)
“Intel AMT Configuration”(Intel AMT 配置)
“Exit”(退出)
注: Intel MEBx 仅显示已检测到的选项。如果系统没有显示这些选项中的一个或多个选项,则请验证系统是否支持相关的缺失功能。
更改 Intel ME 密码
在所有新部署的平台上,默认密码均为“admin”。在更改功能配置选项之前,必须先更改默认密码。
如果 IT 管理员使用默认密码首次进入 Intel MEBx 配置菜单,则他或她必须先更改默认密码,然后才能使用各种功能。
新密码必须包含以下要素:
至少包含 8 个字符,最多不超过 32 个字符
至少含一个大写字母
至少含一个小写字母
数字
特殊字符(非字母数字),例如 !、$ 或 ;,不包括 :、" 及 ,字符。
注: 下划线 ( _ ) 和空格也是有效的密码字符,但不会增加密码的复杂性。
*
本页面上的信息由 Intel 提供。
返回目录页面返回目录页面
ME 常规设置
要导航至“Intel® Management Engine (ME) Platform Configuration” (Intel® Management Engine (ME) 平台配置)页,请执
行以下步骤:
111在 Management Engine BIOS Extension (MEBx) 主菜单下,选择“Intel ME General Settings” (Intel ME 常规设置)。按
键。
111系统将显示以下信息:
获取“General Settings”(常规设置)配置
屏幕出现“ME General Configuration” (ME 常规配置)页。该页允许 IT 管理员配置 Intel ME 的特定功能,例如密码、电源选项等。指向
各部分的快速链接如下。
Intel ME 状态控制
更改 Intel ME 密码
密码策略
网络设置
网络名称设置
主机名
域名
FQDN
动态 DNS
定期更新间隔
TTL
上一级菜单
TCP/IP 设置
有线 LAN IPv4 配置
DHCP 模式
IPv4 地址
默认网关地址
首选 DNS 地址
备用 DNS 地址
上一级菜单
有线 LAN IPv6 配置
IPv6 功能选择
IPv6 接口 ID 类型
IPv6 地址
IPv6 默认路由器
首选 DNS IPv6 地址
备用 DNS IPv6 地址
上一级菜单
无线 LAN IPv6 配置
IPv6 功能选择
IPv6 接口 ID 类型
上一级菜单
取消配置网络访问
远程设置和配置
当前预配置模式
预配置记录
开始配置
上一级菜单
预配置服务器 IPv4/IPv6
预配置服务器 FQDN
TLS PSK
设置 PID 和 PPS
删除 PID 和 PPS
上一级菜单
TLS PKI
远程配置
PKI DNS 后缀
管理散列值
添加定制散列值删除散列值
更改活动状态
查看证书散列值
上一级菜单
上一级菜单
FW 更新设置
本地 FW 更新
安全 FW 更新
上一级菜单
设置 PRTC
电源控制
在主机睡眠状态下开启 Intel ME
空闲超时
上一级菜单
Intel ME 状态控制
在“ME Platform Configuration”(ME 平台配置)菜单上选择“ME State Control”(ME 状态控制)选项后,会出现 “ME State
Control”(ME 状态控制)菜单。可禁用 ME 以便将 ME 计算机从主平台隔离出来,直到调试过程结束。
通过“Intel ME State Control”(Intel ME 状态控制)选项(启用/禁用),可禁用 Intel ME 功能以便进行调试。通过令 MEBx 禁止执行
Intel ME 代码,即可实现禁用 Intel ME。从而使 IT 技术人员可以消除 Intel ME 中的潜在问题。
“ME Platform State Control”(ME 平台状态控制)
选项 说明
“Enabled”(已启用) 在平台上启用 Management Engine
“Disabled”(已禁用) 在平台上禁用 Management Engine
注: “禁用”Intel ME 并不能真正禁用它。它只会造成 Intel ME 代码在 Intel ME 引导的最初阶段暂停,从而导致系统在任意总线上均没
有源自 Intel ME 的通信。这既不适用于正常操作模式,也不是受支持的配置,仅适用于进行调试。通过此选项,IT 技术人员可调试系统
故障,而无需担心 Intel ME 介入。更改 Intel ME 密码
111请在“Intel ME New Password”(Intel ME 新密码)提示符下键入新密码。(请注意密码策略和 “changing the Intel ME Password
requirement”(更改 Intel ME 密码要求)中提及的限制)
111请在弹出的“Verify Password”(验证密码)提示符下重新键入新密码。
密码策略
该选项可确定何时允许用户通过网络更改 Intel MEBx 密码。
注: 用户可随时通过 Intel MEBx 用户界面更改 Intel MEBx 密码。以下是这些选项的简介。
仅默认密码 — 如果尚未更改默认密码,则可通过网络界面更改 Intel MEBx 密码。
在设置和配置期间 — 只能在设置和配置过程中通过网络界面更改 Intel MEBX 密码,而不能在其它时段更改。一旦完成设置和配置过程,
便无法再通过网络界面更改 Intel MEBx 密码。
任何时间 — 可随时通过网络界面更改 Intel MEBX 密码。
网络设置
在“Intel ME Platform Configuration”(Intel ME 平台配置)菜单下,选择“Network Setup”(网络设置),然后按 键。
“Intel ME Platform Configuration”(Intel ME 平台设置)菜单将切换至“Intel ME Network Setup”(Intel ME 网络设置)页。
网络名称设置
在“Intel ME Network Name Settings”(Intel ME 网络名称设置)下,选择“Intel ME Network Name Settings”(Intel ME 网络名称
设置),然后按 键。1.主机名
在“Intel ME Network Name Settings”(Intel ME 网络名称设置)下,选择“Host Name”(主机名),然后按 键。
可将主机名分配至具备 Intel AMT 功能的计算机。这将是启用 Intel AMT 的系统的主机名。
2.域名在“Intel ME Network Name Settings”(Intel ME 网络名称设置)下,选择“Domain Name”(域名),然后按 键。
可将域名分配至具备 Intel AMT 功能的计算机。
3.共享/专用 FQDN
在“Intel ME Network Name Settings”(Intel ME 网络名称设置)下,选择“Shared/Dedicated FQDN”(共享/专用 FQDN),然后按
键。
此设置可确定 Intel ME 完全合格域名 (Fully Qualified Domain Name, FQDN)(即“HostName.DomainName”)是否与主机共享、是否与操作系统计算机名称一致或者是否专用于 Intel ME。
选项 说明
“Dedicated”(专用) FQDN 域名专用于 ME
“Shared”(共享) 与主机共享 FQDN 域名
4.动态 DNS 更新
在“Intel ME Network Name Settings”(Intel ME 网络名称设置)下,选择“Dynamic DNS Update”(动态 DNS 更新),然后按
键。
如果启用了“Dynamic DNS Update”(动态 DNS 更新),则固件会使用“Dynamic DNS Update”(动态 DNS 更新)协议,主动尝试在 DNS
中注册其 IP 地址和 FQDN。如果禁用了该选项,则固件不会使用 DHCP 选项 81 或“Dynamic DNS Update”(动态 DNS 更新)来试图更新
DNS。如果用户从未配置过“DDNS Update”(DDNS 更新)状态(“Enabled”(已启用)或“Disabled”(已禁用)),则固件将会执行旧的实
施方案(即固件使用 DHCP 选项 81 注册 DNS,而不会直接使用动态 DNS 更新协议更新 DNS)。要为“Dynamic DNS Update”(动态 DNS
更新)选择“Enabled”(已启用)时,需要设置“Host Name”(主机名)和“Domain Name”(域名)。
选项 说明
“Enabled”(已
启用)
FW 中的“Dynamic DNS Update Client”(动态
DNS 更新客户端)已启用。
“Disabled”(已
禁用)
FW 中的“Dynamic DNS Update Client”(动态
DNS 更新客户端)已禁用。
5.定期更新间隔
111在“Intel ME Network Name Settings”(Intel ME 网络名称设置)下,选择“Periodic Update Interval”(定期更新间隔),然后
按 键。
111键入所需的时间间隔,然后按 键。注:仅当已 启用“Dynamic DNS Update”(动态 DNS 更新)时,此选项才可用。
定义固件 DDNS 更新客户端发送定期更新的时间间隔。该间隔应根据公司 DNS 清理政策进行设置。单位为分钟。将该值设为 0 可禁用定期更
新。所设的值必须等于或大于 20 分钟。此属性的默认值为 24 小时,即 1440 分钟。
6.TTL
111在“Intel ME Network Name Settings”(Intel ME 网络名称设置)下,选择 TTL,然后按 键。
111键入所需的时间(以秒为单位),然后按 键。注:仅当已启用 “Dynamic DNS Update”(动态 DNS 更新)时,此选项才可用。
此设置允许以秒为单位配置 TTL 时间。该数值应该大于零。如果将该值设为零,则固件会使用其内部默认值,该值为 15 分钟或 1/3 的 DHCP 租
用时间。
7.上一级菜单
111在“Intel ME Network Name Settings”(Intel ME 网络名称设置)下,选择“Previous Menu”(上一级菜单),然后按
键。
111“Intel ME Network Name Settings”(Intel ME 网络名称设置)菜单将切换至“Intel Network Setup”(Intel 网络设置)页。
TCP/IP 设置
111在“Network Setup”(网络设置)菜单下,选择“TCP/IP Settings”(TCP/IP 设置),然后按 键。
111“Intel ME Network Name Settings”(Intel ME 网络名称设置)菜单将切换至“Intel Network Setup”(Intel 网络设置)页。
“Intel Network Setup”(Intel 网络设置)菜单将切换为“TCP/IP Settings”(TCP/IP 设置)页。
注: Intel MEBx 有针对无线 IPv6 的菜单,但没有针对无线 IPv4 的菜单。Intel MEBx 启动时会检查无线接口,以决定是否显示无线
IPv6 菜单。
有线 LAN IPv4 配置
在“TCP/IP Settings”(TCP/IP 设置)下,选择“Wired LAN IPv4 Configuration”(有线 LAN IPv4 配置),然后按 键。
此时,“TCP/IP Settings”(TCP/IP 设置)菜单将切换为“Wired LAN IPv4 Configuration”(有线 LAN IPv4 配置)页。1.DHCP 模式
在“Wired LAN IPv4 Configuration”(有线 LAN IPv4 配置)下,选择“DHCP Mode”(DHCP 模式),然后按 键。
此时,“TCP/IP Settings”(TCP/IP 设置)菜单将切换为“Wired LAN IPv4 Configuration”(有线 LAN IPv4 配置)页。
“ENABLED”(已启用):如果已启用“DHCP Mode”(DHCP 模式),则由 DHCP 服务器配置 TCP/IP 设置。屏幕上将显示更多选项。选
择“ENABLED”(已启用),然后按 键即可,无需执行其他步骤。
“DHCP Mode”(DHCP 模式)已启用。选择“DISABLED”(已禁用),然后按 键。如果您禁用了 DHCP,则会显示更多选项。
“DHCP Mode”(DHCP 模式)已禁用。
2.IPv4 地址
选择“IPv4 Address (IPv4 地址),然后按 键。
在地址栏中键入 IPv4 地址,然后按 键。3.子网掩码地址
选择“Subnet Mask Address”(子网掩码地址),然后按 键。
在地址栏中键入子网掩码地址,然后按 键。
4.默认网关地址选择“Default Gateway Address”(默认网关地址),然后按 键。
在地址栏中键入默认网关地址,然后按 键。
5.首选 DNS 地址
选择“Preferred DNS Address”(首选 DNS 地址),然后按 键。
在地址栏中键入首选 DNS 地址,然后按 键。6.备用 DNS 地址
选择“Alternate DNS Address”(备用 DNS 地址),然后按 键。
在地址栏中键入备用 DNS 地址,然后按 键。
7.上一级菜单
在“Wired LAN IPv4 Configuration”(有线 LAN IPv4 配置)下,选择“Previous Menu”(上一级菜单),然后按 键。
“Wired LAN IPv4 Configuration”(有线 LAN IPv4 配置)菜单将切换至“TCP/IP Settings”(TCP/IP 设置)菜单。
有线 LAN IPv6 配置
在“TCP/IP Settings”(TCP/IP 设置)下,选择“Wired LAN IPv6 Configuration”(有线 LAN IPv6 配置),然后按 键。
此时,“TCP/IP Settings”(TCP/IP 设置)菜单将切换为“Wired LAN IPv6 Configuration”(有线 LAN IPv6 配置)页。
Intel ME IPv6 地址为专用地址,不与主机操作系统共享。要启用针对 IPv6 地址的动态 DNS 注册,必须配置一个专用的 FQDN。注: Intel ME 网络堆栈支持多宿主 IPv6 接口。每个网络接口均可配置为以下 IPv6 地址:
111 一个链接本地自动配置地址
111 三个自动配置全局地址
111 一个已配置 DHCPv6 的地址
111 一个静态配置的 IPv6 地址
1.IPv6 功能选择
在“Wired LAN IPv6 Configuration”(有线 LAN IPv6 配置)下选择“IPv6 Feature Selection”(IPv6 功能选择),然后按
键。
禁用:选择“Disabled”(已禁用),然后按 键。即可禁用“IPv6 Feature Selection”(IPv6 功能选择)。启用:选择“Enabled”(已启用),然后按 键。
即可启用“IPv6 Feature Selection”(IPv6 功能选择)从而进行更详细的配置。
2.IPv6 接口 ID 类型
在“Wired LAN IPv6 Configuration”(有线 LAN IPv6 配置)中选择“IPv6 Interface ID Type”(IPv6 接口 ID 类型),然后按
键。
IPv6 IPv6 IPv6 ID 64 自动配置的 地址由两部分组成; 路由器设置的 前缀为第一部分,接口 是第二部分(各 位)。
选项 说明
“Random
ID”(随机
ID)
按照 RFC 3041 中的说明,使用随机号码自动生成 IPv6 接口 ID。这是默认设置。
Intel ID 使用 MAC 地址自动生成 IPv6 接口 ID。
“Manual
ID”(手动
ID)
手动配置 IPv6 接口 ID。要选择该类型,需要使用有效值设置“Manual Interface
ID”(手动接口 ID)。
3.IPv6 地址
在“Wired LAN IPv6 Configuration”(有线 LAN IPv6 配置)下选择“IPv6 Address”(IPv6 地址),然后按 键。
键入 IPv6 地址,然后按 键。4.IPv6 默认路由器
在“Wired LAN IPv6 Configuration”(有线 LAN IPv6 配置)下选择“IPv6 Default Router”(IPv6 默认路由器),然后按
键。
键入 IPv6 默认路由器,然后按 键。5.首选 DNS IPv6 地址
在“Wired LAN IPv6 Configuration”(有线 LAN IPv6 配置)下选择“Preferred DNS IPv6 Address”(首选 DNS IPv6 地址),然后按
键。
键入首选 DNS IPv6 地址,然后按 键。
6.备用 DNS IPv6 地址
在“Wired LAN IPv6 Configuration”(有线 LAN IPv6 配置)下选择“Alternate DNS IPv6 Address”(备用 DNS IPv6 地址),然后按
键。
键入备用 DNS IPv6 地址,然后按 键。7.上一级菜单
在“Wired LAN IPv6 Configuration”(有线 LAN IPv6 配置)下选择“Previous Menu”(上一级菜单),然后按 键。
即可从“Wired LAN IPv6 Configuration”(有线 LAN IPv6 配置)菜单切换至“TCP/IP Settings”(TCP/IP 设置)菜单。
无线 LAN IPv6 配置
在“TCP/IP Settings”(TCP/IP 设置)中选择“Wireless LAN IPv6 Configuration”(无线 LAN IPv6 配置),然后按 键。
即可从“TCP/IP Settings”(TCP/IP 设置)菜单切换至“Wireless LAN IPv6 Configuration”(无线 LAN IPv6 配置)页。1.IPv6 功能选择
在“Wireless LAN IPv6 Configuration”(无线 LAN IPv6 配置)下选择“IPv6 Feature Selection”(IPv6 功能选择),然后按
键。
2.IPv6 接口 ID 类型在“Wired LAN IPv6 Configuration”(有线 LAN IPv6 配置)中选择“IPv6 Interface ID Type”(IPv6 接口 ID 类型),然后按
键。
自动配置的 IPv6 地址由两部分组成;IPv6 路由器设置的 IPv6 前缀为第一部分,接口 ID 是第二部分(各 64 位)。
选项 说明
“Random
ID”(随机
ID)
按照 RFC 3041 中的说明,使用随机号码自动生成 IPv6 接口 ID。这是默认设置。
Intel ID 使用 MAC 地址自动生成 IPv6 接口 ID。
“Manual
ID”(手动
ID)
手动配置 IPv6 接口 ID。要选择该类型,需要使用有效值设置“Manual Interface
ID”(手动接口 ID)。
3.上一级菜单
在“Wireless LAN IPv6 Configuration”(无线 LAN IPv6 配置)下选择“Previous Menu”(上一级菜单),然后按 键。
即可从“Wireless LAN IPv6 Configuration”(无线 LAN IPv6 配置)菜单切换至“TCP/IP Settings”(TCP/IP 设置)菜单。
取消配置网络访问
111在“Intel ME Platform Configuration”(Intel ME 平台配置)菜单下,选择“Unconfigure Network Access”(取消配置网络访
问),然后按 键。
注: 此操作会将 Intel ME 切换到预配置状态。111选择“Y(是)”即可取消配置。
1111111111111111111111111111111111111111
111选择“Full Unprovisioning”(完全取消预配置),然后按 键。111正在取消预配置。
远程设置和配置
在“Intel ME Platform Configuration”(Intel ME 平台配置)菜单下,选择“Automated Remote Setup and Configuration”(自动远
程设置和配置),然后按 键。
即可从“Intel ME Platform Configuration(Intel ME 平台配置)菜单切换至“Automated Remote Setup and Configuration”(自动远程设
置和配置)页。“Current Provisioning Mode”(当前预配置模式)
在“Automated Setup and Configuration”(自动设置和配置)中选择“Current Provisioning Mode”(当前预配置模式),然后按
键。
“Current Provisioning Mode”(当前预配置模式)– 显示当前的预配 TLS 模式:None(无)、PKI 或 PSK。“Provisioning Record”(预配置记录)
在“Automated Setup and Configuration”(自动设置和配置)下,选择“Provisioning Record”(预配置记录)然后按 键。
“Provisioning Record”(预配置记录)- 显示系统的预配置 PSK/PKI 记录数据。如果尚未输入该数据,则 Intel MEBx 会显示一条信息,说
明“Provision Record not present”(预配置记录不存在)。
如果已输入数据,则“Provisioning Record”(预配置记录)会显示如下信息:
选项 说明
“TLS
provisioning
mode”(TLS 预配
置模式)
显示系统的当前配置模式:“None”(无)、PSK 或 PKI。
“Provisioning
IP”(预配置 IP)
设置和配置服务器的 IP 地址。
“Date of
Provision”(预配
置的日期)
显示预配置的日期和时间,其格式为“MM/DD/YYYY at HH:MM”(MM/DD/YYYY 时间:HH:MM)
DNS
表示在执行远程配置前,Intel MEBx 中是否已配置“PKI DNS Suffix”(PKI DNS 后缀)。值为 0 表示
尚未配置 DNS 后缀,固件会依赖于 DHCP 选项 15,并将此后缀与配置服务器的客户端证书中的 FQDN
进行对比。值为 1 则表示已配置 DNS 后缀,并且固件与配置服务器的客户端证书中 的 DNS 后缀匹配。
“Host Initiated”(主机启动)– 显示设置和配置过程是否已由主机启动:“No”(否)表示设置和配置过程
不是由主机启动的;“Yes”(是)表示设置和配置过程是由主机启动的(仅 PKI)。
“Hash Data”(散
列值数据) 显示 40 个字符的证书散列值数据(仅 PKI)。
“Hash
Algorithm”(散列
值算法)
描述散列值类型。目前,仅支持 SHA1。(仅 PKI)。
IsDefault 如果散列值算法是选定的默认算法,则显示“Yes”(是)。如果散列算法不是所使用的默认算法,则显
示“No”(否)(仅 PKI)。
FQDN 证书中提及的预配置服务器的 FQDN(仅 PKI)。
“SerialNumber”(序列
号)
32 位字符串,表示证书颁发机构分配的序列号。
“Time Validity
Pass”(有效期通
过)
表示证书是否已通过有效期检查。
RCFG
在“Intel Automated Remote Setup and Configuration”(Intel 自动远程设置和配置)菜单下,选择 RCFG,然后按 键。
“Intel Automated Remote Setup and Configuration”(Intel 自动远程设置和配置)菜单将切换至“Intel Remote Configuration”(Intel
远程配置)页。
开始配置
在“Intel Remote Configuration”(Intel 远程配置)菜单下,选择“Start Configuration”(开始配置),然后按 键。
如果未激活“Remote Configuration”(远程配置),则不会进行远程配置。
要激活(启动)“Remote Configuration”(远程配置),请选择“Y”(是)。上一级菜单
在“Intel Remote Configuration”(Intel 远程配置)菜单下,选择“Previous Menu”(上一级菜单),然后按 键。
“Intel Remote Configuration”(Intel 远程配置)菜单将切换至“Intel Automated Setup and Configuration”(Intel 自动设置和配置)
页。
预配置服务器 IPv4/IPv6
在“Intel Automated Remote Setup and Configuration”(Intel 自动远程设置和配置)菜单下,选择 “Provisioning Server
IPv4/IPv6”(预配置服务器 IPv4/IPv6),然后按 键。
111 键入预配置服务器地址,然后按 键。111键入预配置服务器端口号,然后按 键。
Intel AMT 预配置服务器的端口号为 (0 - 65535)。默认端口号为 9971。
预配置服务器 FQDN
在“Intel Automated Remote Setup and Configuration”(Intel 自动远程设置和配置)菜单下,选择“Provisioning Server
FQDN”(预配置服务器 FQDN),然后按 键。键入预配置服务器的 FQDN,然后按 键。
证书中提及的预配置服务器的 FQDN(仅 PKI)。这也是 AMT 针对 PSK 和 PKI 向其发送呼叫数据包的服务器的 FQDN。
TLS PSK
在“Intel Automated Remote Setup and Configuration”(Intel 自动远程设置和配置)菜单下,选择 TLS PSK,然后按 键。
“Intel Automated Remote Setup and Configuration”(Intel 自动远程设置和配置)菜单将切换至“Intel TLS PSK Configuration”(Intel
TLS PSK 配置)页。
此子菜单包含用于 TLS PSK 配置设置的设置设置 PID 和 PPS
在“Intel TLS PSK Configuration”(Intel TLS PSK 配置)菜单下,选择“Set PID and PPS”(设置 PID 和 PPS),然后按
键。
键入 PID,然后按 键。
键入 PPS,然后按 键。
如果设置和配置处于“In-process”(正在进行)状态,则设置 PID/PPS 会导致部分取消预配置。应以短横线格式输入 PID 和 PPS。(例如PID:1234-ABCD;PPS:1234-ABCD-1234-ABCD-1234-ABCD-1234-ABCD)
注: 值为“0000-0000-0000-0000-0000-0000-0000-0000”的 PPS 并不会改变设置配置状态。如果使用该值,则设置和配置将保持
为“Not-started”(未启动)的状态。
删除 PID 和 PPS
在“Intel TLS PSK Configuration”(Intel TLS PSK 配置)菜单下,选择“Delete PID and PPS”(删除 PID 和 PPS),然后按
键。
此选项会删除存储在 Intel ME 中的当前 PID 和 PPS。如果之前没有输入 PID 和 PPS,则 Intel MEBx 会返回错误消息。
要删除 PID 和 PPS 条目,请选择“Y”(是),否则选择“N”(否)。
上一级菜单
在“Intel TLS PSK Configuration”(Intel TLS PSK 配置)菜单下,选择“Previous Menu”(上一级菜单),然后按 键。
“Intel TLS PSK Configuration”(Intel TLS PSK 配置)菜单将切换至“Intel Automated Setup and Configuration”(Intel 自动设置和配
置)页。
TLS PKI
在“Intel Automated Setup and Configuration”(Intel 自动设置和配置)菜单下,选择 TLS PKI,然后按 键。
“Intel Automated Remote Setup and Configuration”(Intel 自动远程设置和配置)菜单将切换至“Intel Remote Configuration”(Intel
远程配置)页。
远程配置
在“Intel Remote Configuration”(Intel 远程配置)菜单下,选择“Remote Configuration”(远程配置),然后按 键。
如果设置和配置服务器处于“In-process”(正在进行)状态,则启用/禁用“Remote Configuration”(远程配置)会导致部分取消预配置。选项 说明
“Disabled”(已
禁用)
“Remote Configuration”(远程配置)已禁用。仅“Remote
Configuration”(远程配置)和“Previous Menu”(上一级菜单)项目可见。
“Enabled”(已
启用) “Remote Configuration”(远程配置)已启用,屏幕上将会显示其他字段。
要禁用:选择“Disabled”(已禁用),然后按 键。
要启用:选择“Enabled”(已启用),然后按 键。
PKI DNS 后缀
在“Intel Remote Configuration”(Intel 远程配置)菜单下,选择“PKI DNS Suffix”(PKI DNS 后缀),然后按 键。
键入 PKI DNS 后缀,然后按 键。管理散列值
在“Intel Remote Configuration”(Intel 远程配置)菜单下,选择“Manage Hashes”(管理散列值),然后按 键。
选择此选项,将枚举系统中的散列值,并显示散列值名称、活动状态和默认状态。如果系统中不包含任何散列值,Intel MEBx 则会显示下方的屏
幕。回答“Yes”(是),系统将开始添加定制散列值。请参阅后文中的下一节。
“Manage Certificate Hash”(管理证书散列值)屏幕提供了多个键盘控件,用于在系统中管理散列值。在“Manage Certificate Hash”(管理
证书散列值)菜单中,以下键有效:
键 说明
“Escape”(
键) 从菜单退出。
键 向系统添加定制的证书散列值。
键 删除系统中当前选定的证书散列值。
<+> 键 更改当前选定证书散列值的活动状态。
键 显示当前选定的证书散列值的详细信息。
添加定制散列值
在“Manage Certificate Hash”(管理证书散列值)屏幕上按 键后,系统会显示以下屏幕:要添加定制证书散列值:必须键入散列值名(最大不得超过 32 个字符)。按 键后,系统将提示您输入证书散列值。
1111111111111
证书散列值是一个十六进制数字(对于 SHA-1,为 20 字节;对于 SHA-2,为 32 字节)。必须使用正确的格式输入散列值,否则系统会显
示“Invalid Hash Certificate Entered - Try Again”(输入的散列值证书无效 - 请重新输入)信息。按 键后,系统会提示您设置散
列值的活动状态。您可以将定制散列值设置为以下活动状态:
“Yes”(是)— 将定制散列值标记为活动。
“No”(否)— 将定制散列值添加到 EPS,但并不处于活动状态。
删除散列值
在“Manage Certificate Hash”(管理证书散列值)屏幕上按 键后,系统会显示以下屏幕:
注: 无法删除设为“Default”(默认)的证书散列值。该选项允许删除选定的证书散列值。
“Yes”(是)— Intel MEBx 向固件发送删除选定散列值的消息。
“No”(否)— Intel MEBx 不会删除选定的散列值,并返回“Remote Configuration”(远程配置)。
更改活动状态
在“Manage Certificate Hash”(管理证书散列值)屏幕上按 <+> 键后,系统会显示以下屏幕:
回答“Yes”(是),会将当前选定的证书散列值切换为活动状态。将散列值设置为活动状态,表示可在 PSK 预配置期间使用该散列值。
查看证书散列值
在“Manage Certificate Hash”(管理证书散列值)屏幕上按 键后,系统会显示以下屏幕:系统会向用户显示选定的证书散列值的详细信息,其中包括:
散列值名称
证书散列值数据
活动和默认状态
上一级菜单
在“Intel Remote Configuration”(Intel 远程配置)菜单下,选择“Previous Menu” (上一级菜单),然后按 键。
“Intel Remote Configuration”(Intel 远程配置)菜单将切换至“Intel Automated Setup and Configuration”(Intel 自动设置和配置)
页。
FW 更新设置
在“Intel ME Platform Configuration”(Intel ME 平台配置)菜单下,选择“FW Update Settings”(FW 更新设置),然后按
键。
“Intel ME Platform Configuration”(Intel ME 平台设置)菜单将切换至“FW Update Settings”(FW 更新设置)页。本地 FW 更新
在“FW Update Settings”(FW 更新设置)菜单下,选择“Local FW Update”(本地 FW 更新),然后按 键。
通过“Intel ME Firmware Local Update”(Intel ME 固件本地更新),用户可允许或阻止固件在字段中进行本地更新。选择“Enabled”(已启
用)选项后,IT 管理员便能通过本地 Intel Management Engine(Intel 管理引擎)界面或本地安全接口,更新 Intel ME 固件。
这种本地固件更新无需使用管理员用户名和密码。因此,一旦本地更新完成,Intel ME 固件就会自动将此设置设为“Disabled”(已禁用)。如需
进行本地更新,则此选项必须设为“Enabled”(已启用)。安全 FW 更新
在“FW Update Settings”(FW 更新设置)菜单下,选择“Secure FW Update”(安全 FW 更新),然后按 键。
该选项允许您启动或禁用安全固件更新。“Secure Firmware Update”(安全固件更新)功能需使用管理员用户名和密码。如果没有提供管理员用
户名和密码,则无法更新固件。
启用“Secure Firmware Update”(安全固件更新)功能后,IT 管理员可使用安全方法更新固件。可通过 LMS 驱动程序更新安全固件。
上一级菜单
在“FW Update Settings”(FW 更新设置)菜单下,选择“Previous Menu”(上一级菜单),然后按 键。
“FW Update Settings”(FW 更新设置)菜单将切换至“Intel ME Platform Configuration”(Intel ME 平台配置)页。
设置 PRTC
在“Intel ME Platform Configuration”(Intel ME 平台配置)菜单下,选择“Set PRC”(设置 PRC),然后按 键。有效的日期范围为 2004 年 1 月 1 日至 2021 年 1 月 4 日。设置 PRTC 值可用于在断电 (G3) 状态下物理保留 PRTC。
按照 GMT (UTC) 格式“YYYY:MM:DD:HH:MM:SS”(年:月:日:时:分:秒)键入 PRTC,然后按 键。
电源控制
在“Intel ME Platform Configuration”(Intel ME 平台配置)菜单下,选择“Power Control”(电源控制),然后按 键。
“Intel ME Platform Configuration”(Intel ME 平台配置)菜单将切换至“Intel Power Control”(Intel 电源控制)页。为遵守“能源之星”* 和 EUP LOT6 规定,可在各种睡眠状态下关闭 Intel ME。“Intel ME Power Control”(Intel ME 电源控制)菜单可用于配
置 Intel ME 平台上与电源有关的策略。
在主机睡眠状态下开启 Intel ME
在“Intel ME Power Control”(Intel ME 电源控制)菜单下,选择“Intel ME ON in Host Sleep States”(在主机睡眠状态下开启 Intel
ME),然后按 键。
选定的电源组将决定何时打开 Intel ME。可使用 FITC 或 FPT 修改默认的电源组。
最终用户管理员可根据系统使用情况选择使用哪个电源组。
下表显示了电源组的详细信息。
通过 Intel ME WoL,计时器超时后,Intel ME 会一直保持 M-off 状态,直至有命令发送到 ME。系统发送了此命令后,Intel ME 将切换到 M0
或 M3 状态,并且将对发送的下条命令作出反应。发送到 Intel ME 的 ping 命令也将使 Intel ME 转到 M0 或 M3 状态。
Intel ME 需要一小段时间才能从 M-off 状态切换到 M0 或 M3 状态。在此期间,Intel AMT 将不会对任何 Intel ME 命令作出反应。Intel ME
已转成 M0 或 M3 状态后,系统才对 Intel ME 命令作出反应。
电源组 1 2
S0 开 开
S3 关 开/ME WoL
S4/S5 关 开/ME WoL
选择所需的“Power Policy”(电源策略),然后按 键。
注:若 将系统置于预配置状态,系统将自动切换到“Power Package 2”(电源组 2)。不过,稍后可通过 WebUI、管理控制台或 MEBx
改变此状态。
空闲超时
在“Intel ME Power Control menu”(Intel ME 电源控制)菜单下,选择“Idle Time Out” (空闲超时),然后按 键。该设置用于启用“Intel ME Wake”(Intel ME 唤醒)并定义 Intel ME 在 M3 状态下的空闲超时。请以分钟数形式输入该值。该值表示 Intel ME
转变为 M-off 状态之前,可在 M3 状态中保持空闲的总时间。
注: 如果 Intel ME 处于 M0 状态,则不会转为 M-off 状态。
上一级菜单
在“Intel ME Platform Configuration”(Intel ME 平台配置)菜单下,选择“Previous Menu”(上一级菜单),然后按 键。
“Intel ME Power Control”(Intel ME 电源控制)菜单将切换至 “Intel ME Platform Configuration”(Intel ME 平台配置)页。
*
本页面上的信息由 Intel 提供。
返回目录页面返回目录页面
AMT 配置
在彻底配置 Intel® Management Engine (ME) 功能后,务必在配置 Intel AMT 前重新引导以完成无干扰的系统引导。从 Management
Engine BIOS Extension (MEBx) 主菜单中选择“Intel AMT configuration”(Intel AMT 配置)选项。用户可使用此功能配置具备
Intel AMT 功能的计算机,以支持 Intel AMT 管理功能。
注: 您需要对网络术语和计算机技术术语有基本了解,例如 TCP/IP、DHCP、VLAN、IDE、DNS、子网掩码、默认网关和域名。对这些
术语进行解释并不属于本说明文件的范畴。
显示“Intel AMT Configuration”(Intel AMT 配置)页面。指向各部分的快速链接如下。
可管理性功能选择
SOL/IDER
用户名和密码
SOL
重定向模式
上一级菜单
KVM 配置
KVM 功能选择
用户自愿加入
从远程 IT 配置自愿加入
上一级菜单
上一级菜单
“Intel AMT Configuration”(Intel AMT 配置)页面包含下列用户可配置选项。
可管理性功能选择
在“Main Menu”(主菜单)中选择“Intel AMT Configuration”(Intel AMT 配置),然后按 键。“Main Menu”(主菜单)将切
换至“Intel AMT Configuration”(Intel AMT 配置)页。
在“Intel AMT Configuration”(Intel AMT 配置)菜单中选择“Manageability Feature Selection”(可管理性功能选择),然后按