C H A P T E R  8

Separating Blades Using VLANs Hidden From the External Network

This chapter is for customers whose network infrastructure does not fully support VLANs or for customers who want to minimize the wider network administration tasks associated with integrating a blade system chassis into their existing environment.

It contains the following sections:

Note - If you reset the switch while you are performing the instructions in this section, you must save the configuration first. If you do not, you will lose all of your changes. To save the configuration, follow the instructions in Section A.9, Saving Your Switch Settings.

8.1 Introduction

This chapter describes two methods of configuring VLANs inside the chassis to provide network separation between server blades without the VLANs being visible to external devices on the network.

8.2 Using Dedicated VLANs for Each Blade

The configuration described in this section includes one dedicated VLAN for each blade. This VLAN is for traffic originating on the blade.

It also includes a VLAN containing all of the ports. This VLAN is used for traffic originating on the external network.

The configuration is illustrated in FIGURE 8-1. The dedicated VLANs for each blade are numbered from 10 (for the blade in slot 0) to 25 (for the blade in slot 15). Because a second SSC is installed, the ce1 interface on each blade is also used. All of the uplink ports are included in a shared VLAN (numbered 30).

Note - You can use this configuration with one or two switches. If you have a chassis containing two SSCs, you can replicate the configuration of the first switch on the second. This enables you to make use of the second interface on each blade for redundancy.