A SERVICE OF

logo

1-16
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
Chapter 1 Overview
Network Configuration Examples
Unicast and multicast traffic flooding is not blocked. For more information, see Chapter 25,
“Configuring Port-Based Traffic Control.”
No secure ports are configured. For more information, see Chapter 25, “Configuring Port-Based
Traffic Control.”
CDP is enabled. For more information, see Chapter 26, “Configuring CDP.”
UDLD is disabled. For more information, see Chapter 28, “Configuring UDLD.”
SPAN and RSPAN are disabled. For more information, see Chapter 29, “Configuring SPAN and
RSPAN.”
RMON is disabled. For more information, see Chapter 30, “Configuring RMON.”
Syslog messages are enabled and appear on the console. For more information, see Chapter 31,
“Configuring System Message Logging.”
SNMP is enabled (Version 1). For more information, see Chapter 32, “Configuring SNMP.”
No ACLs are configured. For more information, see Chapter 34, “Configuring Network Security
with ACLs.”
QoS is disabled. For more information, see Chapter 36, “Configuring QoS.”
No EtherChannels are configured. For more information, see Chapter 37, “Configuring
EtherChannels and Link-State Tracking.”
IP unicast routing is disabled. For more information, see Chapter 38, “Configuring IP Unicast
Routing.”
No HSRP groups are configured. For more information, see Chapter 40, “Configuring HSRP.”
IP multicast routing is disabled on all interfaces. For more information, see Chapter 44,
“Configuring IP Multicast Routing.”
MSDP is disabled. For more information, see Chapter 45, “Configuring MSDP.”
Fallback bridging is not configured. For more information, see Chapter 46, “Configuring Fallback
Bridging.”
Network Configuration Examples
This section provides network configuration concepts and includes examples of using the switch to
create dedicated network segments and interconnecting the segments through Gigabit Ethernet and
10-Gigabit Ethernet connections.
“Design Concepts for Using the Switch” section on page 1-16
“Small to Medium-Sized Network” section on page 1-19
Design Concepts for Using the Switch
As your network users compete for network bandwidth, it takes longer to send and receive data. When
you configure your network, consider the bandwidth required by your network users and the relative
priority of the network applications that they use.
Table 1-1 describes what can cause network performance to degrade and how you can configure your
network to increase the bandwidth available to your network users.