No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

CX220 Switch Module V100R001C10 User Guide 08

This document describes the CX220 FC switch module of the E9000 server in terms of its features, installation, removal, and configuration.
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
About This Document

About This Document

Purpose

This document describes the CX220 FC switch module of the E9000 server in terms of its features, installation, removal, and configuration.

Intended Audience

This document is intended for:

  • Technical support engineers
  • Installation and commissioning engineers
  • Field maintenance engineers
  • System maintenance engineers

Symbol Conventions

The symbols that may be found in this document are defined as follows.

Symbol Conventions

Symbol

Description

Indicates an imminently hazardous situation which, if not avoided, will result in death or serious injury.

Indicates a potentially hazardous situation which, if not avoided, could result in death or serious injury.

Indicates a potentially hazardous situation which, if not avoided, may result in minor or moderate injury.

Indicates a potentially hazardous situation which, if not avoided, could result in equipment damage, data loss, performance deterioration, or unanticipated results.

NOTICE is used to address practices not related to personal injury.

Calls attention to important information, best practices and tips.

NOTE is used to address information not related to personal injury, equipment damage, and environment deterioration.

Security Conventions

  • Password setting
    • When configuring a password, the cipher text is recommended. To ensure device security, change the password periodically.
    • Do not start and end a cipher-text password with %^%#. By default, the system regards a password starting and ending with %^%# as a valid cipher-text password that can be decrypted. The password displayed in the configuration file is the same as the cipher-text password entered by the user. After the system root key is set using the set master-key command, do not start and end the key with %@%# because the string starting and ending with %@%# is regarded as a valid cipher-text key.
    • When you configure a password in cipher text, different features cannot use the same cipher-text password. For example, the cipher-text password set for the AAA feature cannot be used for other features.
  • Encryption algorithm

    Currently, the device uses the following encryption algorithms: 3DES, AES, RSA, SHA1, SHA2, and MD5. 3DES, RSA and AES are reversible, while SHA1, SHA2, and MD5 are irreversible. The encryption algorithms DES/3DES/RSA (RSA-1024 or lower)/MD5 (in digital signature scenarios and password encryption)/SHA1 (in digital signature scenarios) have a low security, which may bring security risks. If protocols allowed, using more secure encryption algorithms, such as AES/RSA (RSA-2048 or higher)/SHA2/HMAC-SHA2, is recommended. The encryption algorithm depends on actual networking. The irreversible encryption algorithm (SHA2 is recommended) must be used for the administrator password.

  • Personal data

    Some personal data may be obtained or used during operation or fault location of your purchased products, services, features, so you have an obligation to make privacy policies and take measures according to the applicable law of the country to protect personal data.

  • The terms mirrored port, port mirroring, traffic mirroring, and mirroring in this manual are mentioned only to describe the product's function of communication error or failure detection, and do not involve collection or processing of any personal information or communication data of users.

Change History

Issue

Date

Description

08

2018-09-20

This issue is the eighth official release.

07

2018-03-30

This issue is the seventh official release.

06

2017-03-27

This issue is the sixth official release, and includes the following changes:

Added product model descriptions to Appearance.

05

2016-08-31

This issue is the fifth official release, and includes the following changes:

Modified Using the CLI to Collect FC switching plane Information.

04

2016-03-31

This issue is the fourth official release, and includes the following changes:

03

2015-10-19

This issue is the third official release, and includes the following changes:

Added the long-term storage temperature and humidity to Technical Specifications.

02

2015-07-17

This issue is the second official release, and includes the following changes:

The reference to the throughput is added to Technical Specifications.

01

2015-03-20

This issue is the first official release.

Translation
Download
Updated: 2018-09-20

Document ID: EDOC1000069171

Views: 8103

Downloads: 840

Average rating:
This Document Applies to these Products
Related Documents
Share
Previous Next