No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Configuration Guide - Device Management

S1720, S2700, S5700, and S6720 V200R011C10

This document describes the principles and configurations of the Device Management features, and provides configuration examples of these features.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Overview of Stacks

Overview of Stacks


Intelligent Stack is a technology that enables multiple stacking-capable switches to function as a single logical switching device. This technology is also called iStack. As shown in Figure 9-3, after SwitchA and SwitchB are connected by stack cables and form a stack, their upstream and downstream devices consider them as one switch.

Figure 9-3  Schematic diagram of a stack


Stack technology provides high network reliability and scalability, while simplifying network management.
  • High reliability: Member switches in a stack work in redundancy mode. Link redundancy can also be implemented between member switches through inter-device link aggregation. Member switches can join or leave the stack without affecting other member switches. New switches automatically synchronize the configuration file and system software version with the master switch.

  • High scalability: You can increase ports, bandwidth, and processing capacity of a stack by simply adding member switches to the stack.

  • Simplified configuration and management: You can log in to a stack from any member switch to manage and configure all the member switches in the stack. In addition, complicated Layer 2 ring protection protocols or Layer 3 protection switching protocols are not required after switches set up a stack, making the network configuration much simpler.

Updated: 2019-09-23

Document ID: EDOC1000178167

Views: 206052

Downloads: 989

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next