Flexibility, bandwidth and investment protection
The Cisco® Catalyst® Blade Switch 3130X is a component of the FlexIO™ architecture of the PowerEdge™ M1000e modular server enclosure. FlexIO delivers features plus a level of I/O (input/output) flexibility, bandwidth and investment protection that are truly exceptional in the blade server market. The 3130X also offers future-proofing with 10 Gigabit connectivity options.
- 20 (16 internal, 4 external) 10/100/1000BASE-T auto-sensing Gigabit Ethernet switching ports
Either 4 Small Form-Factor Pluggable (SFP) Gigabit Ethernet ports (using included Cisco TwinGig Converter Modules in the X2 slots) or 2 X2 based 10 Gigabit ports (SFP and X2 cage supports only SFP and X2 modules from Cisco)
One external console port
2 high-speed stack connectors (Virtual Blade Switch)
- Up to 128-Gbps switching fabric
Forwarding rate based on 64-byte packets; up to 59.2 million packets per second (mpps)
Configurable maximum transmission units (MTUs) of up to 9018 bytes (jumbo frames)
256 MB DDR SDRAM
64 MB flash memory
- IP Base:
Routing Information Protocol Version 1 (RIPv1) and RIPv2
IP Services Upgrade: Includes IP Base features and adds
- VLAN trunks can be created from any port, using either standards-based IEEE 802.1Q tagging or the Cisco Inter-Switch Link (ISL) VLAN architecture.
Up to 1005 VLANs per switch and up to 128 spanning-tree instances per switch are supported.
4096 VLAN IDs are supported.
Cisco VTP supports dynamic VLANs and dynamic trunk configuration across all switches.
Quality of Service
- Wire-rate performance enables highly granular QoS functions (for example, granular rate limiting).
Asynchronous data flows upstream and downstream from the end station or on an uplink are easily managed using ingress policing and egress shaping.
IEE 802.1p CoS and DSCP field classification are provided, using marking and reclassification on a per-packet basis by source and destination IP address, source and destination MAC address, or Layer 4 TCP or UDP port number.
Rate limiting is provided based on source and destination IP address, source and destination MAC address, Layer 4 TCP or UDP information, or any combination of these fields, using QoS ACLs (IP ACLs or MAC ACLs), class maps, and policy maps.
Up to 64 aggregate or individual policers per port are allowed.
Cisco control plane and data plane QoS ACLs on all ports help ensure proper marking on a per-packet basis.
4 egress queues per port enable differentiated management of up to 4 traffic flows.
SRR scheduling helps ensure differential prioritization of packet flows by intelligently servicing the egress queues.
Weighted Tail Drop (WTD) provides congestion avoidance at the ingress and egress queues before a disruption occurs.
Strict priority queuing guarantees that the highest-priority packets are serviced ahead of all other traffic.
The Cisco Committed Information Rate (CIR) function guarantees bandwidth in increments as low as 8 Kbps.
- IEEE 802.1x allows dynamic, port-based security, providing server authentication.
IEEE 802.1x with VLAN assignment allows a dynamic VLAN assignment for a specific server, regardless of where the server is connected.
IEEE 802.1x and port security are provided to authenticate the port and manage network access for all MAC addresses, including those of the server.
IEEE 802.1x with an ACL assignment allows specific identity-based security policies, regardless of where the server is connected.
IEEE 802.1x with guest VLAN allows servers without IEEE 802.1x clients to have limited network access on the guest VLAN.
Cisco security VLAN ACLs (VACLs) on all VLANs prevent unauthorized data flows from being bridged within VLANs.
Port-based ACLs (PACLs) allow security policies to be applied on individual switch ports.
SSHv2, Kerberos, and SNMPv3 provide network security by encrypting administrator traffic during Telnet and SNMP sessions. SSH, Kerberos, and the cryptographic version of SNMPv3 require a special cryptographic software image because of U.S. export restrictions.
Secure Sockets Layer (SSL) provides a secure means to use Web-based tools such as HTML-based device managers.
Private VLAN Edge provides security and isolation between switch ports, helping ensure that users cannot snoop on other users’ traffic.
Bidirectional data support on the Switched Port Analyzer (SPAN) port allows the Cisco Secure Intrusion Detection System (IDS) [[PLS PROVIDE FULL PRODUCT NAME; NOT ON MDS]] to take action when an intruder is detected.
TACACS+ and RADIUS authentication enables centralized control of the switch and restricts unauthorized users from altering the configuration.
MAC address notification allows administrators to be notified of servers added to or removed from the network.
Port security secures access to an access or trunk port based on the MAC address.
After a specific time period, the Aging feature removes the MAC address from the switch to allow another server to connect to the same port.
Multilevel security on console access prevents unauthorized users from altering the switch configuration.
The user-selectable address-learning mode simplifies configuration and enhances security.
BPDU Guard shuts down Spanning Tree Protocol PortFast-enabled interfaces when BPDUs are received to avoid accidental topology loops.
Spanning Tree Root Guard (STRG) prevents edge devices not in the network administrator’s control from becoming Spanning Tree Protocol root nodes.
IGMP filtering provides multicast authentication by filtering out non-subscribers and limits the number of concurrent multicast streams available per port.
Dynamic VLAN assignment is supported through implementation of the VLAN Membership Policy Server (VMPS) client function to provide flexibility in assigning ports to VLANs. Dynamic VLAN enables the fast assignment of IP addresses.
1000 security access control entries are supported.
Dynamic Address Resolution Protocol (ARP) Inspection (DAI) helps ensure user integrity by preventing malicious users from exploiting the insecure nature of ARP.
DHCP Snooping prevents malicious users from spoofing a DHCP server and sending out bogus addresses. This feature is used by other primary security features to prevent a number of other attacks such as ARP poisoning.
IP Source Guard prevents a malicious user from spoofing or taking over another user’s IP address by creating a binding table between the client’s IP and MAC address, port, and VLAN.
Private VLANs restrict traffic between hosts in a common segment by segregating traffic at Layer
- Dimensions (L x W x H) - 9.8 x 9.1 x 1.1 inches ( 24.8 x 23.1 x 2.9 cm)
Weight - Approximately 4.0 lb ( 1.8 kg)
- BRIDGE-MIB (RFC1493)
IF-MIB (in and out counters for VLANs are not supported)
RFC1213-MIB (by agent; capabilities specified in CISCO-RFC1213-CAPABILITY.my)
- IEEE 802.1s
IEEE 802.3x full duplex on 10BASE-T, 100BASE-TX, and 1000BASE-T ports
IEEE 802.1D Spanning Tree Protocol
IEEE 802.1p CoS Prioritization
IEEE 802.1Q VLAN
IEEE 802.3 10BASE-T specification
IEEE 802.3u 100BASE-TX specification
IEEE 802.3ab 1000BASE-T specification
IEEE 802.3z 1000BASE-X specification
RMON I and II standards
SNMPv1, SNMPv2c, and SNMPv3
Environmental Operating Conditions
- Operating temperature: 0° to 40°C
Storage temperature: -25° to 70°C
Operating relative humidity: 10 to 85% non-condensing
Storage relative humidity: 5 to 95% non-condensing
12V at 6.25A (75W) (max)
The Cisco Catalyst Blade Switch 3130 for Dell™ M1000e modular server enclosure has two configurations. One configuration allows customers to connect the switch to the existing network fabric using Gigabit Ethernet uplinks, and the other configuration allows customers to connect the switch to the existing network fabric using Gigabit and 10 Gigabit Ethernet uplinks.
Configuration 1: Cisco Catalyst Blade Switch 3130G for Dell M1000e
Supports up to eight Gigabit Ethernet uplink ports: 4 10/100/1000 BASE-T ports and four small form-factor pluggable (SFP) Gigabit Ethernet ports (using Cisco TwinGig Converter Modules in the X2 slots)
Configuration 2: Cisco Catalyst Blade Switch 3130X for Dell M1000e
Supports up to four 10/100/1000 BASE-T ports and two X2-based 10 Gigabit Ethernet ports
Dell offers a variety of on-site and remote support options that can be added at time of purchase. Dell ProSupport ensures problems are diagnosed and resolved by experts.
|On-site and Remote Assistance|
Get immediate access to Dell ProSupport professionals who can help you troubleshoot and diagnose issues that may arise in your network.
Free yourself to focus on the business and allow Dell to manage your network with dedicated professional support.
Learn practical knowledge and operational techniques.
Network assessments offer a holistic view of your multivendor environment and a reference point for how your infrastructure is performing. Our experts can pinpoint and expose issues in your network using specialized software and diagnostic tools. These unbiased and insightful analytics are aggregated into comprehensive reports that can include recommendations on how to improve performance, optimize devices and remediate problems.
Is your network complex and coiled? Dell can perform a detailed audit and inventory of all multivendor devices in the network to provide visibility and identify configuration issues.
Network Optimization Assessment
Many networks are a multivendor patchwork of devices not running at their optimal state. We can analyze devices from all leading vendors and make recommendations to optimize the entire multivendor design, fine-tune devices and maximize performance of the holistic environment.
Application Performance Assessment
When business applications and databases begin to show signs of latency or completely shut down, we can conduct a comprehensive analysis to uncover performance issues, isolate problems and accelerate troubleshooting of the enterprise infrastructure and software applications.
Moving to a Voice-over-IP (VoIP) solution requires the right network infrastructure to support real-time voice protocols. Simulated load testing, analysis and review can identify the next steps to building a VoIP platform or fixing issues of an existing one.
Network Security Assessment
Safeguard your network from constant attack. Let our experts examine and uncover potential vulnerabilities and provide a comprehensive security design assessment.
Wireless Site Survey
Great wireless connectivity starts with a detailed site survey. Dell can analyze existing infrastructure, identify RF interference and recommend the best design and optimal placement of new devices.
The Dell standardized deployment service guarantees that setup and optimization are done correctly so that you can launch faster and focus on daily business.
Expert planning and execution seamlessly weaves Dell’s open systems architecture with existing network infrastructure from Cisco, HP, Juniper and others. Choose ProDeploy Plus, the most complete deployment offer on the market for complex environments.
Setting up network protocols, and policies can be tricky. Dell certified network engineers can configure and optimize your new hardware remotely or on-site and get new technology up and running fast .
Mounting and cabling of wired and wireless devices can be tedious and time-consuming. Get worry-free hardware installations with experienced Dell technicians who do deployments every day .
Dell network consulting provides on-site or remote access to highly skilled professionals who provide project assistance and guidance across a variety of technologies for a specific project or timeframe.
- Access Distribution Networking
- Gateway and Security
- Microsoft Exchange
- Wireless Networking
- Systems Management
- Core Layer/MPLS Networking
- Data Protection and Recovery
- Storage Area Networking (SAN)
- Storage Technologies