Flexibility, bandwidth and investment protection
- 20 (16 internal, 4 external) 10/100/1000BASE-T auto-sensing Gigabit Ethernet switching ports
4 Small Form-Factor Pluggable (SFP) Gigabit Ethernet ports (using included Cisco TwinGig Converter Modules in the X2 slots)
One external console port
2 high-speed stack connectors (Virtual Blade Switch)
- Up to 128-Gbps switching fabric
Forwarding rate based on 64-byte packets; up to 59.2 Mpps
256 MB DDR SDRAM and 64 MB Flash memory
Configurable maximum transmission units (MTUs) of up to 9018 bytes (jumbo frames)
MAC, routing, security, and QoS scalability numbers depend on the type of template used in the switch:
Default Template Access Template VLAN Template Routing Template MAC address 6K 4K 12K 3K IGMP groups and multicast routes 6K 1K 1K 1K 1K Total unicast routes 8K 6K 0 11K Directly connected hosts 6K 4K 0 3K Indirect routes 2K 2K 0 8K Security ACEs 1K 2K 1K 1K QoS ACEs 0.5K 0.5K 0.5K 0.5K PBR ACEs 0 0.5K 0 0.5K
- Superior resiliency for higher server / application availability
The Virtual Blade Switch (VBS) is highly resilient. Each switch can operate both as master controller and as forwarding processor. Each switch in the VBS can serve as a master, creating a 1:N availability scheme for network control. In the unlikely event of a single unit failure, all other units continue to forward traffic and maintain operation.
High-availability features include:
Cross-switch EtherChannel provides the ability to configure Cisco EtherChannel technology across different members of the VBS for high resiliency.
IEEE 802.1D Spanning Tree Protocol support for redundant backbone connections and loop-free networks simplifies network configuration and improves fault tolerance.
Cisco UplinkFast and BackboneFast technologies help to ensure quick failover recovery, enhancing overall network stability and reliability.
IEEE 802.1s/w Rapid Spanning Tree Protocol (RSTP) and Multiple Spanning Tree Protocol (MSTP) provide rapid spanning-tree convergence independent of spanning-tree timers and also offer the benefit of Layer 2 load balancing and distributed processing. The Virtual Blade Switch units behave as a single spanning-tree node.
Per-VLAN Rapid Spanning Tree (PVRST+) allows rapid spanning-tree reconvergence on a per-VLAN spanning-tree basis, without requiring the implementation of spanning-tree instances.
VLAN Trunking Protocol (VTP) pruning limits bandwidth consumption on VTP trunks by flooding broadcast traffic only on trunk links required to reach the destination devices.
The Trunk Failover feature allows rapid failover to the redundant switch in the blade enclosure if all uplinks from the primary switch fail. When the uplinks fail, the switch shuts down the ports connected to the blade servers and lets network interface card (NIC) teaming software direct traffic to the redundant switch. This feature is also known as Link State Tracking.
Switch port autorecovery (errdisable) automatically attempts to re-enable a link that is disabled because of a network error.
Power and cooling resiliency are provided through redundant power and cooling capabilities from the blade enclosure.
Flexlink provides link redundancy with convergence time less than 100 ms.
Cisco Hot Standby Router Protocol (HSRP) is supported to create redundant, failsafe routing topologies.
Unidirectional Link Detection Protocol (UDLD) and Aggressive UDLD allow unidirectional links caused by incorrect fiber-optic wiring or port faults to be detected and disabled on fiber-optic interfaces.
Switch-port autorecovery (Errdisable) automatically attempts to reactivate a link that is disabled because of a network error.
Per-port broadcast, multicast, and unicast storm control prevents faulty servers from degrading overall systems performance.
Internet Group Management Protocol (IGMP) snooping provides fast client joins and leaves of multicast streams and limits bandwidth-intensive video traffic to only the requestors.
Multicast VLAN Registration (MVR) continuously sends multicast streams in a multicast VLAN while isolating the streams from subscriber VLANs for bandwidth and security reasons.
- IP Base:
Routing Information Protocol Version 1 (RIPv1) and RIPv2
IP Services Upgrade: Includes IP Base features and adds
- VLAN trunks can be created from any port, using either standards-based IEEE 802.1Q tagging or the Cisco Inter-Switch Link (ISL) VLAN architecture.
Up to 1005 VLANs per switch and up to 128 spanning-tree instances per switch are supported.
4096 VLAN IDs are supported.
Cisco VTP supports dynamic VLANs and dynamic trunk configuration across all switches.
Quality of Service
- Advanced QoS
The Virtual Blade Switch (VBS) offers industry-leading mechanisms for marking, classification, and scheduling to deliver superior performance for data, voice, and video traffic, all at wire speed.
Following are some of the QoS features supported:
Wire-rate performance for highly granular QoS functions (for example, granular rate limiting).
Cross-switch QoS allows QoS to be configured across the entire VBS
802.1p class of service (CoS) and differentiated services code point (DSCP) field classification is provided, using marking and reclassification on a per-packet basis by source and destination IP address, MAC address, or Layer 4 TCP/UDP port number.
Cisco control-plane and data-plane QoS ACLs on all ports help ensure proper marking on a per-packet basis.
Four egress queues per port help enable differentiated management of up to four traffic types.
Shaped Round Robin (SRR) scheduling helps ensure differential prioritization of packet flows by intelligently servicing the ingress queues and egress queues.
Weighted Tail Drop (WTD) provides congestion avoidance at the ingress and egress queues before a disruption occurs.
Strict priority queuing helps ensure that the highest-priority packets are serviced ahead of all other traffic.
The Cisco committed information rate (CIR) function provides bandwidth in increments as low as 8 Kbps.
Rate limiting is provided based on source and destination IP address, source and destination MAC address, Layer 4 TCP/UDP information, or any combination of these fields, using QoS ACLs (IP ACLs or MAC ACLs), class maps, and policy maps.
Up to 64 aggregate or individual policers are available.
- Network wide security features
The Catalyst Blade Switch 3130 supports a comprehensive set of security features for connectivity and access control, including ACLs, authentication, port-level security, and identity-based network services with 802.1x and extensions. This set of comprehensive features not only helps prevent external attacks, but defends the network against “man-in-the-middle” attacks, a primary concern in today’s business environment. The switch also supports the Network Admission Control (NAC) security framework.
Security features include:
Dynamic ARP Inspection (DAI) helps ensure user integrity by preventing malicious users from exploiting the insecure nature of the ARP protocol.
DHCP Snooping prevents malicious users from spoofing a DHCP server and sending out bogus addresses. This feature is used by other primary security features to prevent a number of other attacks such as ARP poisoning.
IP source guard prevents a malicious user from spoofing or taking over another user’s IP address by creating a binding table between the client’s IP and MAC address, port, and VLAN.
Private VLANs restrict traffic between hosts in a common segment by segregating traffic at Layer 2, turning a broadcast segment into a nonbroadcast multi-access-like segment.
Private VLAN Edge provides security and isolation between switch ports, which helps ensure that users cannot snoop on other users’ traffic.
Unicast RPF feature helps mitigate problems caused by the introduction of malformed or forged (spoofed) IP source addresses into a network by discarding IP packets that lack a verifiable IP source address.
IEEE 802.1x allows dynamic, port-based security, providing user authentication.
IEEE 802.1x with VLAN assignment allows a dynamic VLAN assignment for a specific user regardless of where the user is connected.
IEEE 802.1x and port security are provided to authenticate the port and manage network access for all MAC addresses, including that of the client.
IEEE 802.1x with an ACL assignment allows for specific identity-based security policies regardless of where the user is connected.
IEEE 802.1x with guest VLAN allows guests without 802.1x clients to have limited network access on the guest VLAN.
Web authentication for non-802.1x clients allows non-802.1x clients to use an SSL-based browser for authentication.
Cisco security VLAN ACLs on all VLANs prevents unauthorized data flows from being bridged within VLANs.
Cisco standard and extended IP security router ACLs define security policies on routed interfaces for control-plane and data-plane traffic. IPv6 ACLs can be applied to filter IPv6 traffic.
Port-based ACLs for Layer 2 interfaces allow security policies to be applied on individual switch ports.
Secure Shell (SSH) Protocol, Kerberos, and Simple Network Management Protocol Version 3 (SNMPv3) provide network security by encrypting administrator traffic during Telnet and SNMP sessions. SSH Protocol, Kerberos, and the cryptographic version of SNMPv3 require a special cryptographic software image because of U.S. export restrictions.
Bidirectional data support on the Switched Port Analyzer (SPAN) port allows Cisco Intrusion Detection System (IDS) to take action when an intruder is detected.
TACACS+ and RADIUS authentication facilitates centralized control of the switch and restricts unauthorized users from altering the configuration.
MAC Address Notification allows administrators to be notified of users added to or removed from the network.
Port Security secures the access to an access or trunk port based on MAC address.
Multilevel security on console access prevents unauthorize
- Dimensions (L x W x H) - 25 x 23 x 3 cm (9.8" x 9.1" x 1.1")
Weight - Approximately 4.0 lb ( 1.8 kg)
OSPF-MIB (RFC 1253)
- IEEE 802.1s
IEEE 802.3x full duplex on 10BASE-T, 100BASE-TX, and 1000BASE-T ports
IEEE 802.1D Spanning Tree Protocol
IEEE 802.1p CoS Prioritization
IEEE 802.1Q VLAN
IEEE 802.3 10BASE-T specification
IEEE 802.3u 100BASE-TX specification
IEEE 802.3ab 1000BASE-T specification
IEEE 802.3z 1000BASE-X specification
RMON I and II standards
SNMPv1, SNMPv2c, and SNMPv3
Environmental Operating Conditions
- Operating temperature: 0° to 40°C
Storage temperature: -25° to 70°C
Operating relative humidity: 10 to 85% non-condensing
Storage relative humidity: 5 to 95% non-condensing
12V at 6.25A (75W) (max)
Cisco Catalyst Blade Switch 3130
The Cisco Catalyst Blade Switch 3130 offers an array of unique benefits:
Low Total Cost of Ownership for the Data Center
- Operational consistency with the Cisco IOS® family helps to eliminate training costs. The consistent management and operations environment helps to reduce operational complexity, which can lower operational expenses and increase staff efficiency/productivity.
- Blade switch requirements for rack space, power and cooling are significantly less than those of stand-alone or stackable switches.
- Switch capacity can be added in an incremental manner so capital expense can be tied to business need.
Performance and Scalability
- 160 GB/s upstream
- Double available bandwidth to the server
- 64 GB/s for inter-server traffic
- The ability to add incremental capacity without restarting the switch
Support Quality and Flexibility
- Customers can purchase support from Dell or from Cisco’s award-winning technical assistance center.
Pay-as-You-Grow Ethernet Flexibility
- Uplinks on multiple blade switches can be a mix of Gigabit and 10 Gigabit Ethernet connections. This flexibility increases budget efficiency by adding capacity in an incremental, granular manner that is linked to increasing business needs.
- Three-year limited warranty* supplemented with three years of Next Business Day part or unit advance exchange hardware replacement*
- 7-day/24-hour Telephone Technical Support for troubleshooting and diagnosis of Dell hardware
- 7-day/24-hour Online Support Services
Premier Enterprise Support Service Tiers
Gold Enterprise Services
Rapid, expert support services for critical systems. Includes:
- 4-Hour Same Day onsite response Service* with advance exchange hardware replacement*.
- Engineer-to-Engineer Support with direct access to Dell's senior-level Gold Queue
- Technical Account Management Team for attentive support and escalation management
- Customer-Defined Call Priority so that you maintain control of your case
- On-Demand Engineer Dispatch for select Severity 1 incidents to quickly receive on-site service
- Software Support Resolution Pack
- Web-Based Remote Troubleshooting to quickly mobilize experts
Silver Same Day Basic Response Services
Enhanced, prompt hardware and software support services. Includes:
- 4-Hour Same Day onsite response service* with advance exchange hardware replacement*.
- 7x24 Remote Hardware Support by the Silver Queue
- Remote Software and Storage Support
Bronze NBD Basic Response Service
Basic hardware support services. Includes:
- Next Business Day response On-Site Hardware Support Service.