Brocade 6910 Ethernet Access Switch Configuration Guide (Supporting R2.2.0.0) User Manual

Page 27

Advertising
background image

Brocade 6910 Ethernet Access Switch Configuration Guide

xxv

53-1002651-02

Creating QoS Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .831

Attaching a Policy Map to a Port . . . . . . . . . . . . . . . . . . . . . . . . . . .839

Chapter 41

VoIP Traffic Configuration

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .841

Configuring VoIP Traffic. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .841

Configuring Telephony OUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .843
Configuring VoIP Traffic Ports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .844

Chapter 42

Security Measures

AAA Authentication, Authorization and Accounting. . . . . . . . . . . . .848

Configuring Local/Remote Logon Authentication . . . . . . . . . .848
Configuring Remote Logon Authentication Servers. . . . . . . . .849
Configuring AAA Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . .854
Configuring AAA Authorization. . . . . . . . . . . . . . . . . . . . . . . . . .858

Configuring User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .860
Web Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .862

Configuring Global Settings for Web Authentication . . . . . . . .862
Configuring Interface Settings for Web Authentication . . . . . .863

Network Access (MAC Address Authentication) . . . . . . . . . . . . . . .864

Configuring Global Settings for Network Access . . . . . . . . . . .866
Configuring Network Access for Ports . . . . . . . . . . . . . . . . . . .867
Configuring Port Link Detection . . . . . . . . . . . . . . . . . . . . . . . .869
Configuring a MAC Address Filter . . . . . . . . . . . . . . . . . . . . . . .870
Displaying Secure MAC Address Information. . . . . . . . . . . . . . 871

Configuring HTTPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .872

Configuring Global Settings for HTTPS . . . . . . . . . . . . . . . . . . .872
Replacing the Default Secure-site Certificate . . . . . . . . . . . . . 874

Configuring Secure Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .875

Configuring the SSH Server. . . . . . . . . . . . . . . . . . . . . . . . . . . .877
Generating the Host Key Pair . . . . . . . . . . . . . . . . . . . . . . . . . .878
Importing User Public Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . .880

Access Control Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .882

Setting A Time Range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .883
Showing TCAM Utilization . . . . . . . . . . . . . . . . . . . . . . . . . . . . .885
Setting the ACL Name and Type . . . . . . . . . . . . . . . . . . . . . . . .886
Configuring a Standard IPv4 ACL . . . . . . . . . . . . . . . . . . . . . . .887
Configuring an Extended IPv4 ACL . . . . . . . . . . . . . . . . . . . . . .889
Configuring a Standard IPv6 ACL . . . . . . . . . . . . . . . . . . . . . . .891
Configuring an Extended IPv6 ACL . . . . . . . . . . . . . . . . . . . . . .892
Configuring a MAC ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .894
Configuring an ARP ACL. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .896
Binding a Port to an Access Control List. . . . . . . . . . . . . . . . . .897
Configuring ACL Mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . .898
Showing ACL Hardware Counters . . . . . . . . . . . . . . . . . . . . . . .900

Advertising