Brocade 6910 Ethernet Access Switch Configuration Guide (Supporting R2.2.0.0) User Manual

Page 37

Advertising
background image

Brocade 6910 Ethernet Access Switch Configuration Guide

xxxv

53-1002651-02

Figure 161 Showing the Rules for a Policy Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 838
Figure 162 Attaching a Policy Map to a Port . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839
Figure 163 Configuring a Voice VLAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 842
Figure 164 Configuring an OUI Telephony List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 843
Figure 165 Showing an OUI Telephony List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 844
Figure 166 Configuring Port Settings for a Voice VLAN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 845
Figure 167 Configuring the Authentication Sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849
Figure 168 Authentication Server Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850
Figure 169 Configuring Remote Authentication Server (RADIUS) . . . . . . . . . . . . . . . . . . . . 852
Figure 170 Configuring Remote Authentication Server (TACACS+) . . . . . . . . . . . . . . . . . . . 852
Figure 171 Configuring AAA Server Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853
Figure 172 Showing AAA Server Groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853
Figure 173 Configuring Global Settings for AAA Accounting . . . . . . . . . . . . . . . . . . . . . . . . . 855
Figure 174 Configuring AAA Accounting Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 856
Figure 175 Showing AAA Accounting Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 856
Figure 176 Configuring AAA Accounting Service for 802.1X Service . . . . . . . . . . . . . . . . . . 857
Figure 177 Configuring AAA Accounting Service for Exec Service . . . . . . . . . . . . . . . . . . . . 857
Figure 178 Displaying a Summary of Applied AAA Accounting Methods . . . . . . . . . . . . . . . 857
Figure 179 Displaying Statistics for AAA Accounting Sessions. . . . . . . . . . . . . . . . . . . . . . . 858
Figure 180 Configuring AAA Authorization Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 859
Figure 181 Showing AAA Authorization Methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 859
Figure 182 Configuring AAA Authorization Methods for Exec Service . . . . . . . . . . . . . . . . . 860
Figure 183 Displaying the Applied AAA Authorization Method . . . . . . . . . . . . . . . . . . . . . . . 860
Figure 184 Configuring User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 861
Figure 185 Showing User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 862
Figure 186 Configuring Global Settings for Web Authentication . . . . . . . . . . . . . . . . . . . . . 863
Figure 187 Configuring Interface Settings for Web Authentication . . . . . . . . . . . . . . . . . . . 864
Figure 188 Configuring Global Settings for Network Access . . . . . . . . . . . . . . . . . . . . . . . . 867
Figure 189 Configuring Interface Settings for Network Access . . . . . . . . . . . . . . . . . . . . . . 868
Figure 190 Configuring Link Detection for Network Access . . . . . . . . . . . . . . . . . . . . . . . . . 869
Figure 191 Configuring a MAC Address Filter for Network Access. . . . . . . . . . . . . . . . . . . . 870
Figure 192 Showing the MAC Address Filter Table for Network Access . . . . . . . . . . . . . . . 871
Figure 193 Showing Addresses Authenticated for Network Access. . . . . . . . . . . . . . . . . . . 872
Figure 194 Configuring HTTPS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 873
Figure 195 Downloading the Secure-Site Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 875
Figure 196 Configuring the SSH Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 878
Figure 197 Generating the SSH Host Key Pair . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 879
Figure 198 Showing the SSH Host Key Pair. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 879
Figure 199 Copying the SSH User’s Public Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881
Figure 200 Showing the SSH User’s Public Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881
Figure 201 Setting the Name of a Time Range . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 883
Figure 202 Showing a List of Time Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 884

Advertising