beautypg.com

Brocade Network OS NETCONF Operations Guide v4.1.1 User Manual

Page 28

background image

xxviii

Network OS NETCONF Operations Guide

53-1003231-02

Chapter 12, “System Monitor Configuration”

provides procedures monitoring the health of

each fan, power supply, temperature sensor, chassis identification (CID) card, small form-factor
pluggable (SFP) device, management module (MM), line card, or switch fabric module (SFM),
or compact flash of the switch.

Chapter 13, “VMware vCenter”

provides procedures for configuring VMware vCenter.

Chapter 14, “Configuring Remote Monitoring”

provides procedures for configuring Remote

Monitoring.

Section 2,

Network OS Security Configuration

, contains the following components:

Chapter 15, “Managing User Accounts”

provides procedures for creating, modifying, and

unlocking user accounts, creating and managing user-defined roles, defining role-based
command access rules, and managing passwords.

Chapter 16, “External Server Authentication”

provides procedures for configuring an external

RADIUS, TACACS+, or LDAP server for remote user authentication.

Chapter 17, “Fabric Authentication”

provides procedures to configure fabric authentication and

Switch Connection Control (SCC) policies.

Section 3,

Network OS Layer 2 Switch Features

, contains the following components:

Chapter 18, “Administering Edge-Loop Detection”

provides procedures for administering

edge-loop detection.

Chapter 19, “Configuring AMPP”

provides procedures for configuring the Auto Migrating Port

Profile (AMPP) profiles.

Chapter 20, “Configuring FCoE Interfaces”

provides procedures for configuring Fibre Channel

over Ethernet (FCoE) interfaces.

Chapter 21, “Configuring VLANs”

provides procedures for configuring Virtual LANs.

Chapter 23, “Configuring Virtual Fabrics”

provides procedures for configuring Virtual Fabrics.

Chapter 24, “Configuring Spanning Tree Protocols”

provides procedures for configuring the

Spanning Tree Protocol (STP), Rapid STP (RSTP), Multiple STP (MSTP), and Per-VLAN Spanning
Tree (PVST).

Chapter 25, “Configuring UDLD”

provides procedures for configuring UDLD.

Chapter 26, “Configuring Link Aggregation”

provides procedures for configuring Link

Aggregation and the Link Aggregation Control Protocol (LACP).

Chapter 27, “Configuring LLDP”

provides procedures for configuring the Link Layer Discovery

Protocol (LLDP) and the DCB Capability Exchange Protocol (DCBX).

Chapter 28, “Configuring ACLs”

provides procedures for configuring Access Control Lists

(ACLs).

Chapter 29, “Configuring QoS”

provides procedures for configuring Quality of Service (QoS),

including the Policer feature.

Chapter 30, “Configuring 802.1x Port Authentication”

provides procedures for configuring the

802.1x Port Authentication protocol.

Chapter 31, “Configuring sFlow”

provides procedures for configuring sFlow.

Chapter 32, “Configuring Switched Port Analyzer”

provides procedures for configuring

Switched Port Analyzer (SPAN).

Section 4,

Network OS Layer 3 Routing Features

, contains the following components:

Chapter 32, “IP Route Policy”

provides procedures for configuring IP prefix lists and route maps

that are used for controlling IP subnet transportation between subsystems.