Brocade Network OS NETCONF Operations Guide v4.1.1 User Manual
Page 28
xxviii
Network OS NETCONF Operations Guide
53-1003231-02
•
Chapter 12, “System Monitor Configuration”
provides procedures monitoring the health of
each fan, power supply, temperature sensor, chassis identification (CID) card, small form-factor
pluggable (SFP) device, management module (MM), line card, or switch fabric module (SFM),
or compact flash of the switch.
•
provides procedures for configuring VMware vCenter.
•
Chapter 14, “Configuring Remote Monitoring”
provides procedures for configuring Remote
Monitoring.
Network OS Security Configuration
, contains the following components:
•
Chapter 15, “Managing User Accounts”
provides procedures for creating, modifying, and
unlocking user accounts, creating and managing user-defined roles, defining role-based
command access rules, and managing passwords.
•
Chapter 16, “External Server Authentication”
provides procedures for configuring an external
RADIUS, TACACS+, or LDAP server for remote user authentication.
•
Chapter 17, “Fabric Authentication”
provides procedures to configure fabric authentication and
Switch Connection Control (SCC) policies.
Network OS Layer 2 Switch Features
, contains the following components:
•
Chapter 18, “Administering Edge-Loop Detection”
provides procedures for administering
edge-loop detection.
•
Chapter 19, “Configuring AMPP”
provides procedures for configuring the Auto Migrating Port
Profile (AMPP) profiles.
•
Chapter 20, “Configuring FCoE Interfaces”
provides procedures for configuring Fibre Channel
over Ethernet (FCoE) interfaces.
•
Chapter 21, “Configuring VLANs”
provides procedures for configuring Virtual LANs.
•
Chapter 23, “Configuring Virtual Fabrics”
provides procedures for configuring Virtual Fabrics.
•
Chapter 24, “Configuring Spanning Tree Protocols”
provides procedures for configuring the
Spanning Tree Protocol (STP), Rapid STP (RSTP), Multiple STP (MSTP), and Per-VLAN Spanning
Tree (PVST).
•
Chapter 25, “Configuring UDLD”
provides procedures for configuring UDLD.
•
Chapter 26, “Configuring Link Aggregation”
provides procedures for configuring Link
Aggregation and the Link Aggregation Control Protocol (LACP).
•
Chapter 27, “Configuring LLDP”
provides procedures for configuring the Link Layer Discovery
Protocol (LLDP) and the DCB Capability Exchange Protocol (DCBX).
•
Chapter 28, “Configuring ACLs”
provides procedures for configuring Access Control Lists
(ACLs).
•
provides procedures for configuring Quality of Service (QoS),
including the Policer feature.
•
Chapter 30, “Configuring 802.1x Port Authentication”
provides procedures for configuring the
802.1x Port Authentication protocol.
•
Chapter 31, “Configuring sFlow”
provides procedures for configuring sFlow.
•
Chapter 32, “Configuring Switched Port Analyzer”
provides procedures for configuring
Switched Port Analyzer (SPAN).
Network OS Layer 3 Routing Features
, contains the following components:
•
provides procedures for configuring IP prefix lists and route maps
that are used for controlling IP subnet transportation between subsystems.