beautypg.com

Access control, Trunking – Brocade Network OS Administrator’s Guide v4.1.1 User Manual

Page 345

background image

The traffic rate of the traffic streams that are uncongested remains high. The outbound ports
should carry some multicast frames from all the inbound ports.

• Scheduling — A typical example of scheduling policy (using Strict Priority 0 and Strict Priority 1

modes) is where ports 0 through 7 carry inbound traffic, each port has a unique priority level, port 0
has priority 0, port 1 has priority 1, and so on. All traffic is switched to the same outbound port. In
Strict Priority 0 mode, all ports have DWRR scheduling; therefore, the frames per second (FPS) on
all ports should correspond to the DWRR settings. In Strict Priority 1 mode, priority 7 traffic uses
Strict Priority; therefore, priority 7 can achieve a higher FPS. Frames from input ports with the same
priority level should be scheduled in a round robin manner to the output port.

When setting the scheduling policy, each priority group that is using DWRR scheduling can be set to
use a percentage of the total bandwidth by setting the PG_Percentage parameter.

For detailed information on configuring QoS, refer to

Configuring QoS

on page 471.

Access control

Access Control Lists (ACLs) are used for Layer 2 switching security. Standard ACLs inspect the source
address for the inbound ports. Extended ACLs provide filtering by source and destination addresses
and protocol. ACLs can be applied to the DCB ports or to VLANs.

ACLs function as follows:

• A standard Ethernet ACL configured on a physical port is used to permit or deny frames based on

the source MAC address. The default is to permit all frames.

• An extended Ethernet ACL configured on a physical port is used to permit or deny frames based on

the source MAC address, destination MAC address, and EtherType. The default is to permit all
frames.

• A standard Ethernet ACL configured on a LAG virtual port is used to permit or deny frames based on

the source MAC address. The default is to permit all frames. LAG ACLs apply to all ports in the LAG.

• An extended Ethernet ACL configured on a LAG virtual port is used to permit or deny frames based

on the source MAC address, destination MAC address, and EtherType. The default is to permit all
frames. LAG ACLs apply to all ports in the LAG.

• A standard Ethernet ACL configured on a VLAN is used to permit or deny frames based on the

source MAC address. The default is to permit all frames. VLAN ACLs apply to the Switched Virtual
Interface (SVI) for the VLAN.

• An extended Ethernet ACL configured on a VLAN is used to permit or deny frames based on the

source MAC address, destination MAC address, and EtherType. The default is to permit all frames.
VLAN ACLs apply to the Switched Virtual Interface (SVI) for the VLAN.

For detailed information on configuring ACLs, refer to

Configuring ACLs

on page 461.

Trunking

NOTE
The term "trunking" in an Ethernet network refers to the use of multiple network links (ports) in parallel
to increase the link speed beyond the limits of any one single link or port, and to increase the
redundancy for higher availability.

802.1ab Link Layer Discovery Protocol (LLDP) is used to detect links to connected switches or hosts.
Trunks can then be configured between an adjacent switch or host and the Brocade VDX hardware.

The Data Center Bridging Capability Exchange Protocol (DCBX) extension is used to identify a DCB-
capable port on an adjacent switch or host. For detailed information on configuring LLDP and DCBX,
refer to

Configuring LLDP

on page 449.

Access control

Network OS Administrator’s Guide

345

53-1003225-04