beautypg.com

Brocade TurboIron 24X Series Configuration Guide User Manual

Page 25

background image

Brocade TurboIron 24X Series Configuration Guide

xxv

53-1003053-01

Using ACLs to control multicast features. . . . . . . . . . . . . . . . . . . . .925

Enabling and viewing hardware usage statistics for an ACL . . . . .925

Displaying ACL information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .926

Troubleshooting ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .926

Chapter 29

Configuring Traffic Policies

About traffic policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .929

Configuration notes and feature limitations . . . . . . . . . . . . . . . . . .930

Maximum number of traffic policies supported on a device . . . . .931

Setting the maximum number of traffic policies supported
on a Layer 3 device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
931

ACL-based rate limiting using traffic policies. . . . . . . . . . . . . . . . . .931

Support for fixed rate limiting and adaptive rate limiting . . . .932
Configuring ACL-based fixed rate limiting. . . . . . . . . . . . . . . . .932
Configuring ACL-based adaptive rate limiting . . . . . . . . . . . . .933
Specifying the action to be taken for packets that are
over the limit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
935

ACL and rate limit counting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .936

Enabling ACL statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .937
Enabling ACL statistics with rate limiting traffic policies. . . . .938
Viewing ACL and rate limit counters . . . . . . . . . . . . . . . . . . . . .938
Clearing ACL and rate limit counters . . . . . . . . . . . . . . . . . . . .939

Viewing traffic policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .939

Chapter 30

Configuring 802.1X Port Security

IETF RFC support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .941

How 802.1X port security works . . . . . . . . . . . . . . . . . . . . . . . . . . .941

Device roles in an 802.1X configuration . . . . . . . . . . . . . . . . .941
Communication between the devices . . . . . . . . . . . . . . . . . . .942
Controlled and uncontrolled ports . . . . . . . . . . . . . . . . . . . . . .944
Message exchange during authentication . . . . . . . . . . . . . . . .945
Authenticating multiple hosts connected to the same port . .947
802.1X port security and sFlow . . . . . . . . . . . . . . . . . . . . . . . .950