Part 2: securing the switch, Part 3: switch basics, Part 4: advanced switching features – Blade ICE RACKSWITCH G8124-E User Manual
Page 18

BLADEOS 6.5.2 Application Guide
18 Preface
BMD00220, October 2010
Chapter 3, “Securing Administration,”
describes methods for using Secure Shell for
administration connections, and configuring end-user access control.
Chapter 4, “Authentication & Authorization Protocols,”
describes different secure
administration for remote administrators. This includes using Remote Authentication Dial-in
User Service (RADIUS), as well as TACACS+ and LDAP.
Chapter 5, “Access Control Lists,”
describes how to use filters to permit or deny specific types
of traffic, based on a variety of source, destination, and packet attributes.
describes how to configure Virtual Local Area Networks (VLANs) for
creating separate network segments, including how to use VLAN tagging for devices that use
multiple VLANs. This chapter also describes Protocol-based VLANs, and Private VLANs.
Chapter 7, “Ports and Trunking,”
describes how to group multiple physical ports together to
aggregate the bandwidth between large-scale network devices.
Chapter 8, “Spanning Tree Protocols,”
discusses how Spanning Tree Protocol (STP) configures
the network so that the switch selects the most efficient path when multiple paths exist. Also
includes the Rapid Spanning Tree Protocol (RSTP), Per-VLAN Rapid Spanning Tree Plus
(PVRST+), and Multiple Spanning Tree Protocol (MSTP) extensions to STP.
Chapter 9, “Quality of Service,”
discusses Quality of Service (QoS) features, including IP
filtering using Access Control Lists (ACLs), Differentiated Services, and IEEE 802.1p priority
values.
Part 4: Advanced Switching Features
Chapter 10, “Deployment Profiles,”
describes how the G8124 can operate in different modes
for different deployment scenarios, adjusting switch capacity levels in order to optimize
performance for different types of networks.
provides an overview of allocating resources based on the logical
needs of the data center, rather than on the strict, physical nature of components.
discusses using virtual NIC (vNIC) technology to divide NICs into
multiple logical, independent instances.
discusses virtual machine (VM) support on the G8124.
discusses using various Converged Enhanced Ethernet (CEE)
features such as Priority-based Flow Control (PFC), Enhanced Transmission Selection (ETS),
and FIP Snooping for solutions such as Fibre Channel over Ethernet (FCoE).