xxviii Network OS NETCONF Operations Guide
53-1003231-02
• Chapter 12, “System Monitor Configuration” provides procedures monitoring the health of
each fan, power supply, temperature sensor, chassis identification (CID) card, small form-factor
pluggable (SFP) device, management module (MM), line card, or switch fabric module (SFM),
or compact flash of the switch.
• Chapter 13, “VMware vCenter” provides procedures for configuring VMware vCenter.
• Chapter 14, “Configuring Remote Monitoring” provides procedures for configuring Remote
Monitoring.
Section 2, Network OS Security Configuration, contains the following components:
• Chapter 15, “Managing User Accounts” provides procedures for creating, modifying, and
unlocking user accounts, creating and managing user-defined roles, defining role-based
command access rules, and managing passwords.
• Chapter 16, “External Server Authentication” provides procedures for configuring an external
RADIUS, TACACS+, or LDAP server for remote user authentication.
• Chapter 17, “Fabric Authentication” provides procedures to configure fabric authentication and
Switch Connection Control (SCC) policies.
Section 3, Network OS Layer 2 Switch Features, contains the following components:
• Chapter 18, “Administering Edge-Loop Detection” provides procedures for administering
edge-loop detection.
• Chapter 19, “Configuring AMPP” provides procedures for configuring the Auto Migrating Port
Profile (AMPP) profiles.
• Chapter 20, “Configuring FCoE Interfaces” provides procedures for configuring Fibre Channel
over Ethernet (FCoE) interfaces.
• Chapter 21, “Configuring VLANs” provides procedures for configuring Virtual LANs.
• Chapter 23, “Configuring Virtual Fabrics” provides procedures for configuring Virtual Fabrics.
• Chapter 24, “Configuring Spanning Tree Protocols” provides procedures for configuring the
Spanning Tree Protocol (STP), Rapid STP (RSTP), Multiple STP (MSTP), and Per-VLAN Spanning
Tree (PVST).
• Chapter 25, “Configuring UDLD” provides procedures for configuring UDLD.
• Chapter 26, “Configuring Link Aggregation” provides procedures for configuring Link
Aggregation and the Link Aggregation Control Protocol (LACP).
• Chapter 27, “Configuring LLDP” provides procedures for configuring the Link Layer Discovery
Protocol (LLDP) and the DCB Capability Exchange Protocol (DCBX).
• Chapter 28, “Configuring ACLs” provides procedures for configuring Access Control Lists
(ACLs).
• Chapter 29, “Configuring QoS” provides procedures for configuring Quality of Service (QoS),
including the Policer feature.
• Chapter 30, “Configuring 802.1x Port Authentication” provides procedures for configuring the
802.1x Port Authentication protocol.
• Chapter 31, “Configuring sFlow” provides procedures for configuring sFlow.
• Chapter 32, “Configuring Switched Port Analyzer” provides procedures for configuring
Switched Port Analyzer (SPAN).
Section 4, Network OS Layer 3 Routing Features, contains the following components:
• Chapter 32, “IP Route Policy” provides procedures for configuring IP prefix lists and route maps
that are used for controlling IP subnet transportation between subsystems.
Komentáře k této Příručce