HP GbE2c HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Application Gu - Page 42

EAPoL configuration guidelines, Port-based traffic control, Configuring port-based traffic control - switch configuration vlan connections

Page 42 highlights

EAPoL configuration guidelines When configuring EAPoL, consider the following guidelines: • The 802.1x port-based authentication is currently supported only in point-to-point configurations, that is, with a single supplicant connected to an 802.1x-enabled switch port. • When 802.1x is enabled, a port has to be in the authorized state before any other Layer 2 feature can be operationally enabled. For example, the STG state of a port is operationally disabled while the port is in the unauthorized state. • The 802.1x supplicant capability is not supported. Therefore, none of its ports can connect successfully to an 802.1x-enabled port of another device, such as another switch, which acts as an authenticator, unless access control on the remote port is disabled or is configured in forced-authorized mode. For example, if a GbE2c is connected to another GbE2c, and if 802.1x is enabled on both switches, the two connected ports must be configured in force-authorized mode. • The 802.1x standard has optional provisions for supporting dynamic virtual LAN assignment via RADIUS tunneling attributes, for example, Tunnel-Type (=VLAN), Tunnel-Medium-Type (=802), and Tunnel-Private-GroupID (=VLAN id). These attributes are not supported and might affect 802.1x operations. Other unsupported attributes include Service-Type, Session-Timeout, and Termination-Action. RADIUS accounting service for 802.1x-authenticated devices or users is not supported. Configuration changes performed using SNMP and the standard 802.1x MIB take effect immediately. Port-based traffic control Port-based traffic control prevents GbE2c ports from being disrupted by LAN storms. A LAN storm occurs when data packets flood the LAN, which can cause the network to become congested and slow down. Errors in the protocolstack implementation or in the network configuration can cause a LAN storm. You can enable port-based traffic control separately for each of the following traffic types: • Broadcast-packets with destination MAC address ff:ff:ff:ff:ff:ff • Multicast-packets that have MAC addresses with the least significant bit of their first octet set to one • Destination Lookup Failed (DLF)-packets with unknown destination MAC address, that are treated like broadcast packets With Port-based Traffic Control enabled, the port monitors incoming traffic of each type noted above. If the traffic exceeds a configured threshold, the port blocks traffic that exceeds the threshold until the traffic flow falls back within the threshold. The GbE2c supports separate traffic-control thresholds for broadcast, multicast, and DLF traffic. The traffic threshold is measured in number of frames per second. NOTE: All ports that belong to a trunk must have the same traffic-control settings. Configuring port-based traffic control To configure a port for traffic control, perform the following steps: 1. Configure the traffic-control threshold and enable traffic control. Main# /cfg/port 2 >> Port 2# brate 150000 >> Port 2# mrate 150000 >> Port 2# drate 150000 (Set broadcast threshold) (Set multicast threshold) (Set DLF threshold) 2. To disable a traffic-control threshold, use the following command: >> Port 2# mrate dis (Disable multicast threshold) 3. Apply and save the configuration. >> Port 2# apply >> Port 2# save (Apply the port configurations) (Save the port configurations) Port-based Network Access and traffic control 42

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165

Port-based Network Access and traffic control
42
EAPoL configuration guidelines
When configuring EAPoL, consider the following guidelines:
The 802.1x port-based authentication is currently supported only in point-to-point configurations, that is, with a
single supplicant connected to an 802.1x-enabled switch port.
When 802.1x is enabled, a port has to be in the authorized state before any other Layer 2 feature can be
operationally enabled. For example, the STG state of a port is operationally disabled while the port is in the
unauthorized state.
The 802.1x supplicant capability is not supported. Therefore, none of its ports can connect successfully to an
802.1x-enabled port of another device, such as another switch, which acts as an authenticator, unless access
control on the remote port is disabled or is configured in forced-authorized mode. For example, if a GbE2c is
connected to another GbE2c, and if 802.1x is enabled on both switches, the two connected ports must be con-
figured in force-authorized mode.
The 802.1x standard has optional provisions for supporting dynamic virtual LAN assignment via RADIUS
tunneling attributes, for example, Tunnel-Type (=VLAN), Tunnel-Medium-Type (=802), and Tunnel-Private-Group-
ID (=VLAN id). These attributes are not supported and might affect 802.1x operations. Other unsupported
attributes include Service-Type, Session-Timeout, and Termination-Action.
RADIUS accounting service for 802.1x-authenticated devices or users is not supported.
Configuration changes performed using SNMP and the standard 802.1x MIB take effect immediately.
Port-based traffic control
Port-based traffic control prevents GbE2c ports from being disrupted by LAN storms. A LAN storm occurs when data
packets flood the LAN, which can cause the network to become congested and slow down. Errors in the protocol-
stack implementation or in the network configuration can cause a LAN storm.
You can enable port-based traffic control separately for each of the following traffic types:
Broadcast—packets with destination MAC address ff:ff:ff:ff:ff:ff
Multicast—packets that have MAC addresses with the least significant bit of their first octet set to one
Destination Lookup Failed (DLF)—packets with unknown destination MAC address, that are treated like
broadcast packets
With Port-based Traffic Control enabled, the port monitors incoming traffic of each type noted above. If the traffic
exceeds a configured threshold, the port blocks traffic that exceeds the threshold until the traffic flow falls back within
the threshold.
The GbE2c supports separate traffic-control thresholds for broadcast, multicast, and DLF traffic. The traffic threshold is
measured in number of frames per second.
NOTE:
All ports that belong to a trunk must have the same traffic-control settings.
Configuring port-based traffic control
To configure a port for traffic control, perform the following steps:
1.
Configure the traffic-control threshold and enable traffic control.
Main# /cfg/port 2
>> Port 2# brate 150000
(Set broadcast threshold)
>> Port 2# mrate 150000
(Set multicast threshold)
>> Port 2# drate 150000
(Set DLF threshold)
2.
To disable a traffic-control threshold, use the following command:
>> Port 2# mrate dis
(Disable multicast threshold)
3.
Apply and save the configuration.
>> Port 2# apply
(Apply the port configurations)
>> Port 2# save
(Save the port configurations)