HP BladeSystem bc2800 Embedded Web System User Guide for the HP BladeSystem PC - Page 57

Configuring Traffic Control

Page 57 highlights

Configuring Device Security ❏ Request ID Frames Transmit-Indicates the number of EAP Req/ID frames transmitted via the port. ❏ Request Frames Transmit-Indicates the number of EAP Request frames transmitted via the port. ❏ Invalid Frames Receive-Indicates the number of unrecognized EAPOL frames received on this port. ❏ Length Error Frames Receive-Indicates the number of EAPOL frames with an invalid Packet Body Length received on this port. ❏ Last Frame Version-Indicates the protocol version number attached to the most recently received EAPOL frame. ❏ Last Frame Source-Indicates the source MAC address attached to the most recently received EAPOL frame. Configuring Traffic Control This section contains information for managing both port security and storm control, and includes the following topics: ■ Defining Access Control Lists ■ Managing Port Security ■ Enabling Storm Control Defining Access Control Lists Access Control Lists (ACL) allow network managers to define classification actions and rules for specific ingress ports. Packets entering an ingress port, with an active ACL, are either admitted or denied entry and the ingress port is disabled. If they are denied entry, the user can disable the port. For example, an ACL rule is defined that states that port number 20 can receive TCP packets, however, if a UDP packet is received, the packet is dropped. ACLs are composed of Access Control Entries (ACEs) that are made of the filters that determine traffic classifications. The total number of ACEs that can be defined in all ACLs together is 1024. The following filters can be defined as ACEs: ■ Source Port IP Address and Wildcard Mask - Filters the packets by the Source port IP address and wildcard mask. ■ Destination Port IP Address and Wildcard Mask - Filters the packets by the Destination port IP address and wildcard mask. ■ ACE Priority - Filters the packets by the ACE priority. ■ Protocol - Filters the packets by the IP protocol. ■ DSCP - Filters the packets by the DiffServ Code Point (DSCP) value. ■ IP Precedence - Filters the packets by the IP Precedence. ■ Action - Indicates the action assigned to the packet matching the ACL. Packets are forwarded or dropped. In addition, the port can be shut down, a trap can be sent to the network administrator, or the packet is assigned rate limiting restrictions for forwarding. This section contains the following topics: ■ Defining IP Based Access Control Lists Embedded Web System User Guide www.hp.com 4-31

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

Embedded Web System User Guide
www.hp.com
4-31
Configuring Device Security
Request ID Frames Transmit
—Indicates the number of EAP Req/ID frames
transmitted via the port.
Request Frames Transmit
—Indicates the number of EAP Request frames transmitted
via the port.
Invalid Frames Receive
—Indicates the number of unrecognized EAPOL frames
received on this port.
Length Error Frames Receive
—Indicates the number of EAPOL frames with an
invalid Packet Body Length received on this port.
Last Frame Version
—Indicates the protocol version number attached to the most
recently received EAPOL frame.
Last Frame Source
—Indicates the source MAC address attached to the most recently
received EAPOL frame.
Configuring Traffic Control
This section contains information for managing both port security and storm control, and
includes the following topics:
Defining Access Control Lists
Managing Port Security
Enabling Storm Control
Defining Access Control Lists
Access Control Lists
(ACL) allow network managers to define classification actions and rules for
specific ingress ports. Packets entering an ingress port, with an active ACL, are either admitted or
denied entry and the ingress port is disabled. If they are denied entry, the user can disable the
port.
For example, an ACL rule is defined that states that port number 20 can receive TCP packets,
however, if a UDP packet is received, the packet is dropped. ACLs are composed of Access
Control Entries (ACEs) that are made of the filters that determine traffic classifications. The total
number of ACEs that can be defined in all ACLs together is 1024. The following filters can be
defined as ACEs:
Source Port IP Address and Wildcard Mask
— Filters the packets by the Source port IP
address and wildcard mask.
Destination Port IP Address and Wildcard Mask
— Filters the packets by the Destination
port IP address and wildcard mask.
ACE Priority
— Filters the packets by the ACE priority.
Protocol
— Filters the packets by the IP protocol.
DSCP
— Filters the packets by the DiffServ Code Point (DSCP) value.
IP Precedence
— Filters the packets by the IP Precedence.
Action
— Indicates the action assigned to the packet matching the ACL. Packets are
forwarded or dropped. In addition, the port can be shut down, a trap can be sent to the
network administrator, or the packet is assigned rate limiting restrictions for forwarding.
This section contains the following topics:
Defining IP Based Access Control Lists