Data Center Fabric Manager Enterprise User Manual v10.3.X (53-1001357-01, November 2009)

402 DCFM Enterprise User Manual
53-1001357-01
Switch policies
13
Switch policies
You can configure and enable a number of CEE policies on a switch, port, or link aggregation group
(LAG).
The following switch policy configurations apply to all ports in a LAG:
CEE map and Traffic Class map
Link Layer Discovery Protocol (LLDP)
The following switch policy configurations apply to the LAG itself:
Access Control Lists (ACL)
Spanning Tree Protocol (STP)
The switch policies are described in the following sections.
CEE map and Traffic Class map
With CEE, Fibre Channel uses a buffer management system based on buffer-to-buffer credits, with
corresponding confirmation by the R-RDY frame. The flow control standard used for CEE is based
on “pause” frames. Coupled with an appropriate input buffer, lossless transport of frames is
possible.
Priority-based flow control (PFC) deals with the prioritization of frames. This standard IEEE 802.1Q
allows application-specific bandwidth reservations in CEE. When you create a CEE map, you specify
the precedence (priority) and then you map the priority groups with the Class of Service (CoS) and
apply bandwidth percentages.
Refer to “QoS configuration” on page 413 for instructions on how to create CEE and Traffic Class
maps.
LLDP profiles
Data Center Bridging Capability Exchange Protocol (DCBX) enables Enhanced Ethernet devices to
discover whether a peer device supports particular features, such as Priority Flow Control or Class
of Service (CoS). In a Converged Enhanced Ethernet (CEE) environment, LLDP is enhanced with
DCBX protocol to further share or change the configured CEE enhancements.
Refer to “LLDP-DCBX configuration” on page 422 for instructions on how to create LLDP profiles.
Access control lists
Access control lists (ACL) are sequential lists consisting of permit and deny rules. They are either
Layer 3 (IP)- or Layer 2 (MAC)-specific. You can configure multiple access lists and rules and store
them in the configuration. You create an ACL on a switch and then you can apply the configuration
to ports, and link aggregation groups (LAGs) on that switch.
Refer to Access Control List configuration” on page 427 for instructions on how to create and
manage access control lists.