Juniper Networks EX2500 User Manual
Page 5

Table of Contents
Table of Contents
v
MSTP Region ........................................................................................... 41
Common Internal Spanning Tree............................................................. 41
MSTP Configuration Guidelines................................................................ 41
Multiple Spanning Tree Groups Configuration Example ........................... 42
45
Statistical Load Distribution ..................................................................... 45
Built-In Fault Tolerance............................................................................ 46
Before Configuring Static Trunks ............................................................. 46
Trunk Group Configuration Rules............................................................. 46
Port Trunking Configuration Example ............................................................ 47
Configurable Trunk Hash Algorithm ............................................................... 48
Link Aggregation Control Protocol.................................................................. 49
LACP Overview........................................................................................ 49
Static LACP .............................................................................................. 51
LACP Configuration Guidelines ................................................................ 51
Configuring LACP .................................................................................... 51
Optionally Reducing LACP Timeout ......................................................... 52
Removing LACP Configuration from a Port.............................................. 52
53
QoS Overview ................................................................................................ 53
Using ACL Filters............................................................................................ 54
MAC Extended ACLs................................................................................ 55
IP Standard ACLs ..................................................................................... 55
IP Extended ACLs .................................................................................... 56
Understanding ACL Priority ..................................................................... 57
Assigning ACLs to a Port.......................................................................... 57
Viewing ACL Statistics ............................................................................. 58
Configuring ACL Port Mirroring ............................................................... 58
ACL Configuration Examples ................................................................... 58
ACL Example 1—Blocking Traffic to a Host....................................... 58
ACL Example 2—Blocking Traffic from a Source to a Destination ..... 59
ACL Example 3—Blocking HTTP Traffic ............................................ 59
ACL Example 4—Blocking All Except Certain Packets ....................... 60
Using DSCP Values to Provide QoS ................................................................ 62
Differentiated Services Concepts ............................................................. 62
Per Hop Behavior .................................................................................... 63
QoS Levels............................................................................................... 64
DSCP Mapping......................................................................................... 64
Using 802.1p Priority to Provide QoS............................................................. 65
Queuing and Scheduling ................................................................................ 66