Allied Telesis AT-S63 User Manual
Page 7

AT-S63 Management Software Menus Interface User’s Guide
7
Chapter 16: Class of Service ...................................................................................................................... 319
Class of Service Overview.............................................................................................................................. 320
Configuring CoS ............................................................................................................................................. 325
Mapping CoS Priorities to Egress Queues ..................................................................................................... 328
Configuring Egress Scheduling ...................................................................................................................... 330
Displaying Port CoS Priorities ........................................................................................................................ 332
Chapter 17: Quality of Service ................................................................................................................... 335
Quality of Service Overview ........................................................................................................................... 336
Classifiers................................................................................................................................................. 337
Flow Groups............................................................................................................................................. 337
Traffic Classes ......................................................................................................................................... 338
Policies..................................................................................................................................................... 338
QoS Policy Guidelines ............................................................................................................................. 339
Packet Processing ................................................................................................................................... 339
Bandwidth Allocation................................................................................................................................ 340
Packet Prioritization ................................................................................................................................. 340
Replacing Priorities .................................................................................................................................. 340
VLAN Tag User Priorities ......................................................................................................................... 341
DSCP Values ........................................................................................................................................... 341
DiffServ Domains ..................................................................................................................................... 341
Examples ................................................................................................................................................. 343
Creating a Flow Group ............................................................................................................................. 351
Modifying a Flow Group ........................................................................................................................... 354
Deleting a Flow Group ............................................................................................................................. 355
Displaying Flow Groups ........................................................................................................................... 357
Creating a Traffic Class............................................................................................................................ 360
Modifying a Traffic Class.......................................................................................................................... 364
Deleting a Traffic Class ............................................................................................................................ 366
Displaying Traffic Classes........................................................................................................................ 367
Creating a Policy ...................................................................................................................................... 370
Modifying a Policy .................................................................................................................................... 373
Deleting a Policy ...................................................................................................................................... 374
Displaying Policies ................................................................................................................................... 375
Chapter 18: Denial of Service Defense ...................................................................................................... 379
Denial of Service Overview ............................................................................................................................ 380
SYN Flood Attack..................................................................................................................................... 380
Smurf Attack............................................................................................................................................. 381
Land Attack .............................................................................................................................................. 381
Teardrop Attack........................................................................................................................................ 383
Ping of Death Attack ................................................................................................................................ 383
IP Options Attack ..................................................................................................................................... 384
Mirroring Traffic ........................................................................................................................................ 384
Denial of Service Defense Guidelines...................................................................................................... 385