Allied Telesis AT-S63 User Manual
Page 7

AT-S63 Management Software Menus Interface User’s Guide
7
Mapping CoS Priorities to Egress Queues ..................................................................................................... 330
Configuring Egress Scheduling ...................................................................................................................... 332
Displaying Port CoS Priorities ........................................................................................................................ 334
Chapter 17: Quality of Service ................................................................................................................... 337
Quality of Service Overview ........................................................................................................................... 338
Classifiers................................................................................................................................................. 339
Flow Groups............................................................................................................................................. 339
Traffic Classes ......................................................................................................................................... 340
Policies..................................................................................................................................................... 340
QoS Policy Guidelines ............................................................................................................................. 340
Packet Processing ................................................................................................................................... 341
Bandwidth Allocation................................................................................................................................ 341
Packet Prioritization ................................................................................................................................. 341
Replacing Priorities .................................................................................................................................. 342
VLAN Tag User Priorities ......................................................................................................................... 342
DSCP Values ........................................................................................................................................... 342
DiffServ Domains ..................................................................................................................................... 343
Examples ................................................................................................................................................. 344
Creating a Flow Group ............................................................................................................................. 352
Modifying a Flow Group ........................................................................................................................... 355
Deleting a Flow Group ............................................................................................................................. 356
Displaying Flow Groups ........................................................................................................................... 358
Creating a Traffic Class............................................................................................................................ 361
Modifying a Traffic Class.......................................................................................................................... 365
Deleting a Traffic Class ............................................................................................................................ 367
Displaying Traffic Classes........................................................................................................................ 368
Creating a Policy ...................................................................................................................................... 371
Modifying a Policy .................................................................................................................................... 374
Deleting a Policy ...................................................................................................................................... 375
Displaying Policies ................................................................................................................................... 376
Chapter 18: Denial of Service Defense ...................................................................................................... 379
Denial of Service Overview ............................................................................................................................ 380
SYN Flood Attack..................................................................................................................................... 380
Smurf Attack............................................................................................................................................. 381
Land Attack .............................................................................................................................................. 381
Teardrop Attack........................................................................................................................................ 383
Ping of Death Attack ................................................................................................................................ 383
IP Options Attack ..................................................................................................................................... 384
Denial of Service Defense Guidelines...................................................................................................... 384
Section III: IGMP Snooping, MLD Snooping, and RRP Snooping .................... 389
Chapter 19: IGMP Snooping ....................................................................................................................... 391
IGMP Snooping Overview .............................................................................................................................. 392
Configuring IGMP Snooping........................................................................................................................... 394
Enabling or Disabling IGMP Snooping ........................................................................................................... 397
Displaying a List of Host Nodes...................................................................................................................... 398
Displaying a List of Multicast Routers............................................................................................................. 400