Allied Telesis AT-S63 User Manual
Page 6

Contents
6
Creating a Log Output Definition ..............................................................................................................241
Modifying a Log Output ............................................................................................................................247
Deleting a Log Output...............................................................................................................................248
Displaying the Log Output Definition Details ............................................................................................249
Chapter 13: Classifiers ................................................................................................................................251
Classifier Overview .........................................................................................................................................252
Classifier Criteria ......................................................................................................................................253
Classifier Guidelines.................................................................................................................................258
Creating a Classifier........................................................................................................................................259
Modifying a Classifier ......................................................................................................................................263
Deleting a Classifier ........................................................................................................................................265
Displaying Classifiers ......................................................................................................................................266
Chapter 14: Access Control Lists ..............................................................................................................269
Access Control List (ACL) Overview ...............................................................................................................270
Parts of an ACL ........................................................................................................................................271
Guidelines.................................................................................................................................................271
Examples..................................................................................................................................................272
Creating an ACL .............................................................................................................................................277
Modifying an ACL............................................................................................................................................280
Deleting an ACL..............................................................................................................................................282
Deleting All ACLs ............................................................................................................................................284
Displaying ACLs..............................................................................................................................................285
Chapter 15: Denial of Service Defense ......................................................................................................287
Denial of Service Overview.............................................................................................................................288
SYN Flood Attack .....................................................................................................................................288
SMURF Attack..........................................................................................................................................288
Land Attack...............................................................................................................................................289
Teardrop Attack ........................................................................................................................................290
Ping of Death Attack.................................................................................................................................291
IP Options Attack......................................................................................................................................291
Denial of Service Defense Guidelines ......................................................................................................292
Chapter 16: Quality of Service ....................................................................................................................297
Quality of Service Overview ............................................................................................................................298
Classifiers .................................................................................................................................................299
Flow Groups .............................................................................................................................................299
Traffic Classes..........................................................................................................................................300
Policies .....................................................................................................................................................300
QoS Policy Guidelines..............................................................................................................................300
Packet Processing....................................................................................................................................301
Bandwidth Allocation ................................................................................................................................301
Packet Prioritization..................................................................................................................................301
Replacing Priorities...................................................................................................................................302
VLAN Tag User Priorities .........................................................................................................................302
DSCP Values............................................................................................................................................302
DiffServ Domains......................................................................................................................................303
Examples..................................................................................................................................................305
Creating a Flow Group .............................................................................................................................313
Modifying a Flow Group............................................................................................................................315
Deleting a Flow Group..............................................................................................................................317