beautypg.com

CANOGA PERKINS 9175 Configuration Guide User Manual

Page 11

background image

CanogaOS Configuration Guide

vii

30.3.3

Configurations on PE3 ................................................................ 30-6

30.3.4

Configurations on PE4 ................................................................ 30-6

30.3.5

Validation Commands ................................................................. 30-7

30.4

Validating Layer 3 FEC............................................................................ 30-8

30.4.1

Configurations on PE1 ................................................................ 30-8

30.4.2

Configurations on PE2 .............................................................. 30-10

30.4.3

Configurations on PE3 .............................................................. 30-10

30.4.4

Configurations on PE4 .............................................................. 30-11

30.4.5

Validation Commands ............................................................... 30-13

31

Configuring QoS ............................................................................................ 31-1

31.1

Overview ................................................................................................. 31-1

31.2

Terminology............................................................................................. 31-1

31.3

Configuration Guidelines ......................................................................... 31-5

31.4

Configuration ........................................................................................... 31-5

31.4.1

Enable QoS................................................................................. 31-5

31.4.2

Configure egress queue.............................................................. 31-5

31.4.3

Configure shaping ....................................................................... 31-7

31.4.4

Configure Policy .......................................................................... 31-8

31.4.5

Configure QoS Mapping tables ................................................. 31-11

31.4.6

Verify QoS Information.............................................................. 31-13

32

Configuring Hierarchical QoS ........................................................................ 32-1

32.1

Overview ................................................................................................. 32-1

32.2

Terminology............................................................................................. 32-1

32.3

Configuration ........................................................................................... 32-2

32.4

Validation Commands ............................................................................. 32-5

33

Configuring ACL ............................................................................................ 33-1

33.1

Overview ................................................................................................. 33-1

33.2

Terminology............................................................................................. 33-1

33.3

Configuration ........................................................................................... 33-1

33.4

Validation Commands ............................................................................. 33-3

34

Configuring Port Security ............................................................................... 34-1

34.1

Overview ................................................................................................. 34-1

34.2

Configurations ......................................................................................... 34-1

34.3

Validation Commands ............................................................................. 34-1

35

Configuring Storm Control ............................................................................. 35-1

35.1

Overview ................................................................................................. 35-1

35.2

Terminology............................................................................................. 35-1

35.3

Configuring Bandwidth Percentage Storm control ................................... 35-1

35.3.1

Topology ..................................................................................... 35-1

35.3.2

Configurations............................................................................. 35-1

35.3.3

Validation Commands ................................................................. 35-1

35.4

Configuring Packets per second Storm control ....................................... 35-2

35.4.1

Topology ..................................................................................... 35-2

35.4.2

Configurations............................................................................. 35-2

35.4.3

Validation Commands ................................................................. 35-2

36

Configuring DHCP ......................................................................................... 36-1