CANOGA PERKINS 9175 Configuration Guide User Manual
Page 11
CanogaOS Configuration Guide
vii
30.3.3
Configurations on PE3 ................................................................ 30-6
30.3.4
Configurations on PE4 ................................................................ 30-6
30.3.5
Validation Commands ................................................................. 30-7
30.4
Validating Layer 3 FEC............................................................................ 30-8
30.4.1
Configurations on PE1 ................................................................ 30-8
30.4.2
Configurations on PE2 .............................................................. 30-10
30.4.3
Configurations on PE3 .............................................................. 30-10
30.4.4
Configurations on PE4 .............................................................. 30-11
30.4.5
Validation Commands ............................................................... 30-13
31
Configuring QoS ............................................................................................ 31-1
31.1
Overview ................................................................................................. 31-1
31.2
Terminology............................................................................................. 31-1
31.3
Configuration Guidelines ......................................................................... 31-5
31.4
Configuration ........................................................................................... 31-5
31.4.1
Enable QoS................................................................................. 31-5
31.4.2
Configure egress queue.............................................................. 31-5
31.4.3
Configure shaping ....................................................................... 31-7
31.4.4
Configure Policy .......................................................................... 31-8
31.4.5
Configure QoS Mapping tables ................................................. 31-11
31.4.6
Verify QoS Information.............................................................. 31-13
32
Configuring Hierarchical QoS ........................................................................ 32-1
32.1
Overview ................................................................................................. 32-1
32.2
Terminology............................................................................................. 32-1
32.3
Configuration ........................................................................................... 32-2
32.4
Validation Commands ............................................................................. 32-5
33
Configuring ACL ............................................................................................ 33-1
33.1
Overview ................................................................................................. 33-1
33.2
Terminology............................................................................................. 33-1
33.3
Configuration ........................................................................................... 33-1
33.4
Validation Commands ............................................................................. 33-3
34
Configuring Port Security ............................................................................... 34-1
34.1
Overview ................................................................................................. 34-1
34.2
Configurations ......................................................................................... 34-1
34.3
Validation Commands ............................................................................. 34-1
35
Configuring Storm Control ............................................................................. 35-1
35.1
Overview ................................................................................................. 35-1
35.2
Terminology............................................................................................. 35-1
35.3
Configuring Bandwidth Percentage Storm control ................................... 35-1
35.3.1
Topology ..................................................................................... 35-1
35.3.2
Configurations............................................................................. 35-1
35.3.3
Validation Commands ................................................................. 35-1
35.4
Configuring Packets per second Storm control ....................................... 35-2
35.4.1
Topology ..................................................................................... 35-2
35.4.2
Configurations............................................................................. 35-2
35.4.3
Validation Commands ................................................................. 35-2
36
Configuring DHCP ......................................................................................... 36-1