CANOGA PERKINS CanogaOS Configuration Guide User Manual
Page 14
CanogaOS Configuration Guide
Proprietary & Confidential Canoga Perkins Metro Ethernet Switches
Page 14 of 350
31.2.3 Verify
QoS
Information .................................................................................. 281
Class Maps information ................................................................................................................ 281
Aggregate Policer information ...................................................................................................... 281
Policy-Map information ................................................................................................................ 281
QoS interface information............................................................................................................. 282
QoS map information .................................................................................................................... 283
32 Configuring
ACL ................................................................................................................. 289
32.1 ACL............................................................................................................................... 289
32.1.1 Terminology .................................................................................................... 289
32.2 Configuration ................................................................................................................ 289
Configurations............................................................................................................................... 290
32.2.1 Validation
Commands..................................................................................... 291
33
Configuring Port Security .................................................................................................... 292
33.1
Configuring port security .............................................................................................. 292
33.1.1 Configurations................................................................................................. 292
33.1.2 Validation
Commands..................................................................................... 293
34
Configuring Storm Control .................................................................................................. 294
34.1 Terminology .................................................................................................................. 294
34.2
Configuring Bandwidth Percentage Storm control ....................................................... 294
34.2.1 Topology ......................................................................................................... 294
34.2.2 Configurations................................................................................................. 294
34.2.3 Validation
Commands..................................................................................... 294
34.3
Configuring Packets per second Storm control............................................................. 295
34.3.1 Topology ......................................................................................................... 295
34.3.2 Configurations................................................................................................. 295
34.3.3 Validation
Commands..................................................................................... 295
35 Configuring
DHCP............................................................................................................... 296
35.1 DHCP
Relay
Configuration .......................................................................................... 296
35.1.1 References ....................................................................................................... 296
35.1.2 Terminology .................................................................................................... 296
35.1.3 Topology ......................................................................................................... 297
35.1.4 Configurations................................................................................................. 297
35.1.5 Validation
Commands..................................................................................... 298
35.2 DHCP
Snooping
Configuration .................................................................................... 299
35.2.1 Topology ......................................................................................................... 299