H3C Technologies H3C S10500 Series Switches User Manual
Page 6
i
Contents
ACL configuration ························································································································································ 1
ACL overview ····································································································································································1
ACL applications on the switch·······························································································································1
ACL categories ·························································································································································1
ACL numbering and naming···································································································································1
Match order ······························································································································································2
ACL rule comments and rule range remarks ·········································································································3
ACL rule numbering ·················································································································································3
Fragments filtering with ACLs··································································································································3
ACL configuration task list················································································································································4
Configuring an ACL··························································································································································4
Configuring a time range········································································································································4
Configuring a basic ACL·········································································································································5
Configuring an advanced ACL·······························································································································6
Configuring an Ethernet frame header ACL··········································································································9
Copying an ACL·······················································································································································9
Packet filtering with ACLs ····································································································································· 10
Displaying and maintaining ACLs································································································································ 11
ACL configuration examples········································································································································· 12
IPv4 packet filtering configuration example ······································································································· 12
IPv6 packet filtering configuration example ······································································································· 12
QoS overview·····························································································································································14
Introduction to QoS························································································································································ 14
QoS service models······················································································································································· 14
Best-effort service model ······································································································································· 14
IntServ model ························································································································································· 14
DiffServ model ······················································································································································· 15
QoS techniques overview ············································································································································· 15
Applying QoS techniques in a network·············································································································· 15
QoS configuration approaches·································································································································16
QoS configuration approach overview ······················································································································· 16
Non-policy approach············································································································································ 16
Policy approach····················································································································································· 16
Configuring a QoS policy············································································································································· 16
Defining a class ····················································································································································· 17
Defining a traffic behavior ··································································································································· 19
Defining a policy ··················································································································································· 19
Applying the QoS policy······································································································································ 20
Displaying and maintaining QoS policies·········································································································· 23
Priority mapping configuration ·································································································································25
Priority mapping overview ············································································································································ 25
Introduction to priority mapping ·························································································································· 25
Introduction to priorities········································································································································ 25
Priority mapping tables········································································································································· 25
Priority trust mode on a port································································································································· 26
Priority mapping procedure ································································································································· 26
Priority mapping configuration tasks···························································································································· 28