beautypg.com

H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 7

background image

i

Contents

Configuring ACLs ························································································································································· 1

 

Overview ············································································································································································ 1

 

ACL categories ························································································································································· 1

 

ACL numbering and naming ··································································································································· 1

 

Match order ······························································································································································ 2

 

ACL rule numbering ················································································································································· 3

 

Implementing time-based ACL rules ························································································································ 3

 

IPv4 fragments filtering with ACLs ·························································································································· 3

 

ACL application ························································································································································ 3

 

ACL configuration task list ················································································································································ 4

 

Configuring a time range ················································································································································· 4

 

Configuring a WLAN ACL ··············································································································································· 4

 

Configuring a basic ACL ·················································································································································· 5

 

Configuring an IPv4 basic ACL ······························································································································ 5

 

Configuring an IPv6 basic ACL ······························································································································ 6

 

Configuring an advanced ACL ········································································································································ 6

 

Configuring an IPv4 advanced ACL······················································································································· 6

 

Configuring an IPv6 advanced ACL······················································································································· 7

 

Configuring an Ethernet frame header ACL ··················································································································· 8

 

Copying an ACL ······························································································································································· 9

 

Copying an IPv4 ACL ·············································································································································· 9

 

Copying an IPv6 ACL ··········································································································································· 10

 

Displaying and maintaining ACLs ································································································································ 10

 

ACL configuration examples ········································································································································· 10

 

IPv4 ACL configuration examples ························································································································ 10

 

IPv6 ACL configuration example ························································································································· 11

 

QoS overview ····························································································································································· 13

 

QoS service models ······················································································································································· 13

 

Best-effort service model ······································································································································· 13

 

IntServ model ························································································································································· 13

 

DiffServ model ······················································································································································· 13

 

QoS techniques overview ············································································································································· 14

 

Deploying QoS in a network ······························································································································· 14

 

QoS processing flow in a device ························································································································ 14

 

QoS configuration approaches································································································································· 16

 

Overview ········································································································································································· 16

 

Non-policy approach ············································································································································ 16

 

Policy approach····················································································································································· 16

 

Configuring a QoS policy ············································································································································· 16

 

Defining a class ····················································································································································· 17

 

Defining a traffic behavior ··································································································································· 18

 

Defining a policy ··················································································································································· 18

 

Applying the QoS policy ······································································································································ 18

 

Displaying and maintaining QoS policies ·········································································································· 20

 

Configuring priority mapping ··································································································································· 21

 

Overview ········································································································································································· 21

 

Introduction to priorities ········································································································································ 21