beautypg.com
i
Contents
ACL configuration ························································································································································ 1
ACL overview ···································································································································································· 1
ACL categories ························································································································································· 1
ACL numbering and naming ··································································································································· 2
Match order ······························································································································································ 2
ACL rule comments ··················································································································································· 3
ACL rule numbering ················································································································································· 3
Fragments filtering with ACLs ·································································································································· 3
ACL configuration task list ················································································································································ 4
Configuring an ACL ·························································································································································· 4
Configuring a time range ········································································································································ 4
Configuring a basic ACL ········································································································································· 5
Configuring an advanced ACL ······························································································································· 6
Configuring an Ethernet frame header ACL ·········································································································· 8
Copying an ACL ······················································································································································· 8
Packet filtering with ACLs ········································································································································ 9
Displaying and maintaining ACLs ································································································································ 10
ACL configuration examples ········································································································································· 10
IPv4 packet filtering configuration example ······································································································· 10
IPv6 packet filtering configuration example ······································································································· 11
QoS overview ····························································································································································· 12
Introduction to QoS ························································································································································ 12
QoS service models ······················································································································································· 12
Best-effort service model ······································································································································· 12
IntServ model ························································································································································· 13
DiffServ model ······················································································································································· 13
QoS techniques overview ············································································································································· 13
Applying QoS techniques in a network ·············································································································· 13
QoS configuration approaches································································································································· 15
QoS configuration approach overview ······················································································································· 15
Non-policy approach ············································································································································ 15
Policy approach····················································································································································· 15
Configuring a QoS policy ············································································································································· 15
Defining a class ····················································································································································· 16
Defining a traffic behavior ··································································································································· 17
Defining a policy ··················································································································································· 17
Applying the QoS policy ······································································································································ 17
Displaying and maintaining QoS policies ·········································································································· 19
Priority mapping configuration ································································································································· 21
Priority mapping overview ············································································································································ 21
Introduction to priority mapping ·························································································································· 21
Introduction to priorities ········································································································································ 21
Priority mapping tables ········································································································································· 22
Priority mapping configuration tasks ··························································································································· 22
Configuring priority mapping ······································································································································· 22
Configuring a priority mapping table ················································································································· 22
Configuring a port to trust packet priority for priority mapping ······································································ 23