beautypg.com

H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 6

background image

i

Contents

ACL configuration ························································································································································ 1

ACL overview ···································································································································································· 1

ACL categories ························································································································································· 1

ACL numbering and naming ··································································································································· 2

Match order ······························································································································································ 2

ACL rule comments ··················································································································································· 3

ACL rule numbering ················································································································································· 3

Fragments filtering with ACLs ·································································································································· 3

ACL configuration task list ················································································································································ 4

Configuring an ACL ·························································································································································· 4

Configuring a time range ········································································································································ 4

Configuring a basic ACL ········································································································································· 5

Configuring an advanced ACL ······························································································································· 6

Configuring an Ethernet frame header ACL ·········································································································· 8

Copying an ACL ······················································································································································· 8

Packet filtering with ACLs ········································································································································ 9

Displaying and maintaining ACLs ································································································································ 10

ACL configuration examples ········································································································································· 10

IPv4 packet filtering configuration example ······································································································· 10

IPv6 packet filtering configuration example ······································································································· 11

QoS overview ····························································································································································· 12

Introduction to QoS ························································································································································ 12

QoS service models ······················································································································································· 12

Best-effort service model ······································································································································· 12

IntServ model ························································································································································· 13

DiffServ model ······················································································································································· 13

QoS techniques overview ············································································································································· 13

Applying QoS techniques in a network ·············································································································· 13

QoS configuration approaches································································································································· 15

QoS configuration approach overview ······················································································································· 15

Non-policy approach ············································································································································ 15

Policy approach····················································································································································· 15

Configuring a QoS policy ············································································································································· 15

Defining a class ····················································································································································· 16

Defining a traffic behavior ··································································································································· 17

Defining a policy ··················································································································································· 17

Applying the QoS policy ······································································································································ 17

Displaying and maintaining QoS policies ·········································································································· 19

Priority mapping configuration ································································································································· 21

Priority mapping overview ············································································································································ 21

Introduction to priority mapping ·························································································································· 21

Introduction to priorities ········································································································································ 21

Priority mapping tables ········································································································································· 22

Priority mapping configuration tasks ··························································································································· 22

Configuring priority mapping ······································································································································· 22

Configuring a priority mapping table ················································································································· 22

Configuring a port to trust packet priority for priority mapping ······································································ 23