Extreme Networks Summit 300-48 User Manual
Extreme Networks Computer Accessories
Table of contents
Document Outline
- Contents
- Figures
- Tables
- Preface
- ExtremeWare Overview
- Accessing the Switch
- Managing the Switch
- Configuring Ports on a Switch
- Virtual LANs (VLANs)
- Wireless Networking
- Unified Access Security
- Power Over Ethernet
- Forwarding Database (FDB)
- Access Policies
- Overview of Access Policies
- Using Access Control Lists
- Access Masks
- Access Lists
- Rate Limits
- How Access Control Lists Work
- Access Mask Precedence Numbers
- Specifying a Default Rule
- The permit-established Keyword
- Adding Access Mask, Access List, and Rate Limit Entries
- Deleting Access Mask, Access List, and Rate Limit Entries
- Verifying Access Control List Configurations
- Access Control List Commands
- Access Control List Examples
- Quality of Service (QoS)
- Overview of Policy-Based Quality of Service
- Applications and Types of QoS
- Configuring QoS for a Port or VLAN
- Traffic Groupings
- Verifying Configuration and Performance
- Modifying a QoS Configuration
- Traffic Rate-Limiting
- Status Monitoring and Statistics
- Spanning Tree Protocol (STP)
- IP Unicast Routing
- Safety Information
- Supported Standards
- Software Upgrade and Boot Options
- Troubleshooting
- Index
- Index of Commands