
Key Concepts
625
Classification is configured on a device as a set of rules. Each rule defines
a particular way of identifying the type of traffic. For example, a rule may
state that SNMP traffic can be identified as UDP packets that have either
the source or the destination UDP port set to the value 161.
Marking
Due to the numerous possibilities for classifying packets, not every device
can classify the same packets in the same manner. Some devices are
capable of extremely complex classification (
complex classification
devices
), while other devices may only be able to match traffic based on
the content of one or two fields (
simple classification devices
). For
example, this can mean that while one device in your network is able to
identify traffic to and from your database server using the destination or
source IP address in the packets, another device may not be able to.
There are two standards that specify how a complex classification device
can modify packets in a straightforward manner so that a simple
classification device can still identify how important those packets are.
This modification of packets is known as marking and the two standards
are:
IEEE 8 02.1D
—
defines an extended MAC header (known as a tagged
header) which contains a user priority field (known as the 802.1p tag),
which takes one of eight values (0 - 7) to represent the priority of the
packet.
IETF RFC 2474
— defines the use of the Differentiated Services (DiffServ)
field in the IP header. This field can take one of sixty-four values (0 - 63)
which are known as DiffServ codepoints (or DSCPs) to represent the
quality of service
requirements of the packet. There are no restrictions on
what a particular codepoint value may mean, however one use could be
to simply represent the priority of the packet.
More information on these standards is available in
“User Priority Field”
on
page 652
and
“DiffServ Codepoint Field”
on
page 653
.
Summary of Contents for 3C15500 - Network Director - PC
Page 4: ......
Page 34: ......
Page 38: ...34 ABOUT THIS GUIDE ...
Page 50: ...46 CHAPTER 1 GETTING STARTED ...
Page 64: ...60 CHAPTER 2 PRODUCT ACTIVATION ...
Page 213: ...Components 209 Figure 75 Export to Visio Dialog Box ...
Page 220: ...216 CHAPTER 5 WORKING WITH THE MAP Figure 84 Double Clicking on a Router in the Tree ...
Page 264: ...260 CHAPTER 6 VIEWING DEVICE DETAILS Figure 117 Security Tab for a Device ...
Page 276: ...272 CHAPTER 6 VIEWING DEVICE DETAILS ...
Page 322: ...318 CHAPTER 7 MONITORING THE NETWORK ...
Page 385: ...Examples 381 Figure 189 Attach Alerts Dialog Box ...
Page 406: ...402 CHAPTER 9 PERFORMANCE REPORTING ...
Page 431: ...Components 427 History View dialog box Figure 210 History View Dialog Box ...
Page 440: ...436 CHAPTER 10 RMON Host View dialog box Figure 219 Host View Dialog Box ...
Page 476: ...472 CHAPTER 11 CREATING REPORTS ...
Page 502: ...498 CHAPTER 12 CONFIGURING SINGLE DEVICES ...
Page 526: ...522 CHAPTER 13 VLAN MANAGEMENT Figure 272 Options Dialog Box VLANs Tab ...
Page 567: ...Components 563 Figure 305 Selecting the Link to the End Station on the Map ...
Page 626: ...622 CHAPTER 14 BULK CONFIGURATION ...
Page 684: ...680 CHAPTER 16 UPGRADING DEVICE SOFTWARE ...
Page 814: ...810 CHAPTER 19 BACKING UP DEVICE CONFIGURATIONS ...
Page 838: ...834 CHAPTER 20 LIVE UPDATE ...
Page 894: ...890 APPENDIX G ADDING MAC ADDRESS VENDOR TRANSLATIONS ...