372
C
HAPTER
19: ACL C
ONFIGURATION
QoS Profile
Configuration
When used together with the 802.1x authentication function, the QoS profile
function can offer preconfigured QoS settings for a qualified user in authentication
(or a group of users).
When the user passes the 802.1x authentication, the Switch delivers the right profile
dynamically to the port from which the user is accessed after referring to the mapping
between user names and profiles stored on the AAA server.
The QoS profile function can offer packet filtering, traffic policing and preference
replacing functions together.
Figure 96
QoS Profile Configuration Environment
QoS profile configuration details:
Table 392
QoS Profile Configuration
Configuring QoS Profile
You must first define ACLs for the traffic actions before adding the actions to the QoS
profile.
Entering QoS Profile View
To configure the QoS profile, you must first enter QoS profile view.
Device
Configuration
Default
Description
AAA server
Configure user
authentication
information
—
—
Configure mapping
between user names and
QoS profile
—
Multiple users can correspond to the
same QoS profile.
Switch
Enable 802.1x
authentication function
—
Refer to the Security part of this
manual for detailed configuration.
Define application mode
on the port of QoS profile
Port-based
mode
You can change it to user-based
mode
Configure QoS profile,
including packet filtering,
traffic policing and
preference replacing
—
First define an ACL and then
configure the QoS function. Refer to
the ACL chapter of the QoS/ACL
module for defining ACL
Apply QoS profile to the
port
—
You can apply the QoS profile actions
to the current port with the right
commands.
Network
AAA Server
Switch
User
Network
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...