648
C
HAPTER
60: ACL C
ONFIGURATION
To define the CoS, you can directly input a value ranging from 0 to 7, or input a
keyword listed in the following table.
Table 520
Rule information
Parameter Type
Function Description
protocol-type
Protocol type
Defines the protocol
type over Ethernet
frames
protocol-type
: the value
can be ip, arp, rarp, ipx,
nbx, pppoe-control, or
pppoe-data.
format-type
Link
layer
encapsulation type
Defines the link layer
encapsulation type in
the rule
format-type
: the value
can be 802.3/802.2,
802.3, ether_ii, or snap.
ingress
{ {
source-vla
n-id
|
source-mac-addr
[
source-mac-mask
] }
* |
any
}
Source MAC address
information
Specifies the source
MAC address range
in the ACL rule
source-mac-addr
:
source MAC address, in
the format of H-H-H
source-mac-mask
:
source MAC address
mask, in the format of
H-H-H, defaults to
ffff-ffff-ffff.
source-vlan-id
: source
VLAN ID, in the range of
1 to 4,094
any
represents all
packets received from
all ports.
egress
{
dest-mac-ad
dr
[
dest-mac-mask
] |
any
}
Destination MAC
address information
Specifies the
destination MAC
address range in the
ACL rule
dest-mac-addr
:
destination MAC
address, in the format
of H-H-H
dest-mac-mask
:
destination MAC
address mask, in the
format of H-H-H,
defaults to ffff-ffff-ffff.
any
represents all
packets forwarded by
all ports.
cos
cos
Priority
Defines the 802.1p
priority of the ACL
rule
cos
: ranges from 0 to 7
time-range
time-name
Time range
information
Specifies the time
range in which the
rule is active
time-name
: specifies
the name of the time
range in which the ACL
rule is active; a string of
1 to 32 characters
Table 521
Description of CoS value
Keyword
CoS value in decimal
CoS value in binary
best-effort 0
000
background 1
001
spare 2
010
excellent-effort 3
011
controlled-load 4
100
Summary of Contents for Switch 7754
Page 32: ...32 CHAPTER 1 CLI OVERVIEW ...
Page 70: ...70 CHAPTER 5 LOGGING IN USING MODEM ...
Page 76: ...76 CHAPTER 7 LOGGING IN THROUGH NMS ...
Page 86: ...86 CHAPTER 9 CONFIGURATION FILE MANAGEMENT ...
Page 120: ...120 CHAPTER 13 ISOLATE USER VLAN CONFIGURATION ...
Page 126: ...126 CHAPTER 14 SUPER VLAN ...
Page 136: ...136 CHAPTER 16 IP PERFORMANCE CONFIGURATION ...
Page 152: ...152 CHAPTER 17 IPX CONFIGURATION ...
Page 164: ...164 CHAPTER 19 QINQ CONFIGURATION ...
Page 172: ...172 CHAPTER 21 SHARED VLAN CONFIGURATION ...
Page 182: ...182 CHAPTER 22 PORT BASIC CONFIGURATION ...
Page 198: ...198 CHAPTER 24 PORT ISOLATION CONFIGURATION ...
Page 208: ...208 CHAPTER 25 PORT SECURITY CONFIGURATION ...
Page 224: ...224 CHAPTER 27 DLDP CONFIGURATION ...
Page 232: ...232 CHAPTER 28 MAC ADDRESS TABLE MANAGEMENT ...
Page 240: ...240 CHAPTER 29 CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION ...
Page 280: ...280 CHAPTER 30 MSTP CONFIGURATION ...
Page 348: ...348 CHAPTER 35 IS IS CONFIGURATION ...
Page 408: ...408 CHAPTER 39 802 1X CONFIGURATION ...
Page 412: ...412 CHAPTER 40 HABP CONFIGURATION ...
Page 422: ...422 CHAPTER 41 MULTICAST OVERVIEW ...
Page 426: ...426 CHAPTER 42 GMRP CONFIGURATION ...
Page 480: ...480 CHAPTER 47 PIM CONFIGURATION ...
Page 506: ...506 CHAPTER 48 MSDP CONFIGURATION ...
Page 552: ...552 CHAPTER 51 TRAFFIC ACCOUNTING CONFIGURATION ...
Page 570: ...570 CHAPTER 53 HA CONFIGURATION ...
Page 582: ...582 CHAPTER 54 ARP CONFIGURATION SwitchA arp protective down recover interval 200 ...
Page 622: ...622 CHAPTER 58 DHCP RELAY AGENT CONFIGURATION ...
Page 684: ...684 CHAPTER 61 QOS CONFIGURATION ...
Page 718: ...718 CHAPTER 63 CLUSTER ...
Page 738: ...738 CHAPTER 67 UDP HELPER CONFIGURATION ...
Page 752: ...752 CHAPTER 69 RMON CONFIGURATION ...
Page 772: ...772 CHAPTER 70 NTP CONFIGURATION ...
Page 796: ...796 CHAPTER 72 FILE SYSTEM MANAGEMENT ...
Page 802: ...802 CHAPTER 73 BIMS CONFIGURATION ...
Page 814: ...814 CHAPTER 74 FTP AND TFTP CONFIGURATION ...
Page 830: ...830 CHAPTER 75 INFORMATION CENTER ...
Page 836: ...836 CHAPTER 76 DNS CONFIGURATION ...
Page 852: ...852 CHAPTER 77 BOOTROM AND HOST SOFTWARE LOADING ...
Page 858: ...858 CHAPTER 78 BASIC SYSTEM CONFIGURATION DEBUGGING ...