Falcon
M-Class
| User Guide
112
6. IPv6
Protocol
IP protocol number: (0-255, TCP or UDP) or 'Any'.
Source IP
32 LS bits of IPv6 source address in value/mask format or 'Any'. If
a port is configured to match on DMAC/DIP, this field is the Destination IP
address.
DSCP
Diffserv Code Point value (DSCP): It can be a specific value, range of
values or 'Any'. DSCP values are in the range 0-63 including BE, CS1-CS7, EF
or AF11-AF43.
Sport
Source TCP/UDP port:(0-65535) or 'Any', specific or port range
applicable for IP protocol UDP/TCP.
Dport
Destination TCP/UDP port :(0-65535) or 'Any', specific or port range
applicable for IP protocol UDP/TCP.
Action
Parameters
Indicates the classification action taken on ingress frame if Parameters
configured are matched with the frame's content.
CoS
:Class of Service (0-
7) or ‘Default’
DP
:
Drop Precedence Level.(0-1or
‘Default’
DSCP
(0-63, BE, CS1-CS7, EF or AF11-AF43) or 'Default'.
PCP
PCP: (0-7) or 'Default'. Note: PCP and DEI cannot be set individually.
DEI
DEI: (0-1) or 'Default'.
Policy
ACL Policy number: (0-255) or 'Default' (empty field).
Buttons
Save:
Click to save the configuration and move to main QCL page.
Reset:
Click to undo any changes made locally and revert to previously saved
values.
Cancel:
to the previous page without saving the configuration change
Note: 'Default' means that the default-classified value is not modified by this QCE.
4.8.12
Rate Limiters
Rate Limiters control the rate of traffic sent or received on a network interface. Traffic that is less than or
equal to the specified rate is forwarded (and may be delayed by a Shaper), whereas traffic that exceeds the
rate is dropped or delayed.
Traffic Policer
monitors network traffic for conformity with a traffic contract and if required, drops (or
remarks) traffic to enforce compliance with that contract. Traffic sources which are aware of a traffic contract
sometimes apply Traffic Shaping in order to ensure their output stays within the contract and is thus not
dropped. Traffic exceeding a traffic contract may be tagged as non-compliant, dropped, or left as-is
depending on configuration and circumstance.
Traffic Shaper
attempts to control network traffic in order to optimize or guarantee the bandwidth by
delaying packets that exceeds the configured bandwidth profile. Traffic shaping action results in a smooth,
evenly distributed flow of frames, complying with the configured rate.
4.8.12.1
Leaky Bucket
The leaky-bucket algorithm is used to realize rate limiting (policing or shaping). A leaky bucket
provides a mechanism by which bursty traffic can be limited/shaped to present a steady stream of
traffic to the network
Summary of Contents for Falcon Gen-3 M-Class
Page 90: ...Falcon M Class User Guide 90...
Page 107: ...Falcon M Class User Guide 107 Figure 4 57 DSCP Translation...
Page 139: ...Falcon M Class User Guide 139...
Page 187: ...Falcon M Class User Guide 187 Figure 4 99 RADIUS Statistics for Server...
Page 197: ...Falcon M Class User Guide 197 4 11 6 SyncCenter Status Figure 4 104 Sync Center Status...
Page 214: ...Falcon M Class User Guide 214...
Page 227: ...Falcon M Class User Guide 227...
Page 234: ...Falcon M Class User Guide 234...
Page 358: ...Falcon M Class User Guide 358 Figure 4 216 sFlow Configuration displays...
Page 376: ...Falcon M Class User Guide 376...
Page 403: ...Falcon M Class User Guide 403...