6
OnSite Model 3210 User Manual
Table of Contents
When to configure access lists
.........................................................................................................................56
Features of access control lists
.........................................................................................................................56
Access control list configuration task list
................................................................................................................57
Mapping out the goals of the access control list
...............................................................................................57
Creating an access control list profile and enter configuration mode
...............................................................58
Adding a filter rule to the current access control list profile
.............................................................................58
Adding an ICMP filter rule to the current access control list profile
................................................................60
Adding a TCP, UDP or SCTP filter rule to the current access control list profile
...........................................62
Binding and unbinding an access control list profile to an IP interface
............................................................64
Displaying an access control list profile
...........................................................................................................65
Debugging an access control list profile
...........................................................................................................65
Examples
...............................................................................................................................................................67
Denying a specific subnet
................................................................................................................................67
7
Link scheduler configuration
........................................................................................................................ 68
Introduction
..........................................................................................................................................................69
Configuring access control lists
..............................................................................................................................69
Configuring quality of service (QoS)
.....................................................................................................................70
Applying scheduling at the bottleneck
.............................................................................................................70
Using traffic classes
.........................................................................................................................................70
Introduction to Scheduling
.............................................................................................................................71
Priority
......................................................................................................................................................71
Weighted fair queuing (WFQ)
..................................................................................................................71
Shaping
.....................................................................................................................................................72
Burst tolerant shaping or wfq
....................................................................................................................72
Hierarchy
..................................................................................................................................................72
Quick references
....................................................................................................................................................73
Setting the modem rate
...................................................................................................................................73
Command cross reference
...............................................................................................................................74
Link scheduler configuration task list
.....................................................................................................................74
Defining the access control list profile
.............................................................................................................75
Packet classification
...................................................................................................................................75
Creating an access control list
....................................................................................................................76
Creating a service policy profile
.......................................................................................................................77
Specifying the handling of traffic-classes
..........................................................................................................79
Defining fair queuing weight
.....................................................................................................................79
Defining the bit-rate
.................................................................................................................................80
Defining absolute priority
.........................................................................................................................80
Defining the maximum queue length
........................................................................................................80
Specifying the type-of-service (TOS) field
.................................................................................................80
Specifying the precedence field
..................................................................................................................81
Specifying differentiated services codepoint (DSCP) marking
...................................................................81
Specifying layer 2 marking
........................................................................................................................82
Defining random early detection
...............................................................................................................83