
i
Contents
ACL configuration ························································································································································ 1
ACL overview ····································································································································································1
ACL applications on the switch·······························································································································1
ACL categories ·························································································································································1
ACL numbering and naming···································································································································2
Match order ······························································································································································2
ACL rule comments and rule range remarks ·········································································································3
ACL rule numbering ·················································································································································3
Implementing time-based ACL rules························································································································4
IPv4 fragment filtering with ACLs····························································································································4
ACL configuration task list················································································································································4
Configuring an ACL··························································································································································5
Configuring a time range········································································································································5
Configuring a basic ACL·········································································································································5
Configuring an advanced ACL·······························································································································7
Configuring an Ethernet frame header ACL··········································································································8
Copying an ACL·······················································································································································9
Packet filtering with ACLs ····································································································································· 10
Displaying and maintaining ACLs································································································································ 11
ACL configuration examples········································································································································· 11
IPv4 ACL application configuration example····································································································· 11
IPv6 ACL application configuration example····································································································· 12
QoS overview·····························································································································································13
Introduction to QoS························································································································································ 13
QoS service models······················································································································································· 13
Best-effort service model ······································································································································· 13
IntServ model ························································································································································· 13
DiffServ model ······················································································································································· 14
QoS techniques overview ············································································································································· 14
Applying QoS techniques in a network·············································································································· 14
QoS configuration approaches·································································································································16
QoS configuration approach overview ······················································································································· 16
Non-policy approach············································································································································ 16
Policy approach····················································································································································· 16
Configuring a QoS policy············································································································································· 16
Defining a class ····················································································································································· 17
Defining a traffic behavior ··································································································································· 19
Defining a policy ··················································································································································· 19
Applying the QoS policy······································································································································ 20
Displaying and maintaining QoS policies ·················································································································· 22
Priority mapping configuration ·································································································································23
Priority mapping overview ············································································································································ 23
Introduction to priority mapping ·························································································································· 23
Introduction to priorities········································································································································ 23
Priority mapping tables········································································································································· 24
Priority trust mode on a port································································································································· 24
Priority mapping procedure ································································································································· 24