i
Table of Contents
1 Applicable Models and Software Versions ·····························································································1-1
2 Feature Matrix ············································································································································2-1
3 Command/Parameter Matrix·····················································································································3-1
4 ACL Configuration·····································································································································4-1
ACL Overview ·········································································································································4-1
ACL Categories ·······························································································································4-2
ACL Numbering and Naming ··········································································································4-2
Match Order·····································································································································4-2
ACL Rule Numbering·······················································································································4-4
IPv4 Fragments Filtering with ACLs ································································································4-4
ACL Configuration Task List ···················································································································4-4
Configuring an ACL·································································································································4-5
Creating a Time Range ···················································································································4-5
Configuring a WLAN ACL················································································································4-5
Configuring a Basic ACL ·················································································································4-6
Configuring an Advanced ACL ········································································································4-7
Copying an ACL ····························································································································4-10
Displaying and Maintaining ACLs ·········································································································4-10
ACL Configuration Examples ················································································································4-10
IPv4 ACL Configuration Example··································································································4-10
IPv6 ACL Configuration Example··································································································4-12
5 QoS Overview ············································································································································5-1
Introduction to QoS ·································································································································5-1
Introduction to QoS Service Models ·······································································································5-1
Best-Effort Service Model················································································································5-1
IntServ Service Model ·····················································································································5-2
DiffServ Service Model ····················································································································5-2
QoS Techniques Overview ·····················································································································5-2
QoS Processing Flow in an AP ·······································································································5-4
6 QoS Policy Configuration ·························································································································6-1
QoS Configuration Approach Overview ··································································································6-1
Non-Policy Approach·······················································································································6-1
Policy Approach·······························································································································6-1
Configuring a QoS Policy ························································································································6-1
Defining a Class ······························································································································6-2
Defining a Traffic Behavior ··············································································································6-2