2-7
Features Description
Congestion
Management
The key to congestion management is how to define a dispatching policy
for resources to decide the order of forwarding packets when congestion
occurs. This document describes:
z Configuring SP Queuing
z Configure WRR Queuing
z Configuring WFQ Queuing
z Configuring SP+WRR Queues
Traffic Filtering
This document describes how to filter in or filter out a class of traffic by
associating the class with a traffic filtering action.
Priority Marking
This document describes how to marking the priority of the packets by
associating a class with a behavior configured with the priority marking
action
Traffic Redirecting
Traffic redirecting is the action of redirecting the packets matching the
specific match criteria to a certain location for processing. This document
describes how to configure traffic redirecting.
Traffic Mirroring
Traffic mirroring is the action of copying the specified packets to the
specified destination for packet analyzing and monitoring. This document
describes how to configure traffic mirroring.
Class-Based
Accounting
Class-based accounting collects statistics on a per-traffic class basis. This
document describes how to configure class-based accounting.
User Profile
User profile provides a configuration template to save predefined
configurations. This document describes:
z Creating a User Profile
z Configuring a User Profile
z Enabling a User Profile
Appendix
This document describes:
z Acronym
z Default Priority Mapping Tables
z Introduction to Packet Precedences
Security Volume
Table 2-6 Features in the Security volume
Features Description
AAA
Authentication, Authorization and Accounting (AAA) provide a uniform
framework used for configuring these three security functions to
implement the network security management. This document describes:
z Introduction to AAA, RADIUS and HWTACACS
z AAA configuration
z RADIUS configuration
z HWTACACS configuration
802.1X
IEEE 802.1X (hereinafter simplified as 802.1X) is a port-based network
access control protocol that is used as the standard for LAN user access
authentication. This document describes:
z 802.1X overview
z 802.1X configuration
z 802.1X Guest-VLAN configuration