Parameter Description
Rate limit CP route traffic (pps) Specifies the traffic rate limit that needs ARP requests. Range is 1-65535
packets per seconds (pps).
Default: 976 pps
Rate limit CP session mirror
traffic (pps)
Specifies the session mirrored traffic forwarded to the switch. Range is 1-
65535 packets per seconds (pps).
Default: 976 pps
Rate limit CP auth process traffic
(pps)
Specifies the traffic rate limit that is forwarded to the authentication
process. Range is Range is 1-65535 packets per seconds (pps).
Default: 976 pps
Using AppRF 2.0
The AppRF 2.0 feature improves application visibility and control by allowing you to configure access control
list (ACL) and bandwidth-control applications and application categories. AppRF 2.0 supports a Deep Packet
Inspection (DPI) engine for application detection for over a thousand applications. All wired and wireless traffic
that traverses the switch can now be categorized and controlled by application and application category.
AppRF 2.0 provides the ability to:
n permit or deny an application or application category for a specific role. For example, you can block
bandwidth monopolizing applications on a guest role within an enterprise.
n rate limit an application or application category, such as video streaming applications, globally or for a
specific role.
n mark different L2/L3 Quality of Service (QoS) for an application or application category for a user role. For
example, you can mark video and voice sessions that originate from wireless users with different priorities
so that traffic is prioritized accordingly in your network.
To configure AppRF 2.0, see the following topics:
n Enabling Deep Packet Inspection (DPI) on page 397
n Configuring Policies for AppRF 2.0 on page 398
n Configuring Bandwidth Contracts for AppRF 2.0 on page 400
Enabling Deep Packet Inspection (DPI)
For application and application category specific configuration to take affect, you must first enable DPI.
You must reboot (reload) the switch after you enable or disable DPI for global classification to take effect.
In the WebUI
1. Navigate to Configuration > Advanced Services > Stateful Firewall > Global Settings.
2. Check the Enable Deep Packet Inspection option. To disable DPI, uncheck the checkbox.
3. Click Apply.
4. Reload the switch.
In the CLI
To enable global DPI:
(host)(config) #firewall dpi
(host) #reload
AOS-W 6.5.3.x | User Guide Roles and Policies | 397