Contents
OmniSwitch AOS Release 8 Network Configuration Guide December 2017 xx
Configuring QoS .........................................................................................................26-37
Configuring Global QoS Parameters ..........................................................................26-38
Enabling/Disabling QoS .......................................................................................26-38
Using the QoS Log ...............................................................................................26-38
Setting the Statistics Interval ................................................................................26-41
Returning the Global Configuration to Defaults ..................................................26-41
Verifying Global Settings .....................................................................................26-41
Creating Policies .........................................................................................................26-42
Quick Steps for Creating Policies ........................................................................26-42
ASCII-File-Only Syntax ......................................................................................26-43
Creating Policy Conditions ..................................................................................26-44
Creating Policy Actions .......................................................................................26-45
Creating Policy Rules ...........................................................................................26-46
Creating Policy Lists ............................................................................................26-49
Verifying Policy Configuration ............................................................................26-52
Using Condition Groups in Policies ............................................................................26-53
Sample Group Configuration ...............................................................................26-53
Creating Network Groups ....................................................................................26-54
Creating Services ..................................................................................................26-55
Creating Service Groups ......................................................................................26-56
Creating MAC Groups .........................................................................................26-57
Creating Port Groups ............................................................................................26-58
Verifying Condition Group Configuration ...........................................................26-59
Using Map Groups ......................................................................................................26-60
Sample Map Group Configuration .......................................................................26-60
How Map Groups Work .......................................................................................26-61
Creating Map Groups ...........................................................................................26-61
Verifying Map Group Configuration ...................................................................26-62
Using Access Control Lists .........................................................................................26-63
Layer 2 ACLs .......................................................................................................26-63
Layer 3 ACLs .......................................................................................................26-65
IPv6 ACLs ............................................................................................................26-66
Multicast Filtering ACLs .....................................................................................26-66
Using ACL Security Features ..............................................................................26-67
Applying the Configuration ........................................................................................26-71
Interaction With LDAP Policies ..........................................................................26-72
Verifying the Applied Policy Configuration ........................................................26-73
Policy Applications .....................................................................................................26-74
Basic QoS Policies ...............................................................................................26-75
Redirection Policies ..............................................................................................26-76
Policy Based Mirroring ........................................................................................26-77
ICMP Policy Example ..........................................................................................26-78
802.1p and ToS/DSCP Marking and Mapping ....................................................26-78
Policy Based Routing ...........................................................................................26-79