i 
Table of Contents 
1 Applicable Models and Software Versions·····························································································1-1 
2 Feature Matrix ············································································································································2-1 
3 Command/Parameter Matrix·····················································································································3-1 
4 ACL Configuration·····································································································································4-1 
ACL Overview ·········································································································································4-1 
ACL Categories ·······························································································································4-2 
ACL Numbering and Naming ··········································································································4-2 
Match Order·····································································································································4-2 
ACL Rule Numbering·······················································································································4-4 
Implementing Time-Based ACL Rules ····························································································4-4 
IPv4 Fragments Filtering with ACLs································································································4-4 
ACL Configuration Task List ···················································································································4-4 
Configuring an ACL·································································································································4-5 
Creating a Time Range ···················································································································4-5 
Configuring a WLAN ACL················································································································4-5 
Configuring a Basic ACL ·················································································································4-6 
Configuring an Advanced ACL········································································································4-7 
Configuring an Ethernet Frame Header ACL··················································································4-9 
Copying an ACL ····························································································································4-10 
Displaying and Maintaining ACLs ·········································································································4-10 
ACL Configuration Examples················································································································4-10 
IPv4 ACL Configuration Example··································································································4-10 
IPv6 ACL Configuration Example··································································································4-12 
5 QoS Overview ············································································································································5-1 
Introduction to QoS·································································································································5-1 
Introduction to QoS Service Models ·······································································································5-1 
Best-Effort Service Model················································································································5-1 
IntServ Service Model ·····················································································································5-2 
DiffServ Service Model····················································································································5-2 
QoS Techniques Overview ·····················································································································5-2 
Applying QoS Techniques in a Network··························································································5-3 
QoS Processing Flow in an AP ·······································································································5-4 
6 QoS Policy Configuration·························································································································6-1 
QoS Configuration Approach Overview··································································································6-1 
Non-Policy Approach·······················································································································6-1 
Policy Approach·······························································································································6-1 
Configuring a QoS Policy························································································································6-1 
Defining a Class ······························································································································6-2 
Defining a Traffic Behavior··············································································································6-2