i 
Contents 
Configuring ACLs ············································································· 1 
Overview ·································································································································· 1 
ACL types ·························································································································· 1 
Numbering and naming ACLs ································································································ 1 
Match order ························································································································ 1 
Rule numbering ·················································································································· 2 
Fragments filtering with ACLs ································································································ 3 
Compatibility information ············································································································· 3 
Feature and hardware compatibility ························································································· 3 
Command and hardware compatibility ····················································································· 4 
Configuration restrictions and guidelines ························································································· 4 
Configuration task list·················································································································· 4 
Configuring a basic ACL ·············································································································· 5 
Configuring an IPv4 basic ACL ······························································································· 5 
Configuring an IPv6 basic ACL ······························································································· 5 
Configuring an advanced ACL ······································································································ 6 
Configuring an IPv4 advanced ACL ························································································· 6 
Configuring an IPv6 advanced ACL ························································································· 7 
Configuring a Layer 2 ACL ··········································································································· 8 
Configuring a WLAN client ACL ···································································································· 9 
Configuring a WLAN AP ACL ····································································································· 10 
Copying an ACL ······················································································································ 10 
Configuring packet filtering with ACLs ·························································································· 11 
Applying an ACL to an interface for packet filtering ··································································· 11 
Configuring SNMP notifications for packet filtering ···································································· 12 
Setting the packet filtering default action················································································· 12 
Displaying and maintaining ACLs ································································································ 13 
ACL configuration example ········································································································ 14 
Network requirements ········································································································ 14 
Configuration procedure ····································································································· 14 
Verifying the configuration ··································································································· 15 
QoS overview ················································································ 16 
Compatibility information ··········································································································· 16 
Feature and hardware compatibility ······················································································· 16 
Command and hardware compatibility ··················································································· 17 
QoS service models ················································································································· 17 
Best-effort service model ···································································································· 17 
IntServ model ··················································································································· 17 
DiffServ model ·················································································································· 17 
QoS techniques overview ·········································································································· 17 
Deploying QoS in a network ································································································ 18 
QoS processing flow in a device ··························································································· 18 
Configuring a QoS policy ································································· 19 
Non-MQC approach ················································································································· 19 
MQC approach ························································································································ 19 
Configuration procedure diagram ································································································ 19 
Defining a traffic class ··············································································································· 19 
Defining a traffic behavior ·········································································································· 20 
Defining a QoS policy ··············································································································· 20 
Applying the QoS policy ············································································································ 20 
Applying the QoS policy to an interface ·················································································· 21 
Applying the QoS policy to a user profile ················································································ 21 
Displaying and maintaining QoS policies ······················································································· 22