i
Contents
Configuring ACLs ························································································································································· 1
Overview ············································································································································································ 1
Applications on the switch ······································································································································ 1
ACL categories ························································································································································· 1
Numbering and Naming ACLs ······························································································································· 1
Match order ······························································································································································ 2
Rule numbering ························································································································································· 3
Fragments filtering with ACLs ·································································································································· 3
Configuration task list ······················································································································································· 3
Configuring a basic ACL ·················································································································································· 4
Configuring an IPv4 basic ACL ······························································································································ 4
Configuring an IPv6 basic ACL ······························································································································ 4
Configuring an advanced ACL ········································································································································ 5
Configuring an IPv4 advanced ACL······················································································································· 5
Configuring an IPv6 advanced ACL······················································································································· 6
Configuring an Ethernet frame header ACL ··················································································································· 7
Copying an ACL ······························································································································································· 8
Configuring packet filtering with ACLs ··························································································································· 9
Applying an ACL to an interface for packet filtering···························································································· 9
Setting the interval for generating and outputting packet filtering logs ······························································ 9
Setting the packet filtering default action ·············································································································· 9
Displaying and maintaining ACLs ··································································································································· 9
ACL configuration example ·········································································································································· 10
Network requirements ··········································································································································· 10
Configuration procedure ······································································································································ 11
Verifying the configuration ··································································································································· 11
QoS overview ····························································································································································· 13
QoS service models ······················································································································································· 13
Best-effort service model ······································································································································· 13
IntServ model ························································································································································· 13
DiffServ model ······················································································································································· 13
QoS techniques overview ············································································································································· 14
Deploying QoS in a network ······························································································································· 14
QoS processing flow in a device ························································································································ 14
Configuring a QoS policy ········································································································································· 16
Non-MQC approach ····················································································································································· 16
MQC approach ····························································································································································· 16
Configuration procedure diagram ······························································································································· 16
Defining a traffic class ··················································································································································· 17
Configuration guidelines ······································································································································ 17
Configuration procedure ······································································································································ 17
Defining a traffic behavior ············································································································································ 19
Defining a QoS policy ··················································································································································· 19
Applying the QoS policy ··············································································································································· 20
Applying the QoS policy to an interface ············································································································ 20
Applying the QoS policy to a VLAN ··················································································································· 21
Applying the QoS policy globally ······················································································································· 21
Applying the QoS policy to the control plane···································································································· 21