10
4.3.9. ACL Limitations ............................................................................................................................................... 139
4.3.10. ACL Configuration Process .............................................................................................................................. 140
4.3.11. Preventing False ACL Matches ........................................................................................................................ 140
4.3.12. IPv6 ACL Qualifies ........................................................................................................................................... 141
4.3.13. ACL Configuration Examples ........................................................................................................................... 141
4.3.13.1. Configuring an IP ACL ................................................................................................................................. 141
4.3.13.2. Configuring a MAC ACL ............................................................................................................................... 143
4.3.13.3. Configuring a Time-based ACL .................................................................................................................... 144
4.4. Control Plane Policing (CoPP) .............................................................................................. 145
4.4.1. CoPP Configuration Examples......................................................................................................................... 146
4.5. Service Prohibit Access ........................................................................................................ 148
4.5.1. Configuring Service Prohibit ........................................................................................................................... 148
5. Configuring Quality of Service ...................................................................... 149
5.1. CoS 149
5.1.1. Trusted and Untrusted Port Modes ................................................................................................................ 149
5.1.2. Traffic Shaping on Egress Traffic .................................................................................................................... 149
5.1.3. Defining Traffic Queues .................................................................................................................................. 149
5.1.3.1. Supported Queue Management Methods .................................................................................................. 150
5.1.3.2. CoS Configuration Example ........................................................................................................................ 150
5.2. DiffServ 152
5.2.1. DiffServ Functionality and Switch Roles.......................................................................................................... 153
5.2.2. Elements of DiffServ Configuration ................................................................................................................ 153
5.2.3. Configuration DiffServ to Provide Subnets Equal Access to External Network ............................................... 153
6. Configuring Switch Management Features ................................................... 156
6.1. Managing Images and Files .................................................................................................. 156
6.1.1. Supported File Management Methods ........................................................................................................... 156
6.1.2. Uploading and Downloading Files .................................................................................................................. 157
6.1.3. Managing Switch Software (Images) ............................................................................................................. 157
6.1.4. Managing Configuration Files ........................................................................................................................ 157
6.1.4.1. Editing and Downloading Configuration Files ............................................................................................ 158
6.1.4.2. Creating and Applying Configuration Scripts .............................................................................................. 158
6.1.4.3. Non-Disruptive Configuration Management .............................................................................................. 159
6.1.5. Saving the Running Configuration .................................................................................................................. 159
6.1.6. File and Image Management Configuration Examples .................................................................................. 159
6.1.7. Upgrading the Firmware ................................................................................................................................ 159
6.1.7.1. Managing Configuration Scripts ................................................................................................................. 162