7.2.3ConguringtheTrafcProle....................................................................7-7
7.3ONUInterfaceQoSConguration.......................................................................7-8
7.3.1ConguringtheTrustPrecedence.............................................................7-8
7.3.2ConguringtheDefaultCoS......................................................................
7-9
7.3.3ConguringCoSRemarking......................................................................7-9
7.3.4ConguringDSCPtoCoSRemarking......................................................
7-10
7.3.5ConguringtheDefaultEgressCoS........................................................7-10
7.3.6ConguringEgressCoSRemarking.........................................................
7-11
7.3.7ConguringEgressDSCPtoCoSRemarking...........................................
7-11
7.3.8ConguringCoSFiltering........................................................................
7-12
7.3.9ConguringQueueScheduling................................................................7-12
7.3.10ConguringQueueMapping..................................................................
7-13
7.3.11ConguringtheTrafcProle.................................................................7-14
Chapter8ACLConguration....................................................................8-1
8.1ConguringaStandardACL...............................................................................8-2
8.2ConguringanExtendedACL.............................................................................
8-3
8.3ConguringaLayer-2ACL..................................................................................
8-4
8.4ConguringaHybridACL...................................................................................
8-6
8.5ConguringanIPv6HybridACL..........................................................................8-7
Chapter9NTPConguration....................................................................9-1
9.1ConguringNTP................................................................................................9-1
Chapter10STPConguration................................................................10-1
10.1ConguringSTP.............................................................................................
10-1
Chapter11DHCPConguration.............................................................11-1
11.1ConguringDHCPSnooping............................................................................11-1
11.2ConguringDHCPServer................................................................................11-2
11.3ConguringDHCPClient..................................................................................11-4
Chapter12UplinkProtectionConguration..........................................
12-1
12.1ConguringLinkAggregation..........................................................................12-1
12.2ConguringUAPS..........................................................................................12-5
12.3ConguringCTLA1+1Protection....................................................................12-6
Chapter13PONProtectionConguration.............................................13-1
13.1ConguringPONPortProtection.....................................................................13-1
Chapter14AccessSecurityConguration............................................14-1
14.1PortIdenticationConguration.......................................................................14-1
14.1.1ConguringthePortIdentication..........................................................
14-1
III
SJ-20130520164529-007|2013-06-30(R1.0)ZTEProprietaryandCondential