Allied Telesis AT-S63 User Manual

Page 7

Advertising
background image

AT-S63 Management Software Menus Interface User’s Guide

7

Mapping CoS Priorities to Egress Queues ..................................................................................................... 322
Configuring Egress Scheduling ...................................................................................................................... 323
Displaying Port CoS Priorities ........................................................................................................................ 325

Chapter 16: Quality of Service ................................................................................................................... 327
Quality of Service Overview ........................................................................................................................... 328

Classifiers................................................................................................................................................. 329
Flow Groups............................................................................................................................................. 330
Traffic Classes ......................................................................................................................................... 330
Policies..................................................................................................................................................... 330
QoS Policy Guidelines ............................................................................................................................. 331
Packet Processing ................................................................................................................................... 332
Bandwidth Allocation................................................................................................................................ 332
Packet Prioritization ................................................................................................................................. 332
Replacing Priorities .................................................................................................................................. 333
VLAN Tag User Priorities ......................................................................................................................... 333
DSCP Values ........................................................................................................................................... 333
DiffServ Domains ..................................................................................................................................... 333
Examples ................................................................................................................................................. 335

Managing Flow Groups .................................................................................................................................. 343

Creating a Flow Group ............................................................................................................................. 343
Modifying a Flow Group ........................................................................................................................... 346
Deleting a Flow Group ............................................................................................................................. 347
Displaying Flow Groups ........................................................................................................................... 349

Managing Traffic Classes ............................................................................................................................... 352

Creating a Traffic Class............................................................................................................................ 352
Modifying a Traffic Class.......................................................................................................................... 356
Deleting a Traffic Class ............................................................................................................................ 358
Displaying Traffic Classes........................................................................................................................ 359

Managing Policies .......................................................................................................................................... 362

Creating a Policy ...................................................................................................................................... 362
Modifying a Policy .................................................................................................................................... 365
Deleting a Policy ...................................................................................................................................... 366
Displaying Policies ................................................................................................................................... 367

Chapter 17: Denial of Service Defense ...................................................................................................... 371
Denial of Service Overview ............................................................................................................................ 372

SYN Flood Attack..................................................................................................................................... 372
Smurf Attack............................................................................................................................................. 373
Land Attack .............................................................................................................................................. 373
Teardrop Attack........................................................................................................................................ 375
Ping of Death Attack ................................................................................................................................ 375
IP Options Attack ..................................................................................................................................... 376
Mirroring Traffic ........................................................................................................................................ 376
Denial of Service Defense Guidelines...................................................................................................... 377

Configuring Denial of Service Defense........................................................................................................... 378

Advertising