Allied Telesis AT-S63 User Manual

Page 7

Advertising
background image

AT-S63 Management Software Menus Interface User’s Guide

7

Mapping CoS Priorities to Egress Queues ..................................................................................................... 330
Configuring Egress Scheduling ...................................................................................................................... 332
Displaying Port CoS Priorities ........................................................................................................................ 334

Chapter 17: Quality of Service ................................................................................................................... 337
Quality of Service Overview ........................................................................................................................... 338

Classifiers................................................................................................................................................. 339
Flow Groups............................................................................................................................................. 339
Traffic Classes ......................................................................................................................................... 340
Policies..................................................................................................................................................... 340
QoS Policy Guidelines ............................................................................................................................. 340
Packet Processing ................................................................................................................................... 341
Bandwidth Allocation................................................................................................................................ 341
Packet Prioritization ................................................................................................................................. 341
Replacing Priorities .................................................................................................................................. 342
VLAN Tag User Priorities ......................................................................................................................... 342
DSCP Values ........................................................................................................................................... 342
DiffServ Domains ..................................................................................................................................... 343
Examples ................................................................................................................................................. 344

Managing Flow Groups .................................................................................................................................. 352

Creating a Flow Group ............................................................................................................................. 352
Modifying a Flow Group ........................................................................................................................... 355
Deleting a Flow Group ............................................................................................................................. 356
Displaying Flow Groups ........................................................................................................................... 358

Managing Traffic Classes ............................................................................................................................... 361

Creating a Traffic Class............................................................................................................................ 361
Modifying a Traffic Class.......................................................................................................................... 365
Deleting a Traffic Class ............................................................................................................................ 367
Displaying Traffic Classes........................................................................................................................ 368

Managing Policies .......................................................................................................................................... 371

Creating a Policy ...................................................................................................................................... 371
Modifying a Policy .................................................................................................................................... 374
Deleting a Policy ...................................................................................................................................... 375
Displaying Policies ................................................................................................................................... 376

Chapter 18: Denial of Service Defense ...................................................................................................... 379
Denial of Service Overview ............................................................................................................................ 380

SYN Flood Attack..................................................................................................................................... 380
Smurf Attack............................................................................................................................................. 381
Land Attack .............................................................................................................................................. 381
Teardrop Attack........................................................................................................................................ 383
Ping of Death Attack ................................................................................................................................ 383
IP Options Attack ..................................................................................................................................... 384
Denial of Service Defense Guidelines...................................................................................................... 384

Configuring Denial of Service Defense........................................................................................................... 385

Section III: IGMP Snooping, MLD Snooping, and RRP Snooping .................... 389

Chapter 19: IGMP Snooping ....................................................................................................................... 391
IGMP Snooping Overview .............................................................................................................................. 392
Configuring IGMP Snooping........................................................................................................................... 394
Enabling or Disabling IGMP Snooping ........................................................................................................... 397
Displaying a List of Host Nodes...................................................................................................................... 398
Displaying a List of Multicast Routers............................................................................................................. 400

Advertising