CANOGA PERKINS CanogaOS Configuration Guide User Manual

Page 14

Advertising
background image

CanogaOS Configuration Guide

Proprietary & Confidential Canoga Perkins Metro Ethernet Switches

Page 14 of 350

31.2.3 Verify

QoS

Information .................................................................................. 281

Class Maps information ................................................................................................................ 281

Aggregate Policer information ...................................................................................................... 281

Policy-Map information ................................................................................................................ 281

QoS interface information............................................................................................................. 282

QoS map information .................................................................................................................... 283

32 Configuring

ACL ................................................................................................................. 289

32.1 ACL............................................................................................................................... 289

32.1.1 Terminology .................................................................................................... 289

32.2 Configuration ................................................................................................................ 289

Configurations............................................................................................................................... 290

32.2.1 Validation

Commands..................................................................................... 291

33

Configuring Port Security .................................................................................................... 292

33.1

Configuring port security .............................................................................................. 292

33.1.1 Configurations................................................................................................. 292
33.1.2 Validation

Commands..................................................................................... 293

34

Configuring Storm Control .................................................................................................. 294

34.1 Terminology .................................................................................................................. 294
34.2

Configuring Bandwidth Percentage Storm control ....................................................... 294

34.2.1 Topology ......................................................................................................... 294
34.2.2 Configurations................................................................................................. 294
34.2.3 Validation

Commands..................................................................................... 294

34.3

Configuring Packets per second Storm control............................................................. 295

34.3.1 Topology ......................................................................................................... 295
34.3.2 Configurations................................................................................................. 295
34.3.3 Validation

Commands..................................................................................... 295

35 Configuring

DHCP............................................................................................................... 296

35.1 DHCP

Relay

Configuration .......................................................................................... 296

35.1.1 References ....................................................................................................... 296
35.1.2 Terminology .................................................................................................... 296
35.1.3 Topology ......................................................................................................... 297
35.1.4 Configurations................................................................................................. 297
35.1.5 Validation

Commands..................................................................................... 298

35.2 DHCP

Snooping

Configuration .................................................................................... 299

35.2.1 Topology ......................................................................................................... 299

Advertising