Contents

home

Configuring ACLs
About ACLs
Numbering and naming ACLs
ACL types
Match order
Rule numbering
Fragment filtering with ACLs
Restrictions and guidelines: ACL configuration
ACL tasks at a glance
Configuring a basic ACL
About basic ACLs
Configuring an IPv4 basic ACL
Configuring an IPv6 basic ACL
Configuring an advanced ACL
About advanced ACLs
Configuring an IPv4 advanced ACL
Configuring an IPv6 advanced ACL
Configuring a Layer 2 ACL
Configuring a user-defined ACL
Copying an ACL
Configuring packet filtering with ACLs
About packet filtering with ACLs
Applying an ACL to an interface for packet filtering
Applying an ACL to a list of VLAN interfaces for packet filtering
Applying an ACL to an Ethernet service instance for packet filtering
Configuring the applicable scope of packet filtering on a VLAN interface
Configuring logging and SNMP notifications for packet filtering
Setting the packet filtering default action
Enabling hardware-count for the packet filtering default action on an interface
Enabling hardware-count for the packet filtering default action on an Ethernet service instance
Display and maintenance commands for ACL
ACL configuration examples
Example: Configuring interface-based packet filter
QoS overview
QoS service models
Best-effort service model
IntServ model
DiffServ model
QoS techniques in a network
QoS processing flow in a device
QoS configuration approaches
Configuring a QoS policy
About QoS policies
QoS policy tasks at a glance
Defining a traffic class
Defining a traffic behavior
Defining a QoS policy
Applying the QoS policy
Application destinations
Restrictions and guidelines for applying a QoS policy
Applying the QoS policy to an Ethernet service instance
Applying the QoS policy to an interface
Applying the QoS policy to VLANs
Applying the QoS policy globally
Applying the QoS policy to a control plane
Applying the QoS policy to a user profile
Display and maintenance commands for QoS policies
Configuring priority mapping
About priority mapping
About priorities
Priority maps
Priority mapping configuration methods
Priority mapping process
Priority mapping tasks at a glance
Configuring a priority map
Configuring a port to trust packet priority for priority mapping
Changing the port priority of an interface
Display and maintenance commands for priority mapping
Priority mapping configuration examples
Example: Configuring a priority trust mode
Example: Configuring priority mapping tables and priority marking
Configuring traffic policing, GTS, and rate limit
About traffic policing, GTS, and rate limit
Traffic evaluation and token buckets
Traffic policing
GTS
Rate limit
Restrictions and guidelines: Traffic policing, GTS, and rate limit configuration
Configuring traffic policing
Configuring GTS
Configuring the rate limit
Display and maintenance commands for traffic policing, GTS, and rate limit
Traffic policing, GTS, and rate limit configuration examples
Example: Configuring traffic policing and GTS
Configuring congestion management
About congestion management
Cause, negative results, and countermeasure of congestion
Congestion management methods
Congestion management tasks at a glance
Configuring queuing on an interface
Restrictions and guidelines for queuing configuration
Configuring SP queuing
Configuring WRR queuing
Configuring WFQ queuing
Configuring SP+WRR queuing
Configuring SP+WFQ queuing
Configuring a queue scheduling profile
About queue scheduling profiles
Restrictions and guidelines for queue scheduling profile configuration
Configuring a queue scheduling profile
Applying a queue scheduling profile
Example: Configuring a queue scheduling profile
Display and maintenance commands for congestion management
Configuring congestion avoidance
About congestion avoidance
Tail drop
RED and WRED
Relationship between WRED and queuing mechanisms
ECN
WRED parameters
Configuring and applying a queue-based WRED table
Restrictions and guidelines
Procedure
Example: Configuring and applying a queue-based WRED table
Display and maintenance commands for WRED
Configuring traffic filtering
About traffic filtering
Restrictions and guidelines: Traffic filtering configuration
Procedure
Traffic filtering configuration examples
Example: Configuring traffic filtering
Configuring priority marking
About priority marking
Configuring priority marking
Priority marking configuration examples
Example: Configuring priority marking
Configuring nesting
About nesting
Restrictions and guidelines: Nesting configuration
Procedure
Nesting configuration examples
Example: Configuring nesting
Configuring traffic redirecting
About traffic redirecting
Restrictions and guidelines: Traffic redirecting configuration
Procedure
Traffic redirecting configuration examples
Example: Configuring traffic redirecting
Configuring global CAR
About global CAR
Aggregate CAR
Hierarchical CAR
Restrictions and guidelines: Global CAR configuration
Configuring aggregate CAR
Display and maintenance commands for global CAR
Configuring class-based accounting
About class-based accounting
Restrictions and guidelines: Class-based accounting configuration
Procedure
Class-based accounting configuration examples
Example: Configuring class-based accounting
Configuring QPPB
About QPPB
Application scenarios
QPPB fundamentals
QPPB tasks at a glance
Configuring the route sender
Configuring basic BGP functions
Creating a routing policy
Configuring the route receiver
Configuring basic BGP functions
Configuring a routing policy
Applying a QoS policy to the route receiving interface
QPPB configuration examples
Example: Configuring QPPB in an IPv4 network
Example: Configuring QPPB in an MPLS L3VPN
Appendixes
Appendix A Acronyms
Appendix B Default priority maps
Appendix C Introduction to packet precedence
IP precedence and DSCP values
802.1p priority
EXP values
Configuring data buffers
About data buffers
Data buffer types
Cell resources and packet resources
Fixed area and shared area
Restrictions and guidelines: Data buffer configuration
Data buffer tasks at a glance
Enabling the Burst feature
Configuring data buffers manually
Configuring data buffer monitoring
Configuring FlexFabric Network Analytics
Display and maintenance commands for data buffers
Configuring time ranges
About time ranges
Restrictions and guidelines: Time range configuration
Procedure
Display and maintenance commands for time ranges
Time range configuration examples
Example: Configuring a time range
Document conventions and icons
Conventions
Network topology icons
Support and other resources
Accessing Hewlett Packard Enterprise Support
Accessing updates
Websites
Customer self repair
Remote support
Documentation feedback