Switch User Manual

Contents
6
Replacing Priorities .........................................................................................................................................176
VLAN Tag User Priorities................................................................................................................................176
DSCP Values ..................................................................................................................................................176
DiffServ Domains ............................................................................................................................................177
Examples ........................................................................................................................................................179
Voice Applications ....................................................................................................................................179
Video Applications....................................................................................................................................181
Critical Database ......................................................................................................................................183
Policy Component Hierarchy ....................................................................................................................184
Chapter 16: Group Link Control .................................................................................................................187
Supported Platforms .......................................................................................................................................188
Overview .........................................................................................................................................................189
Guidelines .......................................................................................................................................................197
Configuring the Feature ..................................................................................................................................198
Chapter 17: Denial of Service Defenses ....................................................................................................201
Supported Platforms .......................................................................................................................................202
Overview .........................................................................................................................................................203
SYN Flood Attack............................................................................................................................................204
Smurf Attack ...................................................................................................................................................205
Land Attack .....................................................................................................................................................206
Teardrop Attack ..............................................................................................................................................208
Ping of Death Attack .......................................................................................................................................209
IP Options Attack ............................................................................................................................................210
Mirroring Traffic...............................................................................................................................................211
Denial of Service Defense Guidelines ............................................................................................................212
Chapter 18: Power Over Ethernet ...............................................................................................................213
Supported Platforms .......................................................................................................................................214
Overview .........................................................................................................................................................215
Power Budgeting.............................................................................................................................................216
Port Prioritization.............................................................................................................................................217
PoE Device Classes .......................................................................................................................................218
Section III: Snooping Protocols ..............................................................................219
Chapter 19: Internet Group Management Protocol Snooping .................................................................221
Supported Platforms .......................................................................................................................................222
Overview .........................................................................................................................................................223
Chapter 20: Internet Group Management Protocol Snooping Querier ...................................................225
Supported Platforms .......................................................................................................................................226
Overview .........................................................................................................................................................227
Guidelines .......................................................................................................................................................230
Configuring the Feature ..................................................................................................................................231
Chapter 21: Multicast Listener Discovery Snooping ................................................................................235
Supported Platforms .......................................................................................................................................236
Overview .........................................................................................................................................................237
Chapter 22: Router Redundancy Protocol Snooping ...............................................................................239
Supported Platforms .......................................................................................................................................240
Overview .........................................................................................................................................................241
Guidelines .......................................................................................................................................................242