User's Manual
19
46.1
QOS OVERVIEW ............................................................................................................................... 343
46.1.1 QoS Concept ........................................................................................................................ 343
46.1.2 Terminal-To-Terminal QoS Model ......................................................................................... 343
46.1.3 Queue Algorithm of QoS ...................................................................................................... 345
46.1.4 Weighted Random Early Detection ...................................................................................... 349
46.2 QOS CONFIGURATION TASK LIST ...................................................................................................... 351
46.3 QOS CONFIGURATION TASKS ............................................................................................................ 352
46.3.1 Setting the Global CoS Priority Queue ................................................................................ 352
46.3.2 Setting Global Cos to Local Priority Mapping ...................................................................... 352
46.3.3 Setting the Bandwidth of the CoS Priority Queue ................................................................ 353
46.3.4 Setting the Schedule Policy of the CoS Priority Queue ....................................................... 353
46.3.5 Configuring the Minimum and Maximum Bandwidths of CoS Priority Queue ..................... 354
46.3.6 Setting the Default CoS Value of a Port ............................................................................... 354
46.3.7 Setting the CoS Priority Queue of a Port ............................................................................. 354
46.3.8 Setting Cos Priority Queue Based on dscp.......................................................................... 355
46.3.9 Setting QoS Policy Mapping ................................................................................................ 355
46.3.10 Setting the Description of the QoS Policy Mapping ........................................................... 356
46.3.11 Setting the Matchup Data Flow of the QoS Policy Mapping .............................................. 356
46.3.12 Setting the Actions of the Match-up Data Flow of the QoS Policy Mapping ...................... 357
46.3.13 Applying the QoS Policy on a Port ..................................................................................... 358
46.3.14 Configuring the Trust Mode ................................................................................................ 359
46.3.15 Displaying the QoS Policy Mapping Table ......................................................................... 359
46.4 QOS CONFIGURATION EXAMPLE ....................................................................................................... 360
46.4.1 Example for Applying the QoS Policy on a Port ................................................................... 360
46.5 DOS ATTACK OVERVIEW ................................................................................................................... 360
CHAPTER 47 DOS ATTACK PREVENTION CONFIGURATION .................................... 361
47.1 CONCEPT OF DOS ATTACK ............................................................................................................... 361
47.2 DOS ATTACK TYPE ........................................................................................................................... 361
47.3 DOS ATTACK PREVENTION CONFIGURATION TASK LIST ..................................................................... 365
47.4 DOS ATTACK PREVENTION CONFIGURATION TASKS ........................................................................... 365
47.4.1 Configuring Global DoS Attack Prevention .......................................................................... 365
47.4.2 Displaying All DoS Attack Prevention Configurations .......................................................... 366
47.5 DOS ATTACK PREVENTION CONFIGURATION EXAMPLE ....................................................................... 366
CHAPTER 48 ATTACK PREVENTION INTRODUCTION ............................................... 367
48.1 OVERVIEW OF FILTER ........................................................................................................................ 367
48.2 THE MODE OF FILTER ........................................................................................................................ 367
CHAPTER 49 ATTACK PREVENTION CONFIGURATION ............................................ 368
49.1 ATTACK PREVENTION CONFIGURATION TASKS ................................................................................... 368