Operator`s manual

Table Of Contents
Index-4 Riverstone Networks RS 8000/8600 Switch Router Getting Started Guide
Q
QoS  
application flows  
layer-3  
layer-4  
prioritization  
source-destination flows  
strict priority queuing  
ToS octet rewrites  
traffic control queues  
traffic control queuing  
weighted fair queuing   
weighted random early detection  
Quad Serial - C/CE line card, overview
Quality of Service 
R
RADIUS 
redundancy  
redundant 
redundant CMs  
Redundant Control Module
booting from network  
redundant Control Modules
backup CM 
primary CM  
redundant control modules 
Redundant CPUs  
reset switch 
RIP  
v1   
v2   
Riverstone Technical Assistance Center $
RMON 
RMON v2 
routing   
IP 
IPX 
L3 lookup tables  
routing protocols , 
RS 8000/8600
bridging and VLAN protocols 
default name 
routing protocols 
security 
RST switch  
RTAC  $
(408) 844-0010 $ 
support@riverstonenet.com$  
www.riverstonenet.com/support $
S
SAP
save active  , 
save startup  
saving active configuration to startup  
saving configuration changes  
scratchpad 
secondary IP addresses 
Secure Session Shells  
security 
application ACLs 
applying ACLs to SNMP 
destination ACLs   
destination filters  
flow ACLs 
flow filters 
RADIUS  
source ACLs  
source filters
SSH 
TACACS
TACACS+   
Serial - C/CE line card, overview 
serial port
session persistence
set autoboot bootp 
set command  , , 
setting basic system information 
setting boot source  
setting date and time 
setting jumpers 
setting passwords
setting system contact  
setting system location  
setting system name  
setting trap target 
setting up SNMP 
shield grounding
skipconfig 
SNMP 
applying ACLs
community string 
disabling authentication traps  