Avaya Configuring Traffic Filters and Protocol Prioritization Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Software Avaya Configuring Traffic Filters and Protocol Prioritization. Avaya Configuring Traffic Filters and Protocol Prioritization User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 184
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Protocol Prioritization

BayRS Version 14.00Part No. 308645-14.00 Rev 00September 19994401 Great America ParkwaySanta Clara, CA 95054Configuring Traffic Filters and Protocol

Strany 2 - Statement of Conditions

x308645-14.00 Rev 00Appendix ASite Manager Protocol Prioritization ParametersPriority Interface Parameter Descriptions ...

Strany 3

Configuring Traffic Filters and Protocol Prioritization6-12308645-14.00 Rev 00To add predefined criteria, ranges, and actions, or delete any criterion

Strany 4

Applying Inbound Traffic Filters308645-14.00 Rev 006-13 Figure 6-6. Edit Filters Window

Strany 5 - Contents

Configuring Traffic Filters and Protocol Prioritization6-14308645-14.00 Rev 00Table 6-2. Using the Edit Filters Window Task Site Manager Procedure N

Strany 6

Applying Inbound Traffic Filters308645-14.00 Rev 006-15 Enabling or Disabling an Inbound Traffic FilterThere may be times when you want to turn off a

Strany 7

Configuring Traffic Filters and Protocol Prioritization6-16308645-14.00 Rev 00Deleting an Inbound Traffic FilterDeleting an inbound traffic filter per

Strany 8

Applying Inbound Traffic Filters308645-14.00 Rev 006-17 Specifying User-Defined CriteriaThe Edit Filters window and Edit Template window provide a Use

Strany 9

Configuring Traffic Filters and Protocol Prioritization6-18308645-14.00 Rev 00Figure 6-7. Add User-Defined Field WindowChanging Inbound Traffic Filter

Strany 10 - 308645-14.00 Rev 00

Applying Inbound Traffic Filters308645-14.00 Rev 006-19 Figure 6-8. Filters Window Showing Filter PrecedenceTo change the order of precedence for inbo

Strany 11

Configuring Traffic Filters and Protocol Prioritization6-20308645-14.00 Rev 00Figure 6-9. Change Precedence WindowFigure 6-10. Filters Window Showing

Strany 12

308645-14.00 Rev 007-1 Chapter 7Applying Outbound Traffic FiltersThis chapter describes how to use the Configuration Manager to configure outbound tra

Strany 13

308645-14.00 Rev 00xiFiguresFigure 2-1. Protocol Prioritization Dequeuing ...2-3Figure 2-2.

Strany 14

Configuring Traffic Filters and Protocol Prioritization7-2308645-14.00 Rev 00Displaying the Priority/Outbound Filters WindowYou must complete the foll

Strany 15 - Before You Begin

Applying Outbound Traffic Filters308645-14.00 Rev 007-3 Figure 7-1. Displaying the Priority/Outbound Filters WindowFigure 7-2. Priority/Outbound Filte

Strany 16 - Text Conventions

Configuring Traffic Filters and Protocol Prioritization7-4308645-14.00 Rev 00Preparing Outbound Traffic Filter TemplatesTo add an outbound traffic fil

Strany 17 - Acronyms

Applying Outbound Traffic Filters308645-14.00 Rev 007-5 5. Choose Criteria > Add > Datalink | IP > criterion.To configure filters for IP-rout

Strany 18

Configuring Traffic Filters and Protocol Prioritization7-6308645-14.00 Rev 00Figure 7-3. Filter Template Management WindowFigure 7-4. Create Priority/

Strany 19

Applying Outbound Traffic Filters308645-14.00 Rev 007-7 Specifying Prioritization LengthWhen you select the Length action in the Create Priority/Outbo

Strany 20 - How to Get Help

Configuring Traffic Filters and Protocol Prioritization7-8308645-14.00 Rev 004. Select High, Low, or Normal as the queue in which a packet is placed i

Strany 21 - Using Traffic Filters

Applying Outbound Traffic Filters308645-14.00 Rev 007-9 Customizing TemplatesThere are two ways to customize a filter template:• Copy an existing temp

Strany 22 - Inbound Traffic Filters

Configuring Traffic Filters and Protocol Prioritization7-10308645-14.00 Rev 00Editing a TemplateAfter you create or copy a template, edit it as follow

Strany 23 - Outbound Traffic Filters

Applying Outbound Traffic Filters308645-14.00 Rev 007-11 Figure 7-6. Edit Priority/Outbound Template Window

Strany 24 - Filtering Strategies

xii308645-14.00 Rev 00Figure 7-7. Create Filter Window ...7-14Figure 7-8.

Strany 25 - Build a Firewall

Configuring Traffic Filters and Protocol Prioritization7-12308645-14.00 Rev 00Table 7-1. Using the Edit Priority/Outbound Template Window Task Site

Strany 26 - Traffic Filter Components

Applying Outbound Traffic Filters308645-14.00 Rev 007-13 Creating an Outbound Traffic FilterYou create an outbound traffic filter by applying a filter

Strany 27

Configuring Traffic Filters and Protocol Prioritization7-14308645-14.00 Rev 00Figure 7-7. Create Filter WindowEditing an Outbound Traffic Filter After

Strany 28 - Predefined Criteria

Applying Outbound Traffic Filters308645-14.00 Rev 007-15 To add predefined criteria, ranges, and actions, or delete any criterion, range, or action:Si

Strany 29

Configuring Traffic Filters and Protocol Prioritization7-16308645-14.00 Rev 00Figure 7-8. Edit Priority/Outbound Filters Window

Strany 30 - User-Defined Criteria

Applying Outbound Traffic Filters308645-14.00 Rev 007-17 Table 7-2. Using the Edit Priority/Outbound Filters Window Task Site Manager Procedure Note

Strany 31

Configuring Traffic Filters and Protocol Prioritization7-18308645-14.00 Rev 00Enabling or Disabling an Outbound Traffic Filter There may be times when

Strany 32

Applying Outbound Traffic Filters308645-14.00 Rev 007-19 Deleting an Outbound Traffic FilterDeleting an outbound traffic filter permanently removes th

Strany 33 - Using Filter Templates

Configuring Traffic Filters and Protocol Prioritization7-20308645-14.00 Rev 00Specifying User-Defined CriteriaThe Edit Priority/Outbound Filters windo

Strany 34

Applying Outbound Traffic Filters308645-14.00 Rev 007-21 Figure 7-9. Add User-Defined Field WindowChanging Outbound Traffic Filter Precedence You can

Strany 35 - Chapter 2

308645-14.00 Rev 00xiiiTablesTable 1-1. Predefined Inbound Traffic Filter Criteria ...1-8Table 1-2. Pre

Strany 36 - Priority Queuing

Configuring Traffic Filters and Protocol Prioritization7-22308645-14.00 Rev 00Figure 7-10. Priority/Outbound Filters Window Showing Filter PrecedenceT

Strany 37 - The Dequeuing Process

Applying Outbound Traffic Filters308645-14.00 Rev 007-23 Figure 7-11. Change Precedence WindowFigure 7-12. Priority/Outbound Filters Window Showing Ne

Strany 39

308645-14.00 Rev 008-1 Chapter 8Configuring IP InboundTraffic Filters Using the BCCThis chapter describes how to use the Bay Command Console (BCC™) to

Strany 40

Configuring Traffic Filters and Protocol Prioritization8-2308645-14.00 Rev 00IP Inbound Traffic Filter Concepts and TerminologyThis section covers the

Strany 41

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-3 IP Inbound Traffic FiltersInbound traffic filters act on packets arriving a

Strany 42

Configuring Traffic Filters and Protocol Prioritization8-4308645-14.00 Rev 00Traffic filter templates and traffic filters contain the following compon

Strany 43

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-5 You cannot specify a precedence value greater than the maximum allowable nu

Strany 44

Configuring Traffic Filters and Protocol Prioritization8-6308645-14.00 Rev 00For every packet that matches the filter criteria, the router sends an en

Strany 45 - Tuning Concepts

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-7 Creating an IP Traffic Filter TemplateYou create an IP traffic filter templ

Strany 46

xiv308645-14.00 Rev 00Table 5-8. Ethernet Type Codes ...5-7Table 5-9. IP

Strany 47 - Reconfiguring Queue Size

Configuring Traffic Filters and Protocol Prioritization8-8308645-14.00 Rev 00Creating an IP Inbound Traffic FilterTo create an IP inbound traffic filt

Strany 48 - Examples

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-9 Example - Creating a Traffic Filter Without Using a TemplateThis example cr

Strany 49

Configuring Traffic Filters and Protocol Prioritization8-10308645-14.00 Rev 00Specifying Source and Destination Networks As Match CriteriaTo filter on

Strany 50

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-11 When you specify one of these values, the BCC automatically assigns the as

Strany 51 - Chapter 3

Configuring Traffic Filters and Protocol Prioritization8-12308645-14.00 Rev 00range_of_ports is a space-delimited list.Table 8-2 lists some common TCP

Strany 52 - IEEE 802.2 LLC Header

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-13 Example - Destination TCP PortThis example specifies destination TCP ports

Strany 53 - header

Configuring Traffic Filters and Protocol Prioritization8-14308645-14.00 Rev 00If you specify a protocol other than TCP or UDP, the software prevents y

Strany 54 - Transparent Bridge Actions

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-15 Specifying the Type of Service (ToS) As Match CriteriaYou can discriminate

Strany 55 - Predefined SRB Criteria

Configuring Traffic Filters and Protocol Prioritization8-16308645-14.00 Rev 00Specifying User-Defined CriteriaYou can specify user-defined criteria in

Strany 56 - SRB Actions

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-17 .Table 8-5. Actions and Dependencies for Inbound IP Traffic FiltersAction

Strany 57 - DECnet Actions

308645-14.00 Rev 00xv PrefaceThis guide describes how to configure traffic filters and prioritize traffic on a Nortel Networks™ router.You can use Sit

Strany 58 - DLSw Criteria and Actions

Configuring Traffic Filters and Protocol Prioritization8-18308645-14.00 Rev 00ExampleThis example creates an IP inbound filter template that forwards

Strany 59 - IP Criteria and Actions

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-19 back backbackSpecifying the Log ActionFor every incoming packet that

Strany 60 - IP Actions

Configuring Traffic Filters and Protocol Prioritization8-20308645-14.00 Rev 00ExampleThe following command creates an entry that contains detailed tra

Strany 61 - IPX Criteria and Actions

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-21 box# ipip# filter-template fwd-next-infilter-template/fwd-next-in# matchma

Strany 62 - LLC2 Criteria and Actions

Configuring Traffic Filters and Protocol Prioritization8-22308645-14.00 Rev 00Creating a Traffic Filter Without Using a Filter TemplateThis example de

Strany 63 - OSI Criteria and Actions

308645-14.00 Rev 00A-1 Appendix ASite Manager Protocol Prioritization ParametersThis appendix contains reference information for the Site Manager prot

Strany 64 - VINES Criteria and Actions

Configuring Traffic Filters and Protocol PrioritizationA-2308645-14.00 Rev 00Priority Interface Parameter DescriptionsUse the following descriptions a

Strany 65 - XNS Criteria and Actions

Site Manager Protocol Prioritization Parameters308645-14.00 Rev 00A-3 Parameter: Normal Queue SizePath: Configuration Manager > interface connector

Strany 66 - XNS Actions

Configuring Traffic Filters and Protocol PrioritizationA-4308645-14.00 Rev 00Parameter: High Water Packets ClearPath: Configuration Manager > inter

Strany 67 - Chapter 4

Site Manager Protocol Prioritization Parameters308645-14.00 Rev 00A-5 Parameter: High Queue Percent BandwidthPath: Configuration Manager > interfac

Strany 68 - Selecting Predefined Criteria

Configuring Traffic Filters and Protocol Prioritizationxvi308645-14.00 Rev 00Text ConventionsThis guide uses the following text conventions:angle brac

Strany 69 - Traffic Filters

Configuring Traffic Filters and Protocol PrioritizationA-6308645-14.00 Rev 00Parameter: Low Queue Percent BandwidthPath: Configuration Manager > in

Strany 70

Site Manager Protocol Prioritization Parameters308645-14.00 Rev 00A-7 Prioritization Length ParametersUse the following descriptions as guidelines whe

Strany 71 - Predefined IP Criteria

Configuring Traffic Filters and Protocol PrioritizationA-8308645-14.00 Rev 00Parameter: Less Than or Equal QueuePath: Configuration Manager > inter

Strany 72

308645-14.00 Rev 00B-1 Appendix BExamples and Implementation NotesThis appendix contains examples, hints, reminders, and important notes you may find

Strany 73 - Data Link Reference Points

Configuring Traffic Filters and Protocol PrioritizationB-2308645-14.00 Rev 00To create an inbound IP traffic filter that prevents access to a network

Strany 74

Examples and Implementation Notes308645-14.00 Rev 00B-3 Inbound Traffic Filter ExamplesThis section summarizes the steps for creating an inbound traff

Strany 75 - IP Reference Points

Configuring Traffic Filters and Protocol PrioritizationB-4308645-14.00 Rev 00Chapter 6 provides detailed procedures for creating inbound traffic filte

Strany 76 - Selecting Actions

Examples and Implementation Notes308645-14.00 Rev 00B-5 Table B-1 lists sample predefined criteria, ranges, and actions for some common filtering goal

Strany 77 - Dial Service Actions

Configuring Traffic Filters and Protocol PrioritizationB-6308645-14.00 Rev 00Table B-2 lists sample user-defined criteria, ranges, and actions for som

Strany 78

Examples and Implementation Notes308645-14.00 Rev 00B-7 Protocol Prioritization ExamplesThis section summarizes the steps and provides examples (Table

Strany 79 - Chapter 5

Preface308645-14.00 Rev 00xvii Acronymsitalic text Indicates file and directory names, new terms, book titles, and variables in command syntax descrip

Strany 80 - Specifying MAC Address Ranges

Configuring Traffic Filters and Protocol PrioritizationB-8308645-14.00 Rev 009. Type a minimum and maximum value to specify the range, then click on O

Strany 81 - SRB Functional MAC Addresses

Examples and Implementation Notes308645-14.00 Rev 00B-9 Table B-3 provides some examples of using outbound traffic filters for protocol prioritization

Strany 82 - Table 5-3. SAP Codes

Configuring Traffic Filters and Protocol PrioritizationB-10308645-14.00 Rev 00Place RIP traffic in the Low queueCriteria > Add > IP > IP >

Strany 83 - Table 5-5. PPP Protocol IDs

Examples and Implementation Notes308645-14.00 Rev 00B-11 Implementation NotesThis section contains notes about the following:• Filtering Outbound Fram

Strany 84 - Table 5-7

Configuring Traffic Filters and Protocol PrioritizationB-12308645-14.00 Rev 00Using a Drop-All Filter As a FirewallIf your filtering strategy involves

Strany 85

Examples and Implementation Notes308645-14.00 Rev 00B-13 Using Outbound Traffic Filters for LAN ProtocolsIn certain configurations, implementing outbo

Strany 87

308645-14.00 Rev 00Index-1AAccept filters, 1-4, B-12actions, traffic filter. See traffic filter actionsaddingactionsinbound, 6-9, 6-14outbound, 7-12,

Strany 88

Index-2308645-14.00 Rev 00IP Source Address, 3-9Protocol, 3-9TCP Destination Port, 3-9TCP Source Port, 3-9Type of Service, 3-9UDP Destination Port, 3-

Strany 89 - Chapter 6

308645-14.00 Rev 00Index-3example, B-9inbound traffic filters, 6-2outbound traffic filters, 2-1prioritization, 2-1Drop If Next Hop Is Unreachable acti

Strany 90

Configuring Traffic Filters and Protocol Prioritizationxviii308645-14.00 Rev 00CSMA/CD carrier sense multiple access/collision detectionDE discard eli

Strany 91

Index-4308645-14.00 Rev 00specifying an Ethernet Type code, 5-9ISDN PRI, filtering actions, 4-11LLAN Network Manager (LNM), 3-12, 5-4LAN protocolsoutb

Strany 92

308645-14.00 Rev 00Index-5dequeuing algorithmsbandwidth allocation, 2-3strict dequeuing, 2-7Discard Eligible Bit Low parameter, A-6Discard Eligible Bi

Strany 93

Index-6308645-14.00 Rev 00Telnet traffic, prioritizing, B-10template.flt Site Manager file, 7-9templates, 1-13templates, inbound traffic filterapplyin

Strany 94

308645-14.00 Rev 00Index-7performance, B-13precedence, 1-5, B-12reordering, 7-21ranges, 1-11strategies, 1-4templates, 1-13traffic forwarding strategy,

Strany 96

Preface308645-14.00 Rev 00xix PPP Point-to-Point Protocol PRI primary rate interfaceRIF routing information fieldRII routing information indicatorRIP

Strany 97

ii308645-14.00 Rev 00 Copyright © 1999 Nortel NetworksAll rights reserved. Printed in the USA. September 1999.The information in this document is subj

Strany 98

Configuring Traffic Filters and Protocol Prioritizationxx308645-14.00 Rev 00Hard-Copy Technical ManualsYou can print selected technical manuals and re

Strany 99

308645-14.00 Rev 001-1 Chapter 1Using Traffic FiltersThis chapter describes concepts and terms to help you understand and plan for traffic filter conf

Strany 100

Configuring Traffic Filters and Protocol Prioritization1-2308645-14.00 Rev 00Nortel Networks routers support two types of traffic filters:• Inbound tr

Strany 101

Using Traffic Filters308645-14.00 Rev 001-3 Chapter 3 provides protocol-specific information for designing inbound traffic filters. Chapter 6 explains

Strany 102

Configuring Traffic Filters and Protocol Prioritization1-4308645-14.00 Rev 00Filtering StrategiesThis section recommends ways you might use traffic fi

Strany 103

Using Traffic Filters308645-14.00 Rev 001-5 You can also improve application response time and prevent session timeouts by implementing protocol prior

Strany 104

Configuring Traffic Filters and Protocol Prioritization1-6308645-14.00 Rev 00Traffic Filter ComponentsThe Configuration Manager creates traffic filter

Strany 105

Using Traffic Filters308645-14.00 Rev 001-7 A traffic filter criterion is defined by a byte length and an offset from common bit patterns (reference p

Strany 106

Configuring Traffic Filters and Protocol Prioritization1-8308645-14.00 Rev 00Predefined CriteriaTable 1-1 summarizes the predefined inbound traffic fi

Strany 107

Using Traffic Filters308645-14.00 Rev 001-9 Table 1-2 summarizes the predefined outbound traffic filter criteria for data link and IP headers.LLC2 MA

Strany 108

308645-14.00 Rev 00iiiNortel Networks NA Inc. Software License AgreementNOTICE: Please carefully read this license agreement before copying or using t

Strany 109 - Chapter 7

Configuring Traffic Filters and Protocol Prioritization1-10308645-14.00 Rev 00User-Defined CriteriaTo apply customized criteria that use fields that a

Strany 110

Using Traffic Filters308645-14.00 Rev 001-11 RangesFor each traffic filter criterion, you also specify the valid range, a series of target values that

Strany 111

Configuring Traffic Filters and Protocol Prioritization1-12308645-14.00 Rev 00 Table 1-3 lists additional protocol-specific actions for inbound traffi

Strany 112 - Creating a Template

Using Traffic Filters308645-14.00 Rev 001-13 Except for the log actions, inbound and outbound traffic filter actions are mutually exclusive; you can o

Strany 113 - (continued)

Configuring Traffic Filters and Protocol Prioritization1-14308645-14.00 Rev 00Summary of Traffic Filter SupportTable 1-5 summarizes the inbound and ou

Strany 114

308645-14.00 Rev 002-1 Chapter 2Using Protocol Prioritization QueuesThis chapter describes the priority queues that you can implement using outbound t

Strany 115 - (continued)

Configuring Traffic Filters and Protocol Prioritization2-2308645-14.00 Rev 00While the router is operating, network traffic from various sources conve

Strany 116

Using Protocol Prioritization Queues308645-14.00 Rev 002-3 The Dequeuing ProcessAfter queuing packets, the router empties the priority queues by sendi

Strany 117 - Customizing Templates

Configuring Traffic Filters and Protocol Prioritization2-4308645-14.00 Rev 00Bandwidth Allocation AlgorithmThe bandwidth allocation algorithm uses a c

Strany 118

Using Protocol Prioritization Queues308645-14.00 Rev 002-5 6.The router empties all packets from the Low queue, up to the configured bandwidth percent

Strany 119

iv308645-14.00 Rev 00for the security of its own data and information and for maintaining adequate procedures apart from the Software to reconstruct

Strany 120

Configuring Traffic Filters and Protocol Prioritization2-6308645-14.00 Rev 00Figure 2-2. Bandwidth Allocation AlgorithmScan theHigh queue.Are therepac

Strany 121 - SRB_DSAP_hiQ

Using Protocol Prioritization Queues308645-14.00 Rev 002-7 Strict Dequeuing AlgorithmInstead of the bandwidth allocation algorithm, you can configure

Strany 122

Configuring Traffic Filters and Protocol Prioritization2-8308645-14.00 Rev 00Figure 2-3 illustrates the strict dequeuing algorithm. Figure 2-3. Stric

Strany 123

Using Protocol Prioritization Queues308645-14.00 Rev 002-9 Enabling Protocol PrioritizationYou use the Configuration Manager to configure protocol pri

Strany 124

Configuring Traffic Filters and Protocol Prioritization2-10308645-14.00 Rev 00Enabling Protocol Prioritization on an ATM CircuitYou can now set the pr

Strany 125

Using Protocol Prioritization Queues308645-14.00 Rev 002-11 Tuning Protocol PrioritizationWhen you enable Protocol Priority on a circuit, the router u

Strany 126

Configuring Traffic Filters and Protocol Prioritization2-12308645-14.00 Rev 00To configure the percent of bandwidth for the priority queues, you edit

Strany 127

Using Protocol Prioritization Queues308645-14.00 Rev 002-13 Queue Size ExampleSuppose that you use the default queue size (20 packets) for all three p

Strany 128

Configuring Traffic Filters and Protocol Prioritization2-14308645-14.00 Rev 00Figure 2-5. Reconfigured Priority Queue Statistics for the Queue Size Ex

Strany 129

Using Protocol Prioritization Queues308645-14.00 Rev 002-15 Editing Protocol Prioritization ParametersTo edit protocol prioritization parameters:Site

Strany 130

308645-14.00 Rev 00vContentsPrefaceBefore You Begin ...

Strany 131

Configuring Traffic Filters and Protocol Prioritization2-16308645-14.00 Rev 00Monitoring Protocol Prioritization StatisticsTo monitor and manage proto

Strany 132

308645-14.00 Rev 003-1 Chapter 3Inbound Traffic Filter Criteria and ActionsYou create inbound traffic filters using templates that consist of protocol

Strany 133 - Traffic Filters Using the BCC

Configuring Traffic Filters and Protocol Prioritization3-2308645-14.00 Rev 00Transparent Bridge Criteria and ActionsTransparent bridge traffic filters

Strany 134 - IP Traffic Filter Templates

Inbound Traffic Filter Criteria and Actions308645-14.00 Rev 003-3 Predefined Transparent Bridge CriteriaEach transparent bridge encapsulation method h

Strany 135 - IP Inbound Traffic Filters

Configuring Traffic Filters and Protocol Prioritization3-4308645-14.00 Rev 00User-Defined Transparent Bridge CriteriaYou can create bridge traffic fil

Strany 136 - Filter Precedence

Inbound Traffic Filter Criteria and Actions308645-14.00 Rev 003-5 Source Route Bridging Criteria and ActionsYou filter inbound source route bridging (

Strany 137 - Filter Criteria and Actions

Configuring Traffic Filters and Protocol Prioritization3-6308645-14.00 Rev 00See Chapter 5 for information about specifying SAP and MAC address criter

Strany 138

Inbound Traffic Filter Criteria and Actions308645-14.00 Rev 003-7 DECnet Phase IV Criteria and ActionsYou can filter inbound DECnet Phase IV traffic b

Strany 139 - <name>

Configuring Traffic Filters and Protocol Prioritization3-8308645-14.00 Rev 00DLSw Criteria and ActionsYou can filter inbound DLSw traffic based on spe

Strany 140 - Caution:

Inbound Traffic Filter Criteria and Actions308645-14.00 Rev 003-9 IP Criteria and ActionsYou can filter IP inbound traffic based on specified bit patt

Strany 141 - Templates

vi308645-14.00 Rev 00Chapter 2Using Protocol Prioritization QueuesAbout Protocol Prioritization ...

Strany 142 - Criteria

Configuring Traffic Filters and Protocol Prioritization3-10308645-14.00 Rev 00Table 3-7. User-Defined Criteria for IP Inbound Traffic FiltersWhen spec

Strany 143

Inbound Traffic Filter Criteria and Actions308645-14.00 Rev 003-11 • Forward to First Up Next Hop InterfaceSpecifies that any frame that matches the f

Strany 144 - Example - Source TCP Port

Configuring Traffic Filters and Protocol Prioritization3-12308645-14.00 Rev 00User-Defined IPX CriteriaIn addition to the predefined filter criteria,

Strany 145 - Example - Source UDP Port

Inbound Traffic Filter Criteria and Actions308645-14.00 Rev 003-13 User-Defined LLC2 CriteriaIn addition to the predefined LLC2 criteria, you can crea

Strany 146

Configuring Traffic Filters and Protocol Prioritization3-14308645-14.00 Rev 00User-Defined OSI CriteriaIn addition to the predefined OSI filter criter

Strany 147 - <list_of_values>

Inbound Traffic Filter Criteria and Actions308645-14.00 Rev 003-15 User-Defined VINES CriteriaIn addition to the predefined VINES filter criteria, you

Strany 148

Configuring Traffic Filters and Protocol Prioritization3-16308645-14.00 Rev 00User-Defined XNS CriteriaIn addition to the predefined filter criteria,

Strany 149 - <ip_address>

308645-14.00 Rev 004-1 Chapter 4Outbound Traffic Filter Criteria and ActionsYou create outbound traffic filters using templates that consist of criter

Strany 150

Configuring Traffic Filters and Protocol Prioritization4-2308645-14.00 Rev 00Selecting Predefined CriteriaOutbound traffic filter criteria are based o

Strany 151 - Specifying the Log Action

Outbound Traffic Filter Criteria and Actions308645-14.00 Rev 004-3 Figure 4-1 shows the Configuration Manager menu path for specifying these criteria.

Strany 152 - Configuration Examples

308645-14.00 Rev 00viiIP Criteria and Actions ...3-9P

Strany 153

Configuring Traffic Filters and Protocol Prioritization4-4308645-14.00 Rev 00Figure 4-1. Predefined Data Link Criteria for Outbound Traffic Filters

Strany 154

Outbound Traffic Filter Criteria and Actions308645-14.00 Rev 004-5 Predefined IP CriteriaYou configure outbound traffic filters for routing protocols

Strany 155 - Appendix A

Configuring Traffic Filters and Protocol Prioritization4-6308645-14.00 Rev 00Figure 4-2. Predefined IP Criteria for Outbound Traffic FiltersSpecifying

Strany 156

Outbound Traffic Filter Criteria and Actions308645-14.00 Rev 004-7 To configure criteria for both IP and data link reference points, you create two fi

Strany 157

Configuring Traffic Filters and Protocol Prioritization4-8308645-14.00 Rev 00Figure 4-3. Data Link Reference Points in an SRB Packet Bridged over Bay

Strany 158

Outbound Traffic Filter Criteria and Actions308645-14.00 Rev 004-9 IP Reference PointsTable 4-4 defines the reference points in the IP header from whi

Strany 159

Configuring Traffic Filters and Protocol Prioritization4-10308645-14.00 Rev 00Selecting ActionsFor outbound traffic filters, you can specify different

Strany 160

Outbound Traffic Filter Criteria and Actions308645-14.00 Rev 004-11 Prioritizing ActionsYou can apply the following actions to outbound traffic filter

Strany 161

Configuring Traffic Filters and Protocol Prioritization4-12308645-14.00 Rev 00You can use the dial service actions to configure outbound traffic filte

Strany 162

308645-14.00 Rev 005-1 Chapter 5Specifying Common Criterion RangesFor every inbound or outbound traffic filter criterion, you must specify a valid ran

Strany 163 - Appendix B

viii308645-14.00 Rev 00Prioritizing Actions ...4-11Dia

Strany 164 - TCP and UDP ports:

Configuring Traffic Filters and Protocol Prioritization5-2308645-14.00 Rev 00Specifying MAC Address RangesWhen you create a traffic filter that includ

Strany 165 - S41_accepted

Specifying Common Criterion Ranges308645-14.00 Rev 005-3 SRB Functional MAC AddressesFunctional MAC addresses are destination MAC addresses that alway

Strany 166

Configuring Traffic Filters and Protocol Prioritization5-4308645-14.00 Rev 00Specifying Source and Destination SAP Code RangesTable 5-3 lists some com

Strany 167

Specifying Common Criterion Ranges308645-14.00 Rev 005-5 Specifying Frame Relay NLPID RangesTable 5-4 lists some common Frame Relay network layer prot

Strany 168 - Length Range

Configuring Traffic Filters and Protocol Prioritization5-6308645-14.00 Rev 00Specifying TCP and UDP Port RangesTable 5-6 lists some common TCP port va

Strany 169

Specifying Common Criterion Ranges308645-14.00 Rev 005-7 Specifying Ethernet Type RangesTable 5-8 lists some common Ethernet Type codes to use when sp

Strany 170

Configuring Traffic Filters and Protocol Prioritization5-8308645-14.00 Rev 00Banyan VINES 0BADDEC 6000-6009DEC MOP 6001-6002DRP 6003DEC LAT 6004LAVC 6

Strany 171 - Services

Specifying Common Criterion Ranges308645-14.00 Rev 005-9 Spider 809FNixdorf 80A3Siemens 80A4-80B3Pacer Software 80C6Applitek 80C7Intergraph 80C8-80CCH

Strany 172

Configuring Traffic Filters and Protocol Prioritization5-10308645-14.00 Rev 00Specifying IP Protocol ID and Type of Service RangesThe Internet Protoco

Strany 173 - Implementation Notes

308645-14.00 Rev 006-1 Chapter 6Applying Inbound Traffic FiltersThis chapter describes how to use the Configuration Manager to configure inbound traff

Strany 174

308645-14.00 Rev 00ixCustomizing Templates ...7-9Copying a Te

Strany 175

Configuring Traffic Filters and Protocol Prioritization6-2308645-14.00 Rev 00Displaying the Inbound Traffic Filters WindowTo apply inbound traffic fil

Strany 176

Applying Inbound Traffic Filters308645-14.00 Rev 006-3 Figure 6-1. Inbound Traffic Filters Window Preparing Inbound Traffic Filter TemplatesTo add an

Strany 177

Configuring Traffic Filters and Protocol Prioritization6-4308645-14.00 Rev 00Creating a TemplateTo create an inbound traffic filter template:Site Mana

Strany 178

Applying Inbound Traffic Filters308645-14.00 Rev 006-5 Figure 6-2. Filter Template Management WindowFigure 6-3. Create Template Window

Strany 179

Configuring Traffic Filters and Protocol Prioritization6-6308645-14.00 Rev 00Customizing TemplatesThere are two ways to customize a filter template:•

Strany 180

Applying Inbound Traffic Filters308645-14.00 Rev 006-7 Editing a TemplateAfter you create or copy a template, edit it as follows:Table 6-1 describes h

Strany 181

Configuring Traffic Filters and Protocol Prioritization6-8308645-14.00 Rev 00Figure 6-4. Edit Template Window

Strany 182

Applying Inbound Traffic Filters308645-14.00 Rev 006-9 Table 6-1. Using the Edit Template Window Task Site Manager Procedure NotesAdd a criterion1.

Strany 183

Configuring Traffic Filters and Protocol Prioritization6-10308645-14.00 Rev 00Creating an Inbound Traffic FilterYou create an inbound traffic filter b

Strany 184

Applying Inbound Traffic Filters308645-14.00 Rev 006-11 Figure 6-5. Create Filter WindowEditing an Inbound Traffic FilterAfter you apply an inbound tr

Komentáře k této Příručce

Žádné komentáře