Avaya Configuring Traffic Filters and Protocol Prioritization Uživatelský manuál Strana 1

Procházejte online nebo si stáhněte Uživatelský manuál pro Software Avaya Configuring Traffic Filters and Protocol Prioritization. Avaya Configuring Traffic Filters and Protocol Prioritization User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 184
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Protocol Prioritization

BayRS Version 14.00Part No. 308645-14.00 Rev 00September 19994401 Great America ParkwaySanta Clara, CA 95054Configuring Traffic Filters and Protocol

Strany 2 - Statement of Conditions

x308645-14.00 Rev 00Appendix ASite Manager Protocol Prioritization ParametersPriority Interface Parameter Descriptions ...

Strany 3

Configuring Traffic Filters and Protocol Prioritization6-12308645-14.00 Rev 00To add predefined criteria, ranges, and actions, or delete any criterion

Strany 4

Applying Inbound Traffic Filters308645-14.00 Rev 006-13 Figure 6-6. Edit Filters Window

Strany 5 - Contents

Configuring Traffic Filters and Protocol Prioritization6-14308645-14.00 Rev 00Table 6-2. Using the Edit Filters Window Task Site Manager Procedure N

Strany 6

Applying Inbound Traffic Filters308645-14.00 Rev 006-15 Enabling or Disabling an Inbound Traffic FilterThere may be times when you want to turn off a

Strany 7

Configuring Traffic Filters and Protocol Prioritization6-16308645-14.00 Rev 00Deleting an Inbound Traffic FilterDeleting an inbound traffic filter per

Strany 8

Applying Inbound Traffic Filters308645-14.00 Rev 006-17 Specifying User-Defined CriteriaThe Edit Filters window and Edit Template window provide a Use

Strany 9

Configuring Traffic Filters and Protocol Prioritization6-18308645-14.00 Rev 00Figure 6-7. Add User-Defined Field WindowChanging Inbound Traffic Filter

Strany 10 - 308645-14.00 Rev 00

Applying Inbound Traffic Filters308645-14.00 Rev 006-19 Figure 6-8. Filters Window Showing Filter PrecedenceTo change the order of precedence for inbo

Strany 11

Configuring Traffic Filters and Protocol Prioritization6-20308645-14.00 Rev 00Figure 6-9. Change Precedence WindowFigure 6-10. Filters Window Showing

Strany 12

308645-14.00 Rev 007-1 Chapter 7Applying Outbound Traffic FiltersThis chapter describes how to use the Configuration Manager to configure outbound tra

Strany 13

308645-14.00 Rev 00xiFiguresFigure 2-1. Protocol Prioritization Dequeuing ...2-3Figure 2-2.

Strany 14

Configuring Traffic Filters and Protocol Prioritization7-2308645-14.00 Rev 00Displaying the Priority/Outbound Filters WindowYou must complete the foll

Strany 15 - Before You Begin

Applying Outbound Traffic Filters308645-14.00 Rev 007-3 Figure 7-1. Displaying the Priority/Outbound Filters WindowFigure 7-2. Priority/Outbound Filte

Strany 16 - Text Conventions

Configuring Traffic Filters and Protocol Prioritization7-4308645-14.00 Rev 00Preparing Outbound Traffic Filter TemplatesTo add an outbound traffic fil

Strany 17 - Acronyms

Applying Outbound Traffic Filters308645-14.00 Rev 007-5 5. Choose Criteria > Add > Datalink | IP > criterion.To configure filters for IP-rout

Strany 18

Configuring Traffic Filters and Protocol Prioritization7-6308645-14.00 Rev 00Figure 7-3. Filter Template Management WindowFigure 7-4. Create Priority/

Strany 19

Applying Outbound Traffic Filters308645-14.00 Rev 007-7 Specifying Prioritization LengthWhen you select the Length action in the Create Priority/Outbo

Strany 20 - How to Get Help

Configuring Traffic Filters and Protocol Prioritization7-8308645-14.00 Rev 004. Select High, Low, or Normal as the queue in which a packet is placed i

Strany 21 - Using Traffic Filters

Applying Outbound Traffic Filters308645-14.00 Rev 007-9 Customizing TemplatesThere are two ways to customize a filter template:• Copy an existing temp

Strany 22 - Inbound Traffic Filters

Configuring Traffic Filters and Protocol Prioritization7-10308645-14.00 Rev 00Editing a TemplateAfter you create or copy a template, edit it as follow

Strany 23 - Outbound Traffic Filters

Applying Outbound Traffic Filters308645-14.00 Rev 007-11 Figure 7-6. Edit Priority/Outbound Template Window

Strany 24 - Filtering Strategies

xii308645-14.00 Rev 00Figure 7-7. Create Filter Window ...7-14Figure 7-8.

Strany 25 - Build a Firewall

Configuring Traffic Filters and Protocol Prioritization7-12308645-14.00 Rev 00Table 7-1. Using the Edit Priority/Outbound Template Window Task Site

Strany 26 - Traffic Filter Components

Applying Outbound Traffic Filters308645-14.00 Rev 007-13 Creating an Outbound Traffic FilterYou create an outbound traffic filter by applying a filter

Strany 27

Configuring Traffic Filters and Protocol Prioritization7-14308645-14.00 Rev 00Figure 7-7. Create Filter WindowEditing an Outbound Traffic Filter After

Strany 28 - Predefined Criteria

Applying Outbound Traffic Filters308645-14.00 Rev 007-15 To add predefined criteria, ranges, and actions, or delete any criterion, range, or action:Si

Strany 29

Configuring Traffic Filters and Protocol Prioritization7-16308645-14.00 Rev 00Figure 7-8. Edit Priority/Outbound Filters Window

Strany 30 - User-Defined Criteria

Applying Outbound Traffic Filters308645-14.00 Rev 007-17 Table 7-2. Using the Edit Priority/Outbound Filters Window Task Site Manager Procedure Note

Strany 31

Configuring Traffic Filters and Protocol Prioritization7-18308645-14.00 Rev 00Enabling or Disabling an Outbound Traffic Filter There may be times when

Strany 32

Applying Outbound Traffic Filters308645-14.00 Rev 007-19 Deleting an Outbound Traffic FilterDeleting an outbound traffic filter permanently removes th

Strany 33 - Using Filter Templates

Configuring Traffic Filters and Protocol Prioritization7-20308645-14.00 Rev 00Specifying User-Defined CriteriaThe Edit Priority/Outbound Filters windo

Strany 34

Applying Outbound Traffic Filters308645-14.00 Rev 007-21 Figure 7-9. Add User-Defined Field WindowChanging Outbound Traffic Filter Precedence You can

Strany 35 - Chapter 2

308645-14.00 Rev 00xiiiTablesTable 1-1. Predefined Inbound Traffic Filter Criteria ...1-8Table 1-2. Pre

Strany 36 - Priority Queuing

Configuring Traffic Filters and Protocol Prioritization7-22308645-14.00 Rev 00Figure 7-10. Priority/Outbound Filters Window Showing Filter PrecedenceT

Strany 37 - The Dequeuing Process

Applying Outbound Traffic Filters308645-14.00 Rev 007-23 Figure 7-11. Change Precedence WindowFigure 7-12. Priority/Outbound Filters Window Showing Ne

Strany 39

308645-14.00 Rev 008-1 Chapter 8Configuring IP InboundTraffic Filters Using the BCCThis chapter describes how to use the Bay Command Console (BCC™) to

Strany 40

Configuring Traffic Filters and Protocol Prioritization8-2308645-14.00 Rev 00IP Inbound Traffic Filter Concepts and TerminologyThis section covers the

Strany 41

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-3 IP Inbound Traffic FiltersInbound traffic filters act on packets arriving a

Strany 42

Configuring Traffic Filters and Protocol Prioritization8-4308645-14.00 Rev 00Traffic filter templates and traffic filters contain the following compon

Strany 43

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-5 You cannot specify a precedence value greater than the maximum allowable nu

Strany 44

Configuring Traffic Filters and Protocol Prioritization8-6308645-14.00 Rev 00For every packet that matches the filter criteria, the router sends an en

Strany 45 - Tuning Concepts

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-7 Creating an IP Traffic Filter TemplateYou create an IP traffic filter templ

Strany 46

xiv308645-14.00 Rev 00Table 5-8. Ethernet Type Codes ...5-7Table 5-9. IP

Strany 47 - Reconfiguring Queue Size

Configuring Traffic Filters and Protocol Prioritization8-8308645-14.00 Rev 00Creating an IP Inbound Traffic FilterTo create an IP inbound traffic filt

Strany 48 - Examples

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-9 Example - Creating a Traffic Filter Without Using a TemplateThis example cr

Strany 49

Configuring Traffic Filters and Protocol Prioritization8-10308645-14.00 Rev 00Specifying Source and Destination Networks As Match CriteriaTo filter on

Strany 50

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-11 When you specify one of these values, the BCC automatically assigns the as

Strany 51 - Chapter 3

Configuring Traffic Filters and Protocol Prioritization8-12308645-14.00 Rev 00range_of_ports is a space-delimited list.Table 8-2 lists some common TCP

Strany 52 - IEEE 802.2 LLC Header

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-13 Example - Destination TCP PortThis example specifies destination TCP ports

Strany 53 - header

Configuring Traffic Filters and Protocol Prioritization8-14308645-14.00 Rev 00If you specify a protocol other than TCP or UDP, the software prevents y

Strany 54 - Transparent Bridge Actions

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-15 Specifying the Type of Service (ToS) As Match CriteriaYou can discriminate

Strany 55 - Predefined SRB Criteria

Configuring Traffic Filters and Protocol Prioritization8-16308645-14.00 Rev 00Specifying User-Defined CriteriaYou can specify user-defined criteria in

Strany 56 - SRB Actions

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-17 .Table 8-5. Actions and Dependencies for Inbound IP Traffic FiltersAction

Strany 57 - DECnet Actions

308645-14.00 Rev 00xv PrefaceThis guide describes how to configure traffic filters and prioritize traffic on a Nortel Networks™ router.You can use Sit

Strany 58 - DLSw Criteria and Actions

Configuring Traffic Filters and Protocol Prioritization8-18308645-14.00 Rev 00ExampleThis example creates an IP inbound filter template that forwards

Strany 59 - IP Criteria and Actions

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-19 back backbackSpecifying the Log ActionFor every incoming packet that

Strany 60 - IP Actions

Configuring Traffic Filters and Protocol Prioritization8-20308645-14.00 Rev 00ExampleThe following command creates an entry that contains detailed tra

Strany 61 - IPX Criteria and Actions

Configuring IP Inbound Traffic Filters Using the BCC308645-14.00 Rev 008-21 box# ipip# filter-template fwd-next-infilter-template/fwd-next-in# matchma

Strany 62 - LLC2 Criteria and Actions

Configuring Traffic Filters and Protocol Prioritization8-22308645-14.00 Rev 00Creating a Traffic Filter Without Using a Filter TemplateThis example de

Strany 63 - OSI Criteria and Actions

308645-14.00 Rev 00A-1 Appendix ASite Manager Protocol Prioritization ParametersThis appendix contains reference information for the Site Manager prot

Strany 64 - VINES Criteria and Actions

Configuring Traffic Filters and Protocol PrioritizationA-2308645-14.00 Rev 00Priority Interface Parameter DescriptionsUse the following descriptions a

Strany 65 - XNS Criteria and Actions

Site Manager Protocol Prioritization Parameters308645-14.00 Rev 00A-3 Parameter: Normal Queue SizePath: Configuration Manager > interface connector

Strany 66 - XNS Actions

Configuring Traffic Filters and Protocol PrioritizationA-4308645-14.00 Rev 00Parameter: High Water Packets ClearPath: Configuration Manager > inter

Strany 67 - Chapter 4

Site Manager Protocol Prioritization Parameters308645-14.00 Rev 00A-5 Parameter: High Queue Percent BandwidthPath: Configuration Manager > interfac

Strany 68 - Selecting Predefined Criteria

Configuring Traffic Filters and Protocol Prioritizationxvi308645-14.00 Rev 00Text ConventionsThis guide uses the following text conventions:angle brac

Strany 69 - Traffic Filters

Configuring Traffic Filters and Protocol PrioritizationA-6308645-14.00 Rev 00Parameter: Low Queue Percent BandwidthPath: Configuration Manager > in

Strany 70

Site Manager Protocol Prioritization Parameters308645-14.00 Rev 00A-7 Prioritization Length ParametersUse the following descriptions as guidelines whe

Strany 71 - Predefined IP Criteria

Configuring Traffic Filters and Protocol PrioritizationA-8308645-14.00 Rev 00Parameter: Less Than or Equal QueuePath: Configuration Manager > inter

Strany 72

308645-14.00 Rev 00B-1 Appendix BExamples and Implementation NotesThis appendix contains examples, hints, reminders, and important notes you may find

Strany 73 - Data Link Reference Points

Configuring Traffic Filters and Protocol PrioritizationB-2308645-14.00 Rev 00To create an inbound IP traffic filter that prevents access to a network

Strany 74

Examples and Implementation Notes308645-14.00 Rev 00B-3 Inbound Traffic Filter ExamplesThis section summarizes the steps for creating an inbound traff

Strany 75 - IP Reference Points

Configuring Traffic Filters and Protocol PrioritizationB-4308645-14.00 Rev 00Chapter 6 provides detailed procedures for creating inbound traffic filte

Strany 76 - Selecting Actions

Examples and Implementation Notes308645-14.00 Rev 00B-5 Table B-1 lists sample predefined criteria, ranges, and actions for some common filtering goal

Strany 77 - Dial Service Actions

Configuring Traffic Filters and Protocol PrioritizationB-6308645-14.00 Rev 00Table B-2 lists sample user-defined criteria, ranges, and actions for som

Strany 78

Examples and Implementation Notes308645-14.00 Rev 00B-7 Protocol Prioritization ExamplesThis section summarizes the steps and provides examples (Table

Strany 79 - Chapter 5

Preface308645-14.00 Rev 00xvii Acronymsitalic text Indicates file and directory names, new terms, book titles, and variables in command syntax descrip

Strany 80 - Specifying MAC Address Ranges

Configuring Traffic Filters and Protocol PrioritizationB-8308645-14.00 Rev 009. Type a minimum and maximum value to specify the range, then click on O

Strany 81 - SRB Functional MAC Addresses

Examples and Implementation Notes308645-14.00 Rev 00B-9 Table B-3 provides some examples of using outbound traffic filters for protocol prioritization

Strany 82 - Table 5-3. SAP Codes

Configuring Traffic Filters and Protocol PrioritizationB-10308645-14.00 Rev 00Place RIP traffic in the Low queueCriteria > Add > IP > IP >

Strany 83 - Table 5-5. PPP Protocol IDs

Examples and Implementation Notes308645-14.00 Rev 00B-11 Implementation NotesThis section contains notes about the following:• Filtering Outbound Fram

Strany 84 - Table 5-7

Configuring Traffic Filters and Protocol PrioritizationB-12308645-14.00 Rev 00Using a Drop-All Filter As a FirewallIf your filtering strategy involves

Strany 85

Examples and Implementation Notes308645-14.00 Rev 00B-13 Using Outbound Traffic Filters for LAN ProtocolsIn certain configurations, implementing outbo

Strany 87

308645-14.00 Rev 00Index-1AAccept filters, 1-4, B-12actions, traffic filter. See traffic filter actionsaddingactionsinbound, 6-9, 6-14outbound, 7-12,

Strany 88

Index-2308645-14.00 Rev 00IP Source Address, 3-9Protocol, 3-9TCP Destination Port, 3-9TCP Source Port, 3-9Type of Service, 3-9UDP Destination Port, 3-

Strany 89 - Chapter 6

308645-14.00 Rev 00Index-3example, B-9inbound traffic filters, 6-2outbound traffic filters, 2-1prioritization, 2-1Drop If Next Hop Is Unreachable acti

Strany 90

Configuring Traffic Filters and Protocol Prioritizationxviii308645-14.00 Rev 00CSMA/CD carrier sense multiple access/collision detectionDE discard eli

Strany 91

Index-4308645-14.00 Rev 00specifying an Ethernet Type code, 5-9ISDN PRI, filtering actions, 4-11LLAN Network Manager (LNM), 3-12, 5-4LAN protocolsoutb

Strany 92

308645-14.00 Rev 00Index-5dequeuing algorithmsbandwidth allocation, 2-3strict dequeuing, 2-7Discard Eligible Bit Low parameter, A-6Discard Eligible Bi

Strany 93

Index-6308645-14.00 Rev 00Telnet traffic, prioritizing, B-10template.flt Site Manager file, 7-9templates, 1-13templates, inbound traffic filterapplyin

Strany 94

308645-14.00 Rev 00Index-7performance, B-13precedence, 1-5, B-12reordering, 7-21ranges, 1-11strategies, 1-4templates, 1-13traffic forwarding strategy,

Strany 96

Preface308645-14.00 Rev 00xix PPP Point-to-Point Protocol PRI primary rate interfaceRIF routing information fieldRII routing information indicatorRIP

Strany 97

ii308645-14.00 Rev 00 Copyright © 1999 Nortel NetworksAll rights reserved. Printed in the USA. September 1999.The information in this document is subj

Strany 98

Configuring Traffic Filters and Protocol Prioritizationxx308645-14.00 Rev 00Hard-Copy Technical ManualsYou can print selected technical manuals and re

Strany 99

308645-14.00 Rev 001-1 Chapter 1Using Traffic FiltersThis chapter describes concepts and terms to help you understand and plan for traffic filter conf

Strany 100

Configuring Traffic Filters and Protocol Prioritization1-2308645-14.00 Rev 00Nortel Networks routers support two types of traffic filters:• Inbound tr

Strany 101

Using Traffic Filters308645-14.00 Rev 001-3 Chapter 3 provides protocol-specific information for designing inbound traffic filters. Chapter 6 explains

Strany 102

Configuring Traffic Filters and Protocol Prioritization1-4308645-14.00 Rev 00Filtering StrategiesThis section recommends ways you might use traffic fi

Strany 103

Using Traffic Filters308645-14.00 Rev 001-5 You can also improve application response time and prevent session timeouts by implementing protocol prior

Strany 104

Configuring Traffic Filters and Protocol Prioritization1-6308645-14.00 Rev 00Traffic Filter ComponentsThe Configuration Manager creates traffic filter

Strany 105

Using Traffic Filters308645-14.00 Rev 001-7 A traffic filter criterion is defined by a byte length and an offset from common bit patterns (reference p

Strany 106

Configuring Traffic Filters and Protocol Prioritization1-8308645-14.00 Rev 00Predefined CriteriaTable 1-1 summarizes the predefined inbound traffic fi

Strany 107

Using Traffic Filters308645-14.00 Rev 001-9 Table 1-2 summarizes the predefined outbound traffic filter criteria for data link and IP headers.LLC2 MA

Strany 108

308645-14.00 Rev 00iiiNortel Networks NA Inc. Software License AgreementNOTICE: Please carefully read this license agreement before copying or using t

Strany 109 - Chapter 7

Configuring Traffic Filters and Protocol Prioritization1-10308645-14.00 Rev 00User-Defined CriteriaTo apply customized criteria that use fields that a

Strany 110

Using Traffic Filters308645-14.00 Rev 001-11 RangesFor each traffic filter criterion, you also specify the valid range, a series of target values that

Strany 111

Configuring Traffic Filters and Protocol Prioritization1-12308645-14.00 Rev 00 Table 1-3 lists additional protocol-specific actions for inbound traffi

Strany 112 - Creating a Template

Using Traffic Filters308645-14.00 Rev 001-13 Except for the log actions, inbound and outbound traffic filter actions are mutually exclusive; you can o

Strany 113 - (continued)

Configuring Traffic Filters and Protocol Prioritization1-14308645-14.00 Rev 00Summary of Traffic Filter SupportTable 1-5 summarizes the inbound and ou

Strany 114

308645-14.00 Rev 002-1 Chapter 2Using Protocol Prioritization QueuesThis chapter describes the priority queues that you can implement using outbound t

Strany 115 - (continued)

Configuring Traffic Filters and Protocol Prioritization2-2308645-14.00 Rev 00While the router is operating, network traffic from various sources conve

Strany 116

Using Protocol Prioritization Queues308645-14.00 Rev 002-3 The Dequeuing ProcessAfter queuing packets, the router empties the priority queues by sendi

Strany 117 - Customizing Templates

Configuring Traffic Filters and Protocol Prioritization2-4308645-14.00 Rev 00Bandwidth Allocation AlgorithmThe bandwidth allocation algorithm uses a c

Strany 118

Using Protocol Prioritization Queues308645-14.00 Rev 002-5 6.The router empties all packets from the Low queue, up to the configured bandwidth percent

Strany 119

iv308645-14.00 Rev 00for the security of its own data and information and for maintaining adequate procedures apart from the Software to reconstruct

Strany 120

Configuring Traffic Filters and Protocol Prioritization2-6308645-14.00 Rev 00Figure 2-2. Bandwidth Allocation AlgorithmScan theHigh queue.Are therepac

Strany 121 - SRB_DSAP_hiQ

Using Protocol Prioritization Queues308645-14.00 Rev 002-7 Strict Dequeuing AlgorithmInstead of the bandwidth allocation algorithm, you can configure

Strany 122

Configuring Traffic Filters and Protocol Prioritization2-8308645-14.00 Rev 00Figure 2-3 illustrates the strict dequeuing algorithm. Figure 2-3. Stric

Strany 123

Using Protocol Prioritization Queues308645-14.00 Rev 002-9 Enabling Protocol PrioritizationYou use the Configuration Manager to configure protocol pri

Strany 124

Configuring Traffic Filters and Protocol Prioritization2-10308645-14.00 Rev 00Enabling Protocol Prioritization on an ATM CircuitYou can now set the pr

Strany 125

Using Protocol Prioritization Queues308645-14.00 Rev 002-11 Tuning Protocol PrioritizationWhen you enable Protocol Priority on a circuit, the router u

Strany 126

Configuring Traffic Filters and Protocol Prioritization2-12308645-14.00 Rev 00To configure the percent of bandwidth for the priority queues, you edit

Strany 127

Using Protocol Prioritization Queues308645-14.00 Rev 002-13 Queue Size ExampleSuppose that you use the default queue size (20 packets) for all three p

Strany 128

Configuring Traffic Filters and Protocol Prioritization2-14308645-14.00 Rev 00Figure 2-5. Reconfigured Priority Queue Statistics for the Queue Size Ex

Strany 129

Using Protocol Prioritization Queues308645-14.00 Rev 002-15 Editing Protocol Prioritization ParametersTo edit protocol prioritization parameters:Site

Strany 130

308645-14.00 Rev 00vContentsPrefaceBefore You Begin ...

Strany 131

Configuring Traffic Filters and Protocol Prioritization2-16308645-14.00 Rev 00Monitoring Protocol Prioritization StatisticsTo monitor and manage proto

Strany 132

308645-14.00 Rev 003-1 Chapter 3Inbound Traffic Filter Criteria and ActionsYou create inbound traffic filters using templates that consist of protocol

Strany 133 - Traffic Filters Using the BCC

Configuring Traffic Filters and Protocol Prioritization3-2308645-14.00 Rev 00Transparent Bridge Criteria and ActionsTransparent bridge traffic filters

Strany 134 - IP Traffic Filter Templates

Inbound Traffic Filter Criteria and Actions308645-14.00 Rev 003-3 Predefined Transparent Bridge CriteriaEach transparent bridge encapsulation method h

Strany 135 - IP Inbound Traffic Filters

Configuring Traffic Filters and Protocol Prioritization3-4308645-14.00 Rev 00User-Defined Transparent Bridge CriteriaYou can create bridge traffic fil

Strany 136 - Filter Precedence

Inbound Traffic Filter Criteria and Actions308645-14.00 Rev 003-5 Source Route Bridging Criteria and ActionsYou filter inbound source route bridging (

Strany 137 - Filter Criteria and Actions

Configuring Traffic Filters and Protocol Prioritization3-6308645-14.00 Rev 00See Chapter 5 for information about specifying SAP and MAC address criter

Strany 138

Inbound Traffic Filter Criteria and Actions308645-14.00 Rev 003-7 DECnet Phase IV Criteria and ActionsYou can filter inbound DECnet Phase IV traffic b

Strany 139 - <name>

Configuring Traffic Filters and Protocol Prioritization3-8308645-14.00 Rev 00DLSw Criteria and ActionsYou can filter inbound DLSw traffic based on spe

Strany 140 - Caution:

Inbound Traffic Filter Criteria and Actions308645-14.00 Rev 003-9 IP Criteria and ActionsYou can filter IP inbound traffic based on specified bit patt

Strany 141 - Templates

vi308645-14.00 Rev 00Chapter 2Using Protocol Prioritization QueuesAbout Protocol Prioritization ...

Strany 142 - Criteria

Configuring Traffic Filters and Protocol Prioritization3-10308645-14.00 Rev 00Table 3-7. User-Defined Criteria for IP Inbound Traffic FiltersWhen spec

Strany 143

Inbound Traffic Filter Criteria and Actions308645-14.00 Rev 003-11 • Forward to First Up Next Hop InterfaceSpecifies that any frame that matches the f

Strany 144 - Example - Source TCP Port

Configuring Traffic Filters and Protocol Prioritization3-12308645-14.00 Rev 00User-Defined IPX CriteriaIn addition to the predefined filter criteria,

Strany 145 - Example - Source UDP Port

Inbound Traffic Filter Criteria and Actions308645-14.00 Rev 003-13 User-Defined LLC2 CriteriaIn addition to the predefined LLC2 criteria, you can crea

Strany 146

Configuring Traffic Filters and Protocol Prioritization3-14308645-14.00 Rev 00User-Defined OSI CriteriaIn addition to the predefined OSI filter criter

Strany 147 - <list_of_values>

Inbound Traffic Filter Criteria and Actions308645-14.00 Rev 003-15 User-Defined VINES CriteriaIn addition to the predefined VINES filter criteria, you

Strany 148

Configuring Traffic Filters and Protocol Prioritization3-16308645-14.00 Rev 00User-Defined XNS CriteriaIn addition to the predefined filter criteria,

Strany 149 - <ip_address>

308645-14.00 Rev 004-1 Chapter 4Outbound Traffic Filter Criteria and ActionsYou create outbound traffic filters using templates that consist of criter

Strany 150

Configuring Traffic Filters and Protocol Prioritization4-2308645-14.00 Rev 00Selecting Predefined CriteriaOutbound traffic filter criteria are based o

Strany 151 - Specifying the Log Action

Outbound Traffic Filter Criteria and Actions308645-14.00 Rev 004-3 Figure 4-1 shows the Configuration Manager menu path for specifying these criteria.

Strany 152 - Configuration Examples

308645-14.00 Rev 00viiIP Criteria and Actions ...3-9P

Strany 153

Configuring Traffic Filters and Protocol Prioritization4-4308645-14.00 Rev 00Figure 4-1. Predefined Data Link Criteria for Outbound Traffic Filters

Strany 154

Outbound Traffic Filter Criteria and Actions308645-14.00 Rev 004-5 Predefined IP CriteriaYou configure outbound traffic filters for routing protocols

Strany 155 - Appendix A

Configuring Traffic Filters and Protocol Prioritization4-6308645-14.00 Rev 00Figure 4-2. Predefined IP Criteria for Outbound Traffic FiltersSpecifying

Strany 156

Outbound Traffic Filter Criteria and Actions308645-14.00 Rev 004-7 To configure criteria for both IP and data link reference points, you create two fi

Strany 157

Configuring Traffic Filters and Protocol Prioritization4-8308645-14.00 Rev 00Figure 4-3. Data Link Reference Points in an SRB Packet Bridged over Bay

Strany 158

Outbound Traffic Filter Criteria and Actions308645-14.00 Rev 004-9 IP Reference PointsTable 4-4 defines the reference points in the IP header from whi

Strany 159

Configuring Traffic Filters and Protocol Prioritization4-10308645-14.00 Rev 00Selecting ActionsFor outbound traffic filters, you can specify different

Strany 160

Outbound Traffic Filter Criteria and Actions308645-14.00 Rev 004-11 Prioritizing ActionsYou can apply the following actions to outbound traffic filter

Strany 161

Configuring Traffic Filters and Protocol Prioritization4-12308645-14.00 Rev 00You can use the dial service actions to configure outbound traffic filte

Strany 162

308645-14.00 Rev 005-1 Chapter 5Specifying Common Criterion RangesFor every inbound or outbound traffic filter criterion, you must specify a valid ran

Strany 163 - Appendix B

viii308645-14.00 Rev 00Prioritizing Actions ...4-11Dia

Strany 164 - TCP and UDP ports:

Configuring Traffic Filters and Protocol Prioritization5-2308645-14.00 Rev 00Specifying MAC Address RangesWhen you create a traffic filter that includ

Strany 165 - S41_accepted

Specifying Common Criterion Ranges308645-14.00 Rev 005-3 SRB Functional MAC AddressesFunctional MAC addresses are destination MAC addresses that alway

Strany 166

Configuring Traffic Filters and Protocol Prioritization5-4308645-14.00 Rev 00Specifying Source and Destination SAP Code RangesTable 5-3 lists some com

Strany 167

Specifying Common Criterion Ranges308645-14.00 Rev 005-5 Specifying Frame Relay NLPID RangesTable 5-4 lists some common Frame Relay network layer prot

Strany 168 - Length Range

Configuring Traffic Filters and Protocol Prioritization5-6308645-14.00 Rev 00Specifying TCP and UDP Port RangesTable 5-6 lists some common TCP port va

Strany 169

Specifying Common Criterion Ranges308645-14.00 Rev 005-7 Specifying Ethernet Type RangesTable 5-8 lists some common Ethernet Type codes to use when sp

Strany 170

Configuring Traffic Filters and Protocol Prioritization5-8308645-14.00 Rev 00Banyan VINES 0BADDEC 6000-6009DEC MOP 6001-6002DRP 6003DEC LAT 6004LAVC 6

Strany 171 - Services

Specifying Common Criterion Ranges308645-14.00 Rev 005-9 Spider 809FNixdorf 80A3Siemens 80A4-80B3Pacer Software 80C6Applitek 80C7Intergraph 80C8-80CCH

Strany 172

Configuring Traffic Filters and Protocol Prioritization5-10308645-14.00 Rev 00Specifying IP Protocol ID and Type of Service RangesThe Internet Protoco

Strany 173 - Implementation Notes

308645-14.00 Rev 006-1 Chapter 6Applying Inbound Traffic FiltersThis chapter describes how to use the Configuration Manager to configure inbound traff

Strany 174

308645-14.00 Rev 00ixCustomizing Templates ...7-9Copying a Te

Strany 175

Configuring Traffic Filters and Protocol Prioritization6-2308645-14.00 Rev 00Displaying the Inbound Traffic Filters WindowTo apply inbound traffic fil

Strany 176

Applying Inbound Traffic Filters308645-14.00 Rev 006-3 Figure 6-1. Inbound Traffic Filters Window Preparing Inbound Traffic Filter TemplatesTo add an

Strany 177

Configuring Traffic Filters and Protocol Prioritization6-4308645-14.00 Rev 00Creating a TemplateTo create an inbound traffic filter template:Site Mana

Strany 178

Applying Inbound Traffic Filters308645-14.00 Rev 006-5 Figure 6-2. Filter Template Management WindowFigure 6-3. Create Template Window

Strany 179

Configuring Traffic Filters and Protocol Prioritization6-6308645-14.00 Rev 00Customizing TemplatesThere are two ways to customize a filter template:•

Strany 180

Applying Inbound Traffic Filters308645-14.00 Rev 006-7 Editing a TemplateAfter you create or copy a template, edit it as follows:Table 6-1 describes h

Strany 181

Configuring Traffic Filters and Protocol Prioritization6-8308645-14.00 Rev 00Figure 6-4. Edit Template Window

Strany 182

Applying Inbound Traffic Filters308645-14.00 Rev 006-9 Table 6-1. Using the Edit Template Window Task Site Manager Procedure NotesAdd a criterion1.

Strany 183

Configuring Traffic Filters and Protocol Prioritization6-10308645-14.00 Rev 00Creating an Inbound Traffic FilterYou create an inbound traffic filter b

Strany 184

Applying Inbound Traffic Filters308645-14.00 Rev 006-11 Figure 6-5. Create Filter WindowEditing an Inbound Traffic FilterAfter you apply an inbound tr

Komentáře k této Příručce

Žádné komentáře