Qtech QSW-2100-12T [10/348] Multicast 201

Qtech QSW-2100-12T [10/348] Multicast 201
QTECH QSW-2100-12T Configuration Guide (CLI)
Contents
7.5.3 Creating traffic classification .............................................................................................................. 185
7.5.4 Configuring traffic classification rules ................................................................................................ 186
7.5.5 Creating rate limit rule and shapping rule ........................................................................................... 186
7.5.6 Creating traffic policy ......................................................................................................................... 187
7.5.7 Defining traffic policy mapping .......................................................................................................... 187
7.5.8 Defining traffic policy operation ......................................................................................................... 188
7.5.9 Applying traffic policy to interfaces .................................................................................................... 189
7.5.10 Checking configurations ................................................................................................................... 189
7.5.11 Maintenance ...................................................................................................................................... 190
7.6 Configuring rate limiting based on interface and VLAN ............................................................................. 190
7.6.1 Preparing for configurations ............................................................................................................... 190
7.6.2 Default configurations of rate limiting based on interface and VLAN ............................................... 190
7.6.3 Configuring rate limiting based on interface ....................................................................................... 190
7.6.4 Configuring rate limiting based on VLAN.......................................................................................... 191
7.6.5 Configuring rate limiting based on QinQ ............................................................................................ 191
7.6.6 Checking configurations ..................................................................................................................... 191
7.6.7 Maintenance ........................................................................................................................................ 192
7.7 Configuring examples .................................................................................................................................. 192
7.7.1 Example for configuring ACL ............................................................................................................ 192
7.7.2 Example for configuring congestion management .............................................................................. 193
7.7.3 Example for configuring rate limiting based on traffic policy ............................................................ 195
7.7.4 Example for configuring rate limiting based on interface ................................................................... 198
8 Multicast ..................................................................................................................................... 201
8.1 Overview ...................................................................................................................................................... 201
8.1.1 Multicast overview .............................................................................................................................. 201
8.1.2 Basic functions of Layer 2 multicast ................................................................................................... 206
8.1.3 IGMP Snooping .................................................................................................................................. 207
8.2 Configuring IGMP basis .............................................................................................................................. 208
8.2.1 Preparing for configurations ............................................................................................................... 208
8.2.2 Default configurations of Layer 2 multicast basic functions ............................................................... 208
8.2.3 Configuring basic functions of Layer 2 multicast ............................................................................... 208
8.2.4 Checking configurations ..................................................................................................................... 209
8.3 Configuring IGMP Snooping ....................................................................................................................... 209
8.3.1 Preparing for configurations ............................................................................................................... 209
8.3.2 Default configurations of IGMP Snooping ......................................................................................... 210
8.3.3 Configuring IGMP Snooping .............................................................................................................. 210
8.3.4 Checking configurations ..................................................................................................................... 211
8.4 Configuration examples ............................................................................................................................... 211
8.4.1 Example for configuring IGMP Snooping .......................................................................................... 211
8.4.2 Example for configuring ring network multicast ................................................................................ 213
9 Security........................................................................................................................................ 217

Содержание

Скачать