12.07.2015 Views

BROCADE IP PRIMER

BROCADE IP PRIMER

BROCADE IP PRIMER

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SummaryThe other processing mechanism is called strict, and with good reason. Essentially,all packets are processed in the higher queues before processing anytraffic in the lower queues. Obviously, this could mean that traffic in qosp0, forexample, may not be processed for quite some time. Strict processing shouldbe used with caution.Configuring QoSBy default, the processing mechanism uses weighted fair queuing. To changethe processing mechanism to strict, issue the following command in the Globalconfig:BR-Switch#conf tBR-Switch(config)#qos mechanism strictTo change the priority value of traffic coming into a certain switch port, usethis command:BR-Switch#conf tBR-Switch(config)#int e 1BR-Switch(config-if-e1000-1)#priority 7This command tags all incoming traffic on e 1 with a priority of 7, placing thetraffic in qosp3, the highest queue.You may also assign a value to traffic coming from a given VLAN.BR-Switch#conf tBR-Switch(config)#vlan 10BR-Switch(config-vlan-10)#priority 5This command has labeled all traffic in VLAN 10 with a priority of 5, placing itin qosp2, the second highest queue.The topic of Quality of Service is much broader than the scope of this book. Formore information, consult Brocade's web site (http://www.brocade.com/).Summary• Access Control Lists define a method to match a certain kind of traffic• ACLs may be applied to an interface to permit or deny traffic• In applying an ACL to an interface, you must determine which directionthe ACL will be applied (inbound or outbound)• In ACLs, a wildcard mask is used to define an <strong>IP</strong> address range• There are two types of <strong>IP</strong>-based ACLs: Standard and Extended— Standard ACLs match traffic using only the source <strong>IP</strong> address— Extended ACLs match traffic using the protocol, source <strong>IP</strong> address,source port, destination <strong>IP</strong> address, and destination port• There are two types of configured ACLs: Numbered and NamedBrocade <strong>IP</strong> Primer 317

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!