Contents
6
Replacing Priorities.......................................... .... ... ... ... ... .... ... ... ... .... ..............................................................176
VLAN Tag User Priorities..................................................................................... ...........................................176
DSCP Values............................................. ..................................................................................................... 176
DiffServ Domains....................................... ..................................................................................................... 177
Examples................... .................................................................................................................................... .179
Voice Applications............................ ... ... ... .... ... ... ... ... .... ... ........................................................................179
Video Applications......................................................... ...........................................................................181
Critical Database.......................... ............................................................................................................ 183
Policy Component Hierarchy.................................................. ..................................................................184
Chapter 16: Group Link Control ......................................................... ........................................................187
Supported Platforms........ ............................................................................................................................... 188
Overview............................................. ............................................................................................................ 189
Guidelines............................................... ........................................................................................................ 197
Configuring the Feature............. ..................................................................................................................... 198
Chapter 17: Denial of Service Defenses ............................................ ........................................................201
Supported Platforms........ ............................................................................................................................... 202
Overview............................................. ............................................................................................................ 203
SYN Flood Attack.............................................................................................................. ............. .................204
Smurf Attack ........................................................................................................................................ ...........205
Land Attack................................................ ... ... .... ... ... ... ... .... ...........................................................................206
Teardrop Attack ...................................................................................................................................... ........208
Ping of Death Attack........... ............................................................................................................................ 209
IP Options Attack............. ... ... .... ... ... ... ............................................................................................................ 210
Mirroring Traffic............................................................................. ..................................................................211
Denial of Service Defense Guidelines ............................................................................................................ 212
Chapter 18: Power Over Ethernet ............................................................................................................... 213
Supported Platforms........ ............................................................................................................................... 214
Overview............................................. ............................................................................................................ 215
Power Budgeting......................................................................................................................... ....................216
Port Prioritization..................................................................................................... ... .....................................217
PoE Device Classes ............................................................................................................................... ........218
Section III: Snooping Protocols ..............................................................................219
Chapter 19: Internet Group Management Protocol Snooping ................................................................. 221
Supported Platforms........ ............................................................................................................................... 222
Overview............................................. ............................................................................................................ 223
Chapter 20: Internet Group Management Protocol Snooping Querier ................................................... 225
Supported Platforms........ ............................................................................................................................... 226
Overview............................................. ............................................................................................................ 227
Guidelines............................................... ........................................................................................................ 230
Configuring the Feature............. ..................................................................................................................... 231
Chapter 21: Multicast Listener Discovery Snooping ........................... .....................................................235
Supported Platforms........ ............................................................................................................................... 236
Overview............................................. ............................................................................................................ 237
Chapter 22: Router Redundancy Protocol Snooping ............................................................................... 239
Supported Platforms........ ............................................................................................................................... 240
Overview............................................. ............................................................................................................ 241
Guidelines............................................... ........................................................................................................ 242