AT-S63 Management Software Features Guide
5
Chapter 10: Classifiers ................................................................................................................................ 109
Supported Platforms................................................................................... .................................................... 110
Overview.................................................................................................................................. ....................... 111
Classifier Criteria....................... ..................................................................................................................... 113
Guidelines................................................................................................................................ ....................... 118
Chapter 11: Access Control Lists ................................................................................ .............................. 119
Supported Platforms................................................................................... .................................................... 120
Overview.................................................................................................................................. ....................... 121
Parts of an ACL...................... ........................................................................................................................ 123
Guidelines................................................................................................................................ ....................... 124
Examples............................................................................................. ........................................................... 125
Chapter 12: Class of Service ............................................................................... ....................................... 131
Supported Platforms................................................................................... .................................................... 132
Overview.................................................................................................................................. ....................... 133
Scheduling........................................................................................... ........................................................... 136
Strict Priority Scheduling......................................................................... ................................................. 136
Weighted Round Robin Priority Scheduling......................................................................... ....................136
Chapter 13: Quality of Service ................................................................................................................... 139
Supported Platforms................................................................................... .................................................... 140
Overview.................................................................................................................................. ....................... 141
Classifiers......................................................... ....................................................................................... ....... 143
Flow Groups.............................. ..................................................................................................................... 144
Traffic Classes......................................................................................... ....................................................... 145
Policies......................... .................................................................................................................... .............. 146
QoS Policy Guidelines...................................................................................... .............................................. 147
Packet Processing............................................................................................ .............................................. 148
Bandwidth Allocation........................ .............................................................................................................. 148
Packet Prioritization............................................................................................. ........................................... 148
Replacing Priorities............................................................................................................................... .......... 150
VLAN Tag User Priorities ............................................................................................................................... 150
DSCP Values.................................................................................................................................... .............. 150
DiffServ Domains........................................................................................................... .................................151
Examples............................................................................................. ........................................................... 153
Voice Applications...................................................................................................... ..............................153
Video Applications.................................................................................................................................... 155
Critical Database........................................................................................................ ..............................157
Policy Component Hierarchy.................................................................................................................... 158
Chapter 14: Denial of Service Defenses .................................................................................................... 161
Supported Platforms................................................................................... .................................................... 162
Overview.................................................................................................................................. ....................... 163
SYN Flood Attack............................. .............................................................................................................. 164
Smurf Attack........................................................... ........................................................................................ 165
Land Attack.................................................................................................................................... ................. 166
Teardrop Attack......................................................... ..................................................................................... 168
Ping of Death Attack................................................................................... .................................................... 169
IP Options Attack..................................................................................... ....................................................... 170
Mirroring Traffic .............................................................................................................................................. 171
Denial of Service Defense Guidelines................................................. ........................................................... 172