Juniper Networks EX2500 User Manual

Page 5

Advertising
background image

Table of Contents

Table of Contents

„

v

PVRST Configuration Guidelines .............................................................. 40
Configuring PVRST .................................................................................. 40

Multiple Spanning Tree Protocol .................................................................... 41

MSTP Region ........................................................................................... 41
Common Internal Spanning Tree............................................................. 41
MSTP Configuration Guidelines................................................................ 41
Multiple Spanning Tree Groups Configuration Example ........................... 42

Fast Uplink Convergence ............................................................................... 43

Configuration Guidelines ......................................................................... 44
Configuring Fast Uplink Convergence ...................................................... 44

Chapter 4

Ports and Trunking

45

Trunking Overview ........................................................................................ 45

Statistical Load Distribution ..................................................................... 45
Built-In Fault Tolerance............................................................................ 46
Before Configuring Static Trunks ............................................................. 46
Trunk Group Configuration Rules............................................................. 46

Port Trunking Configuration Example ............................................................ 47
Configurable Trunk Hash Algorithm ............................................................... 48
Link Aggregation Control Protocol.................................................................. 49

LACP Overview........................................................................................ 49
Static LACP .............................................................................................. 51
LACP Configuration Guidelines ................................................................ 51
Configuring LACP .................................................................................... 51
Optionally Reducing LACP Timeout ......................................................... 52
Removing LACP Configuration from a Port.............................................. 52

Chapter 5

Quality of Service

53

QoS Overview ................................................................................................ 53
Using ACL Filters............................................................................................ 54

MAC Extended ACLs................................................................................ 55
IP Standard ACLs ..................................................................................... 55
IP Extended ACLs .................................................................................... 56
Understanding ACL Priority ..................................................................... 57
Assigning ACLs to a Port.......................................................................... 57
Viewing ACL Statistics ............................................................................. 58
Configuring ACL Port Mirroring ............................................................... 58
ACL Configuration Examples ................................................................... 58

ACL Example 1—Blocking Traffic to a Host....................................... 58
ACL Example 2—Blocking Traffic from a Source to a Destination ..... 59
ACL Example 3—Blocking HTTP Traffic ............................................ 59
ACL Example 4—Blocking All Except Certain Packets ....................... 60

Using Storm Control Filters ............................................................................ 61

Broadcast Storms .................................................................................... 61
Configuring Storm Control....................................................................... 61

Using DSCP Values to Provide QoS ................................................................ 62

Differentiated Services Concepts ............................................................. 62
Per Hop Behavior .................................................................................... 63
QoS Levels............................................................................................... 64
DSCP Mapping......................................................................................... 64

Using 802.1p Priority to Provide QoS............................................................. 65
Queuing and Scheduling ................................................................................ 66

Advertising