HP GbE2c HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Application Gu - Page 71

Using ACL filters, Summary of packet classifiers - vlan vrrp

Page 71 highlights

• Queue and schedule traffic: • Place packets in one of two COS queues • Schedule transmission based on the COS queue weight Using ACL filters Access Control Lists are filters that allow you to classify and segment traffic, so you can provide different levels of service to different traffic types. Each filter defines the conditions that must match for inclusion in the filter, and also the actions that are performed when a match is made. Summary of packet classifiers The GbE2c allows you to classify packets based on various parameters, such as: • Ethernet • Source MAC address/mask • Destination MAC address/mask • VLAN number/mask • Ethernet type • Ethernet Priority, which is the IEEE 802.1p Priority • IPv4 • Source IP address/mask • Destination IP address/mask • Type of Service value • IP protocol number: The protocol number or name as shown in the following table: Table 14 Well-known protocol types Number Protocol Name 1 icmp 2 igmp 6 tcp 17 udp 89 ospf 112 vrrp • TCP/UDP • TCP/UDP application source port, as shown in the table titled "Well-Known Application Ports" • TCP/UDP application destination port, as shown in the table titled "Well-Known Application Ports" • TCP/UDP flag value, as shown in the table titled "Well-Known TCP Flag Values" Table 15 Well-known application ports Number TCP/UDP Application Number TCP/UDP Application Number TCP/UDP Application 20 ftp-data 79 finger 179 irc 21 ftp 80 http 194 imap3 22 ssh 109 pop2 220 ldap 23 telnet 110 pop3 389 https 25 smtp 111 sunrpc 443 rip 37 time 119 nntp 520 rtsp 42 name 123 ntp 554 Radius 43 whois 143 imap 1645;1812 Radius Accounting 53 domain 144 news 1813 hsrp Quality of Service 71

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165

Quality of Service 71
Queue and schedule traffic:
Place packets in one of two COS queues
Schedule transmission based on the COS queue weight
Using ACL filters
Access Control Lists are filters that allow you to classify and segment traffic, so you can provide different levels of
service to different traffic types. Each filter defines the conditions that must match for inclusion in the filter, and also
the actions that are performed when a match is made.
Summary of packet classifiers
The GbE2c allows you to classify packets based on various parameters, such as:
Ethernet
S
ource MAC address/mask
D
estination MAC address/mask
VLAN number/mask
Ethernet type
Ethernet Priority, which is the IEEE 802.1p Priority
IPv4
S
ource IP address/mask
D
estination IP address/mask
Type of Service value
IP protocol number:
The protocol number or name as shown in the following table:
Table 14
Well-known protocol types
Number
Protocol Name
1
icmp
2
igmp
6
tcp
17
udp
89
ospf
112
vrrp
TCP/UDP
TCP/UDP application source port, as shown in the table titled “Well-Known Application Ports”
TCP/UDP application destination port, as shown in the table titled “Well-Known Application Ports”
TCP/UDP flag value, as shown in the table titled “Well-Known TCP Flag Values”
Table 15
Well-known application ports
Number
TCP/UDP
Application
Number
TCP/UDP
Application
Number
TCP/UDP
Application
20
ftp-data
79
finger
179
irc
21
ftp
80
http
194
imap3
22
ssh
109
pop2
220
ldap
23
telnet
110
pop3
389
https
25
smtp
111
sunrpc
443
rip
37
time
119
nntp
520
rtsp
42
name
123
ntp
554
Radius
43
whois
143
imap
1645;1812
Radius Accounting
53
domain
144
news
1813
hsrp