HP 6125XLG R2306-About the HP 6125XLG Blade Configuration Guides - Page 5
IP Multicast Configuration Guide, MCE Configuration Guide, ACL and QoS Configuration Guide, Security
View all HP 6125XLG manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 5 highlights
Configuration guide Content • Configuring IPv6 IS-IS • Configuring IPv6 PBR • Configuring routing policies IP Multicast Configuration Guide Covers Layer 3 IPv4 multicast protocols (IGMP and PIM), Layer 3 IPv6 multicast protocols ( MLD and IPv6 PIM), Layer 2 IPv4 multicast protocols (IGMP snooping), and Layer 2 IPv6 multicast protocols (MLD snooping). This guide includes: • Multicast overview • Configuring IGMP snooping • Configuring multicast routing and forwarding • Configuring IGMP • Configuring PIM • Configuring MLD snooping • Configuring IPv6 multicast routing and forwarding • Configuring MLD • Configuring IPv6 PIM MCE Configuration Guide Describes MCE fundamentals and the configuration on the switch that acts as an MCE. This guide includes: • Configuring MCE • Configuring IPv6 MCE ACL and QoS Configuration Guide Describes how to classify traffic with ACLs, and allocate network resources and manage congestions with QoS technologies to improve network performance and network use efficiency. You can use ACLs to help other function modules (such as QoS and IP routing) classify or filter traffic. This configuration guide includes: • Configuring ACLs • QoS overview • Configuring a QoS policy • Configuring priority mapping • Configuring traffic policing, GTS, and rate limit • Configuring congestion management • Configuring congestion avoidance • Configuring traffic filtering • Configuring priority marking • Configuring nesting • Configuring traffic redirecting • Configuring aggregate CAR • Configuring class-based accounting • Configuring data buffers • Configuring time ranges • Appendix Security Configuration Guide Covers security features. The major security features available on the switch include: identity authentication, secure management, and attack protection. This guide includes: • Configuring AAA • 802.1X overview