Table of Contents
P-794H User’s Guide
15
12.2 The SNTP Client Screen
.................................................................................................
156
Chapter
13
IGMP Snooping
.....................................................................................................................
159
13.1 Overview
..........................................................................................................................
159
13.1.1 What You Need to Know
........................................................................................
159
13.2 The IGMP Snooping Screen
............................................................................................
160
Chapter
14
Quality of Service (QoS)
.......................................................................................................
163
14.1 Overview
..........................................................................................................................
163
14.1.1 What You Need to Know
........................................................................................
163
14.2 The Classifier Configuration Screen
...............................................................................
165
14.2.1 Edit QoS Classifier
.................................................................................................
166
14.3 The Meter Configuration Screen
.....................................................................................
167
14.4 The ALD Configuration Screen
........................................................................................
168
14.5 The Scheduler Configuration Screen
..............................................................................
169
14.5.1 Edit a Priority Queuing Scheduler Profile
...............................................................
171
14.5.2 Edit a Fair Weight Queuing Scheduler Profile
........................................................
171
14.6 Transport Classifier & Scheduler Configuration
...............................................................
172
14.7 Technical Reference
........................................................................................................
173
14.7.1 DiffServ
..................................................................................................................
173
14.7.2 IEEE 802.1Q Tag
...................................................................................................
174
14.7.3 Token Bucket
..........................................................................................................
174
14.7.4 Single Rate Three Color Marker
............................................................................
175
14.7.5 Two Rate Three Color Marker
................................................................................
176
14.7.6 QoS Meter Types
...................................................................................................
176
Chapter
15
Security
..................................................................................................................................
179
15.1 Overview
..........................................................................................................................
179
15.1.1 What You Need to Know
........................................................................................
179
15.2 The Security Interface Configuration Screen
...................................................................
180
15.2.1 Security State and Level
........................................................................................
180
15.2.2 Add Security Interface
............................................................................................
182
15.2.3 Edit Security Interface
............................................................................................
182
15.2.4 Policies, Triggers, Intrusion Detection, Logging
.....................................................
186
15.3 Technical Reference
........................................................................................................
194
15.3.1 NAT Definitions
......................................................................................................
194
15.3.2 What NAT Does
.....................................................................................................
195
15.3.3 How NAT Works
.....................................................................................................
195
15.3.4 Port Scanning
.........................................................................................................
196
15.3.5 ICMP Flood Attack
.................................................................................................
196