Contents
FDB Configuration Examples ....................................................................................................177
MAC-Based Security................................................................................................................178
Displaying FDB Entries ............................................................................................................178
Policy Manager .......................................................................................................................179
Using the Edit Command ...................................................................................................180
Using a Separate Machine .................................................................................................180
Checking Policies ..............................................................................................................180
Refreshing Policies............................................................................................................181
Applying Policies ....................................................................................................................181
Applying ACL Policies........................................................................................................181
Applying Routing Policies ..................................................................................................182
ACL Policies ...........................................................................................................................182
ACL Policy File Syntax .......................................................................................................183
Example ACL Rule Entries .................................................................................................189
Routing Policies......................................................................................................................190
Policy Examples ................................................................................................................195
Voice Applications.............................................................................................................202
Video Applications.............................................................................................................202
Web Browsing Applications ................................................................................................203
File Server Applications .....................................................................................................203
Configuring QoS......................................................................................................................204
QoS Profiles ...........................................................................................................................205
Traffic Groupings ....................................................................................................................207
ExtremeWare XOS 11.1 Concepts Guide
8