Classification Groups - Symbol WS5000 Series System Reference Manual

Hide thumbs Also See for WS5000 Series:
Table of Contents

Advertisement

Table 6.1 Classifier Types and Acceptable Value Ranges (Continued)
Criteria Type
Source Port
Dest[ination] Port
Multicast Mask
4. If the predicate for the classifier has more than one clause, the Action conjunction is used to string
predicates together. For example,
• If the consecutive criteria are dissimilar, the predicates are conjoined with "AND".
• If the consecutive criteria are similar, the predicates are conjoined with "OR".
Predicates are evaluated and conjoined consecutively. In other words, there is no control over the
grouping of predicates other than logical ordering upon creating them.
Note Keep Classifier predicates as simple as possible, and build more complicated
tests by combining Classifiers in a Classification Group.
Use the Add or Remove buttons to add a new predicate or remove an existing predicate from a
Classifier.
5. When done, click Next. A Classifier Created Successfully! message panel is displayed.
6. Click Finish to save the new classifier and exit the wizard.

6.1.2 Classification Groups

A Classification Group (CG) is a collection of classifiers, or complex predicates that evaluate network packets
as they are sent to or arrive from wireless devices. In addition to collecting classifiers, the CG declares the
action that is to be taken after a packet is evaluated by a classifier. Specifically, the CG declares whether a
packet that passes the classifier evaluation is accepted (allowed to precede across the network) or denied
(thrown away).
To see the configuration hierarchy while creating an Network Policy, click Where Am I? at any point. A Where
Am I? Dialog Box, such as
Figure
Description
The Ethernet port number, on the originating device, through which the packet
was sent.
The Ethernet port number, on the recipient device, to which the packet is being
sent.
MAC address that's used to mask the range of recipients of a broadcast packet.
This is particularly useful for restricting the broadcast of voice and video data.
6.5, is displayed.
6-5
Configuring Policies

Advertisement

Table of Contents
loading

Table of Contents