Reference Guide

ECN Packet Classification...................................................................................................................................... 620
Example: Color-marking non-ECN Packets in One Traffic Class...................................................................621
Example: Color-marking non-ECN Packets in Different Traffic Classes......................................................621
Using A Configurable Weight for WRED and ECN................................................................................................. 622
Benefits of Using a Configurable Weight for WRED with ECN..................................................................... 622
Setting Average Queue Size using a Weight......................................................................................................623
Global Service-Pools for WRED with ECN......................................................................................................... 623
Configuring a Weight for WRED and ECN Operation...................................................................................... 624
Pre-Calculating Available QoS CAM Space..............................................................................................................625
SNMP Support for Buffer Statistics Tracking.........................................................................................................626
Chapter 44: Routing Information Protocol (RIP)........................................................................627
Protocol Overview.......................................................................................................................................................... 627
RIPv1.............................................................................................................................................................................627
RIPv2............................................................................................................................................................................627
Implementation Information..........................................................................................................................................627
Configuration Information.............................................................................................................................................628
Configuration Task List............................................................................................................................................628
RIP Configuration Example..................................................................................................................................... 633
Chapter 45: Remote Monitoring (RMON).................................................................................. 639
Implementation Information......................................................................................................................................... 639
Fault Recovery.................................................................................................................................................................639
Setting the RMON Alarm........................................................................................................................................ 639
Configuring an RMON Event................................................................................................................................. 640
Configuring RMON Collection Statistics..............................................................................................................641
Configuring the RMON Collection History.......................................................................................................... 641
Chapter 46: Rapid Spanning Tree Protocol (RSTP)....................................................................643
Protocol Overview..........................................................................................................................................................643
Configuring Rapid Spanning Tree............................................................................................................................... 643
Important Points to Remember...................................................................................................................................644
RSTP and VLT............................................................................................................................................................644
Configuring Interfaces for Layer 2 Mode..................................................................................................................644
Enabling Rapid Spanning Tree Protocol Globally.................................................................................................... 645
Adding and Removing Interfaces................................................................................................................................ 647
Modifying Global Parameters....................................................................................................................................... 647
Enabling SNMP Traps for Root Elections and Topology Changes................................................................648
Modifying Interface Parameters..................................................................................................................................648
Influencing RSTP Root Selection................................................................................................................................648
Configuring an EdgePort...............................................................................................................................................649
Configuring Fast Hellos for Link State Detection...................................................................................................650
Chapter 47: Security..................................................................................................................651
Role-Based Access Control...........................................................................................................................................651
Overview of RBAC.................................................................................................................................................... 651
User Roles...................................................................................................................................................................653
AAA Authentication and Authorization for Roles.............................................................................................. 656
Role Accounting........................................................................................................................................................ 659
20
Contents