Juniper Networks EX2500 Switch User Manual


 
Table of Contents
Table of Contents
v
PVRST Configuration Guidelines ..............................................................38
Configuring PVRST ..................................................................................38
Multiple Spanning Tree Protocol ....................................................................39
MSTP Region ...........................................................................................39
Common Internal Spanning Tree.............................................................39
MSTP Configuration Guidelines................................................................39
Multiple Spanning Tree Groups Configuration Example...........................40
Fast Uplink Convergence ...............................................................................41
Configuration Guidelines .........................................................................42
Configuring Fast Uplink Convergence......................................................42
Chapter 4
Ports and Trunking 43
Trunking Overview ........................................................................................43
Statistical Load Distribution .....................................................................43
Built-In Fault Tolerance............................................................................44
Before Configuring Static Trunks .............................................................44
Trunk Group Configuration Rules.............................................................44
Port Trunking Configuration Example............................................................45
Configurable Trunk Hash Algorithm...............................................................47
Link Aggregation Control Protocol..................................................................47
LACP Configuration Guidelines ................................................................49
Configuring LACP ....................................................................................49
Optionally Reducing LACP Timeout .........................................................49
Chapter 5
Quality of Service 51
QoS Overview................................................................................................51
Using ACL Filters............................................................................................52
MAC Extended ACLs................................................................................53
IP Standard ACLs.....................................................................................53
IP Extended ACLs ....................................................................................54
Understanding ACL Priority .....................................................................55
Assigning ACLs to a Port..........................................................................56
Viewing ACL Statistics .............................................................................56
ACL Configuration Examples ...................................................................56
ACL Example 1—Blocking Traffic to a Host.......................................56
ACL Example 2—Blocking Traffic from a Source to a Destination .....57
ACL Example 3—Blocking HTTP Traffic ............................................57
ACL Example 4—Blocking All Except Certain Packets .......................58
Using Storm Control Filters ............................................................................59
Broadcast Storms ....................................................................................59
Configuring Storm Control.......................................................................59
Using DSCP Values to Provide QoS ................................................................60
Differentiated Services Concepts .............................................................60
Per Hop Behavior ....................................................................................61
QoS Levels...............................................................................................62
DSCP Mapping.........................................................................................62
Using 802.1p Priority to Provide QoS.............................................................63
Queuing and Scheduling ................................................................................64
Chapter 6
Remote Monitoring 65
RMON Overview ............................................................................................65
RMON Group 1—Statistics .............................................................................66
RMON Group 2—History................................................................................67