Chapter 12
MAC ACLs ....................................................................................................................12-1
Configuring IP ACLs .....................................................................................................12-2
Process ..................................................................................................................12-2
Chapter 13
CoS Queue Mapping ....................................................................................................13-1
Trusted Ports ..........................................................................................................13-1
Untrusted Ports ......................................................................................................13-2
CoS Queue Configuration ............................................................................................13-2
v1.0, November 2008
ix