Provider Connectivity Assurance
Support Portal
cisco.com
Login
Contents
x
Getting Started
Provider Connectivity Assurance
Legacy Orchestrator
Skylight Gateway
Assurance Sensor Agents
Assurance Sensor Capture
Assurance Sensor Control
Assurance Module Dock
Assurance Sensor Modules
Assurance Sensor SFP
Assurance Sensor GT-GT-S, LT-S, and LX-S
Assurance Sensor F100 and F25
Partner Enablement
Accedian Skylight Legacy Products and Documentation
Legal
Powered by
Managing Traffic
7 Articles
in this category
Contributors
Share this
Print
Share
Contents
Managing Traffic
7 Articles
in this category
Written by
Andrea Hilton
Share
Understanding the Creation of Ethernet Services
This article presents the creation of E-Line, E-LAN and E-Tree services. It also explains how to configure some of the service attributes for the created services, such as bandwidth profiles, CoS mapping and Layer-2 control protocol processing optio...
Written by
Andrea Hilton
Updated on : 31 Jul 2024
Defining Filters
You can set up a specific filter (Layer-2, IPv4 or IPv6) for use with loopbacks or flows. By using such a filter, you can loop back traffic or set up a flow based on specific characteristics such as Ethernet Header settings, VLAN settings and DSCP f...
Updated on : 25 Jan 2024
Setting Up Ethernet Services
With the Cisco Provider Connectivity Assurance Sensor GT (formerly Accedian Skylight performance element: GT) You can create and manage Ethernet services through the Traffic menus. The major steps required to create or manage services are: De...
Written by
Andrea Hilton
Updated on : 14 Aug 2024
Using Layer-2 Protocol Tunneling
The Layer-2 Protocol Tunneling (L2PT) function provides a set of rules that can be used to process the Layer-2 Control Protocol (L2CP) frames. Each L2PT rule can be configured to process a specific type of L2CP frame with either one of the followi...
Written by
Andrea Hilton
Updated on : 09 Aug 2024
Monitoring Traffic
This section describes how to set up the unit for monitoring pass-through traffic using the monitor ports. The units have a versatile monitoring capability that can be tailored to the specific troubleshooting you may need. The Cisco Provider Connect...
Written by
Andrea Hilton
Updated on : 14 Aug 2024
Setting up Traffic Shaping
Shaping is a technique which delays some or all packets as a way to bring them into compliance with a desired bandwidth profile. The shaping provides a means to control the volume of traffic being sent into a network in a specified period (bandwid...
Updated on : 28 Apr 2023
Understanding Traffic Shaping via H-QoS
Traffic shaping is used to reduce traffic burstiness for an outgoing interface by delaying some or all frames. It is commonly applied at the network edges to control traffic entering the network. With shaping, you can control the volume of traffic b...
Written by
Andrea Hilton
Updated on : 14 Aug 2024
Change password!
Changing your password will log you out immediately. Use the new password to log back in.
Current password
Current password is required
New password
New password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character.
Confirm password
Confirm password must be at least 8 characters long. It should contain at least one upper and lower case letter, number, and a special character.
Confirm password should be same as new password
Update
Change profile
Success!
First Name
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last Name
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
New email
Enter a valid email
Re-enter your password
Enter a valid password
Your profile has been successfully updated.
Update
Logout