R3303-HP HSR6800 Routers ACL and QoS Configuration Guide
ii
Introduction to priorities ········································································································································ 26
Priority mapping tables ········································································································································· 26
Priority mapping configuration tasks ··························································································································· 26
Configuring a priority mapping table ·························································································································· 27
Configuring the trusted packet priority type for an interface or port group ···························································· 28
Changing the port priority of an interface ·················································································································· 28
Displaying and maintaining priority mapping ············································································································ 28
Priority mapping configuration examples ···················································································································· 29
Priority trust mode and port priority configuration example ············································································· 29
Priority mapping table configuration example ··································································································· 30
Configuring traffic policing, traffic shaping, and rate limit ···················································································· 33
Overview ········································································································································································· 33
Traffic evaluation and token buckets ··················································································································· 33
Traffic policing ······················································································································································· 34
Traffic shaping ······················································································································································· 35
Rate limit ································································································································································· 36
Configuration task list ···················································································································································· 36
Configuring traffic policing ··········································································································································· 37
Configuring traffic policing by using the policy approach ··············································································· 37
Configuring traffic policing by using the non-policy approach ········································································ 38
Configuring GTS ···························································································································································· 39
Configuring GTS by using the policy approach ································································································ 39
Configuring GTS by using the non-policy approach ························································································· 39
Configuring the rate limit ·············································································································································· 40
Configuring packet resequencing ································································································································ 41
Displaying and maintaining traffic policing, GTS, and rate limit ············································································· 41
Traffic policing and GTS configuration examples ······································································································ 42
Traffic policing and GTS configuration example ······························································································· 42
IP rate limiting configuration example ················································································································ 44
Configuring congestion management ······················································································································ 45
Overview ········································································································································································· 45
Causes, impacts, and countermeasures of congestion ······················································································ 45
Congestion management policies ······················································································································· 45
Congestion management technique comparison ······························································································· 50
Configuring the FIFO queue size·································································································································· 52
Configuration example ········································································································································· 53
Configuring PQ ······························································································································································ 53
Configuration restrictions and guidelines ··········································································································· 53
Configuration procedure ······································································································································ 53
PQ configuration example ··································································································································· 54
Configuring CQ ····························································································································································· 55
CQ configuration example ··································································································································· 56
Configuring WFQ ·························································································································································· 56
WFQ configuration example ······························································································································· 57
Configuring CBQ ··························································································································································· 57
Predefined classes, traffic behaviors, and policies ···························································································· 57
Defining a class ····················································································································································· 58
Defining a traffic behavior ··································································································································· 58
Defining a QoS policy ·········································································································································· 62
Applying the QoS policy ······································································································································ 62
Configuring the maximum available interface bandwidth ··············································································· 63
Setting the maximum reserved bandwidth as a percentage of available bandwidth ··································· 64
Displaying and maintaining CBQ ······················································································································· 65