R2511-HP MSR Router Series ACL and QoS Configuration Guide(V5)

ii
Configuring priority mapping ··································································································································· 28
Overview ········································································································································································· 28
Introduction to priorities ········································································································································ 28
Priority mapping tables ········································································································································· 28
Priority mapping configuration tasks ··························································································································· 28
Configuring a priority mapping table ·························································································································· 29
Configuring an uncolored priority mapping table ····························································································· 29
Configuring a port to trust packet priority for priority mapping ··············································································· 29
Configuring the trusted packet priority type for an interface or port group ··················································· 30
Changing the port priority of an interface ·················································································································· 30
Displaying and maintaining priority mapping ············································································································ 31
Priority mapping configuration examples ···················································································································· 31
Priority trust mode configuration example ·········································································································· 31
Configuring traffic policing, traffic shaping, and rate limit ···················································································· 33
Overview ········································································································································································· 33
Traffic evaluation and token buckets ··················································································································· 33
Traffic policing ······················································································································································· 34
Traffic shaping ······················································································································································· 35
Rate limit ································································································································································· 35
Configuration task list ···················································································································································· 36
Configuring traffic policing ··········································································································································· 36
Configuring traffic policing in policy approach ································································································ 37
Configuring traffic policing in non-policy approach ························································································· 37
Configuring GTS ···························································································································································· 38
Configuring GTS in policy approach ·················································································································· 38
Configuring GTS in non-policy approach ··········································································································· 39
Configuring the rate limit ·············································································································································· 40
Displaying and maintaining traffic policing, GTS, and rate limit ············································································· 40
Traffic policing and GTS configuration examples ······································································································ 41
Traffic policing and GTS configuration example ······························································································· 41
IP rate limit configuration example ······················································································································ 42
Configuring congestion management ······················································································································ 44
Overview ········································································································································································· 44
Causes, impacts, and countermeasures of congestion ······················································································ 44
Congestion management policies ······················································································································· 44
Congestion management technique comparison ······························································································· 49
Configuring the FIFO queue size·································································································································· 51
Configuration procedure ······································································································································ 51
Configuration example ········································································································································· 52
Configuring PQ ······························································································································································ 52
Configuration restrictions and guidelines ··········································································································· 52
Configuration procedure ······································································································································ 52
PQ configuration example ··································································································································· 53
Configuring CQ ····························································································································································· 54
Configuration restrictions and guidelines ··········································································································· 54
Configuration procedure ······································································································································ 54
CQ configuration example ··································································································································· 55
Configuring WFQ ·························································································································································· 55
Configuration restrictions and guidelines ··········································································································· 55
Configuration procedure ······································································································································ 56
WFQ configuration example ······························································································································· 56
Configuring CBQ ··························································································································································· 56
Predefined classes, traffic behaviors, and policies ···························································································· 57