HP MSR2000/3000/4000 Router Series ACL and QoS Configuration Guide

ii
Configuring a child policy ···································································································································· 22
Applying the QoS policy to an interface ····················································································································· 23
Configuring the QoS policy-based traffic rate statistics collection period for an interface ···································· 23
Displaying and maintaining QoS policies ·················································································································· 23
Configuring priority mapping ··································································································································· 25
Overview ········································································································································································· 25
Introduction to priorities ········································································································································ 25
Priority maps ·························································································································································· 25
Priority mapping configuration tasks ··························································································································· 25
Configuring uncolored priority maps ·················································································································· 26
Configuring a port to trust packet priority for priority mapping ··············································································· 26
Changing the port priority of an interface ·················································································································· 27
Displaying and maintaining priority mapping ············································································································ 27
Port priority configuration example ······························································································································ 28
Network requirements ··········································································································································· 28
Configuration procedure ······································································································································ 28
Priority mapping table and priority marking configuration example ······································································· 28
Network requirements ··········································································································································· 28
Configuration procedure ······································································································································ 30
Configuring traffic policing, GTS, and rate limit ····································································································· 31
Overview ········································································································································································· 31
Traffic evaluation and token buckets ··················································································································· 31
Traffic policing ······················································································································································· 32
GTS ········································································································································································· 33
Rate limit ································································································································································· 33
Configuring traffic policing ··········································································································································· 34
Configuring traffic policing by using the MQC approach ··············································································· 34
Configuring traffic policing by using the non-MQC approach ········································································ 35
Configuring GTS ···························································································································································· 36
Configuring GTS by using the MQC approach ································································································· 36
Configuring GTS by using the non-MQC approach ························································································· 37
Configuring the rate limit ·············································································································································· 38
Displaying and maintaining traffic policing, GTS, and rate limit ············································································· 38
Traffic policing and GTS configuration example ········································································································ 39
Network requirements ··········································································································································· 39
Configuration procedure ······································································································································ 39
IP rate limit configuration example ······························································································································· 40
Network requirements ··········································································································································· 40
Configuration procedure ······································································································································ 41
Configuring congestion management ······················································································································ 42
Overview ········································································································································································· 42
Causes, impacts, and countermeasures of congestion ······················································································ 42
Congestion management policies ······················································································································· 42
Congestion management technique comparison ······························································································· 45
Configuring the FIFO queue size·································································································································· 46
Displaying and maintaining FIFO ································································································································ 47
Configuring WFQ ·························································································································································· 47
Displaying and maintaining WFQ ······························································································································· 47
Configuring CBQ ··························································································································································· 48
Predefined classes, traffic behaviors, and policies ···························································································· 48
Defining a class ····················································································································································· 48
Defining a traffic behavior ··································································································································· 49
Defining a QoS policy ·········································································································································· 52