
ii
Priority mapping configuration examples·········································································································28
Priority trust mode and port priority configuration example······································································28
Priority mapping table configuration example··························································································29
Configuring traffic policing, traffic shaping, and rate limit······························31
Overview··························································································································································31
Traffic evaluation and token buckets········································································································31
Traffic policing··········································································································································32
Traffic shaping··········································································································································33
Rate limit··················································································································································33
Configuration task list·······································································································································34
Configuring traffic policing································································································································35
Configuring traffic policing by using the policy approach·········································································35
Configuring traffic policing by using the non-policy approach··································································35
Configuring GTS ··············································································································································36
Configuring GTS by using the policy approach························································································37
Configuring GTS by using the non-policy approach·················································································37
Configuring the rate limit··································································································································38
Configuring packet resequencing ····················································································································39
Displaying and maintaining traffic policing, GTS, and rate limit·······································································39
Traffic policing and GTS configuration examples ····························································································39
Traffic policing and GTS configuration example ······················································································39
IP rate limiting configuration example······································································································41
Configuring congestion management ···························································42
Overview··························································································································································42
Causes, impacts, and countermeasures of congestion ···········································································42
Congestion management policies············································································································42
Congestion management technique comparison·····················································································47
Configuring the FIFO queue size·····················································································································49
Configuration example·····························································································································50
Configuring PQ ················································································································································50
Configuration restrictions and guidelines·································································································50
Configuration procedure···························································································································50
PQ configuration example························································································································51
Configuring CQ ················································································································································52
CQ configuration example························································································································52
Configuring WFQ ·············································································································································53
WFQ configuration example·····················································································································53
Configuring CBQ··············································································································································54
Predefined classes, traffic behaviors, and policies ··················································································54
Defining a class········································································································································54
Defining a traffic behavior ························································································································55
Defining a QoS policy·······························································································································58
Applying the QoS policy···························································································································58
Configuring the maximum available interface bandwidth·········································································59
Setting the maximum reserved bandwidth as a percentage of available bandwidth································60
Displaying and maintaining CBQ ·············································································································61
CBQ configuration example·····················································································································61
Configuring RTP priority queuing·····················································································································62
Configuration procedure···························································································································62
RTP priority queuing configuration example····························································································63
Configuring QoS tokens···································································································································63
Configuration procedure···························································································································64
QoS token configuration example············································································································64
Configuring packet information pre-extraction ·································································································64
Configuration procedure···························································································································64
Configuration example·····························································································································65
Configuring hardware congestion management ···········································66
Overview··························································································································································66
Causes, impacts, and countermeasures··································································································66