QoS Configuration
363
Configure Traffic Mirroring
1
Configure monitor port
Perform the following configuration in the Ethernet Port View.
Table 375
Configure Monitor Port
Only one monitor port can be configured on one Switch. If a group of Switches form
a Fabric, only one monitor port can be configured on one Fabric.
2
Configure traffic mirroring
Perform the following configuration in the Ethernet Port View.
Table 376
Configuring Traffic Mirroring
Delete Traffic Mirroring
1
Delete traffic mirroring
Perform the following configuration in the Ethernet Port View.
Table 377
Delete Traffic Mirroring
2
Delete monitor port.
Perform the following configuration in the Ethernet Port View.
Table 378
Delete Monitor Port
For details about the command, refer to the
Command Manual
.
Setting Queue Scheduling
Queue scheduling is commonly used to resolve the problem that multiple messages
compete for resource when the network congestion happens. The queue scheduling
function puts the packet to the output queue of the port according to the 802.1p
priority of the packet. The mapping relationship between 802.1p priority and output
queue of the port is as shown in Table 379.
Table 379
Mapping between 802.1p Priority Levels and Outbound Queues
Operation
Command
Configure a monitor port.
monitor-port
Operation
Command
Configure traffic mirroring
mirrored-to { inbound | outbound } { user-group
acl_number
[ rule
rule
] | ip-group
acl_number
[
rule
rule
[ link-group
acl_number
rule
rule
] ] |
link-group
acl_number
[ rule
rule
] } { cpu |
monitor-interface }
Operation
Command
Cancel the
configuration of traffic
mirroring
undo mirrored-to { user-group
acl_number
|
acl_name
[
rule
rule
] | { ip-group {
acl_number
|
acl_name
} [
rule
rule
] | link-group {
acl_number
|
acl_name
} [
rule
rule
] }* }
Operation
Command
Delete monitor port
undo monitor
802.1p priority level
Queues
0
2
1
0
2
1
3
3
4
4
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...