364
C
HAPTER
19: ACL C
ONFIGURATION
Configuring the Mapping Relationship Between COS and Local Precedence
Using the following commands, you can configure the maps.
Perform the following configuration in System View.
Table 380
Map Configuration
By default, the Switch uses the default mapping relationship.
Configuring the Queue Scheduler.
Perform the following configuration in the Ethernet Port View.
Table 381
Configure the Queue Scheduling Algorithm
The Switch supports three types of queue schedulers, that is, strict-priority, WFQ and
WRR.
By default, the Switch uses the WRR algorithm.
For details about the command, refer to the Command Reference Manual.
Setting Traffic Limit
Traffic limit refers to rate limit based on traffic. If the traffic threshold is exceeded,
corresponding measures will be taken, for example, dropping the excessive packets or
re-defining their priority levels.
Perform the following configurations in the Ethernet Port View.
Table 382
Setting Traffic Limit
5
5
6
6
7
7
Operation
Command
Configure “COS
->Local-precedence” map
qos cos-local-precedence-map
cos0_map_local_prec cos1_map_local_prec
cos2_map_local_prec cos3_map_local_prec
cos4-map-local-prec cos5_map_local-prec
cos6_map_local_prec cos7_map_local_prec
Restore its default value
undo qos cos-local-precedence-map
Operation
Command
Configure the queue
scheduling algorithm
queue-scheduler { wfq
queue1_width queue2_width
queue3_width queue4_width queue5_width queue6_width
queue7_width queue8_width
| wrr
queue1_weight
queue2_weight queue3_weight queue4_weight
queue5_weight queue6_weight queue7_weight
queue8_weight
}
Restore the default
queue scheduling
algorithm
undo queue-scheduler
802.1p priority level
Queues
Operation
Command
Set traffic limit
traffic-limit inbound { user-group
acl_number
[ rule
rule
] | ip-group
acl_number
[ rule
rule
[ link-group
acl_number
rule
rule
] ] | link-group
acl_number
[ rule
rule
] }
target_rate
[ exceed
action
]
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...