QoS Configuration
365
You should first define an ACL before this configuration task.
The granularity of traffic limit is 64kbps. If the
target-rate
user input is in ( N*64,
(N+1)*64], in which N is a natural number, Switch automaticaly sets (N+1)*64 as the
parameter value.
This configuration achieves rate control for those packets that match the ACL. If the
traffic rate threshold is exceeded, corresponding measures will be taken, for example,
dropping excessive packets.
Setting Line Limit
Line limit refers to rate limit based on the port, that is, limiting the total rate at the
port. The granularity of line rate is 64 kbps.
Perform the following configurations in the Ethernet Port View.
Table 383
Setting Line Rate
Relabeling Priority Level
This configuration re-labels priority level for the packets that match ACL. The new
priority label can be put in the priority domain in the header.
Perform the following configurations in the Ethernet Port View.
Table 384
Relabeling Priority Level
Configuring Traffic
Statistics
The traffic statistics function is used for counting the data packets of the specified
traffic, that is, this function counts the transmitted data which matches the ACL rules.
After the traffic statistics function is configured, the user can use
display
qos-interface traffic-statistic
command to display the statistics information.
You can use the following command to configure traffic statistics.
Perform the following configuration in the Ethernet Port View.
Remove traffic
limit
undo traffic-limit inbound { user-group
acl_number
[
rule
rule
] | ip-group
acl-number
[ rule
rule
[ link-group
acl_number
rule
rule
] ] | link-group
acl_number
[ rule
rule
] }
Operation
Command
Operation
Command
Set line limit
line-rate { inbound | outbound }
target_rate
Remove line limit
undo line-rate{ inbound | outbound }
Operation
Command
Relabel traffic priority
traffic-priority { inbound | outbound } { user-group
acl-number
[ rule
rule
] | ip-group
acl_number
[ rule
rule
[ link-group
acl_number
rule
rule
] ] |
link-group
acl_number
[ rule
rule
] } { { dscp
dscp_value
| ip-precedence {
pre_value
| from-cos }
} | cos {
pre_value
|
from-ipprec } | local-precedence
pre_value
}*
Remove the setting
undo traffic-priority { inbound | outbound } {
user-group
acl_number
[ rule
rule
] | ip-group
acl-number
[ rule
rule
[ link-group
acl_number
rule
rule
] ] | link-group
acl_number
[ rule
rule
] }
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...