308
C
HAPTER
28: Q
O
S C
ONFIGURATION
Configuring to Trust the
802.1p Precedence of
the Received Packets
You can configure the switch to trust the 802.1p precedence of the received
packets. In this case, the priority of the receiving port is not used as the 802.1p
precedence of the received packet.
Configuration prerequisites
To trust the 802.1p precedence of the received packets is determined.
Configuration procedure
Configuration example
# Configure the switch to trust the 802.1p precedence of the received packets.
<4210> system-view
[4210] priority trust
Configuring Priority
Trust Mode
Refer to section 1.2.3 "Priority Trust Mode" for introduction to priority trust
mode.
Configuration prerequisites
The priority trust mode to be adopted is determined.
Configuration procedure
Configuration example
# Configure the switch to trust the DSCP precedence of the received packets.
<4210> system-view
[4210] priority-trust dscp
Table 228
Configure to trust the 802.1p precedence of the received packets
Operation
Command
Description
Enter system view
system-view
-
Configure to trust the
802.1p precedence of the
received packets
priority trust
Required
By default, for a packet with an 802.1q tag
header, the priority of the receiving port is
used as the 802.1p precedence of the
received packets.
Table 229
Configure the priority trust mode
Operation
Command
Description
Enter system view
system-view
-
Configure the priority
trust mode
priority-trust { cos |
dscp | ip-precedence }
Required
By default, the switch trusts the 802.1p
precedence of the received packets. In this
case, the switch obtains the local
precedence by looking up the 802.1p
precedence in the
802.1p-precedence-to-local-precedence
mapping table and then assigns the local
precedence to the packet.
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...