668
C
HAPTER
61: Q
O
S C
ONFIGURATION
Configuring Priority to
Be Used When a Packet
Enters an Output Queue
You can select the corresponding priority as the basis for a packet to enter an
output queue on a port as required.
Configuration prerequisites
The priority to be used when a packet enter a queue is specified.
Configuration procedure
7 7
Table 535
The mapping relationship between IP precedence values and queues
IP precedence
Queue
0 0
1 1
2 2
3 3
4 4
5 5
6 6
7 7
Table 536
The mapping relationship between DSCP precedence values and queues
DSCP precedence
value
Name of type-A I/O
Module
Name of
non-type-A I/O
Module Queue
0 to 7
be(0)
be(0)
0
8 to 15
cs1(8), af1(10) cs1(8),
af11(10),
af12(12), af13(14)
1
16 to 23
cs2(16), af2(18)
cs2(16), af21(18),
af22(20), af23(22)
2
24 to 31
cs3(24), af3(26)
cs3(24), af31(26),
af32(28), af33(30)
3
32 to 39
cs4(32), af4(34)
cs4(32), af41(34) ,
af42(36) , af43(38)
4
40 to 47
cs5(40), ef(46)
cs5(40), ef(46)
5
47 to 55
cs6(48)
cs6(48)
6
56 to 63
cs7(56)
cs7(56)
7
Table 534
The mapping relationship between the local precedence values and queues
Local precedence
Queue
Table 537
Configure the priority to be used when a packet enters a queue
Operation Command Description
Enter system view
system-view
-
Configure the priority to be
used when a packet enters an
output queue
priority-trust
{
dscp
|
ip-precedence
|
cos
|
local-precedence
}
Required
By default, the local
precedence is used when a
packet enter an output queue
Summary of Contents for Switch 7754
Page 32: ...32 CHAPTER 1 CLI OVERVIEW ...
Page 70: ...70 CHAPTER 5 LOGGING IN USING MODEM ...
Page 76: ...76 CHAPTER 7 LOGGING IN THROUGH NMS ...
Page 86: ...86 CHAPTER 9 CONFIGURATION FILE MANAGEMENT ...
Page 120: ...120 CHAPTER 13 ISOLATE USER VLAN CONFIGURATION ...
Page 126: ...126 CHAPTER 14 SUPER VLAN ...
Page 136: ...136 CHAPTER 16 IP PERFORMANCE CONFIGURATION ...
Page 152: ...152 CHAPTER 17 IPX CONFIGURATION ...
Page 164: ...164 CHAPTER 19 QINQ CONFIGURATION ...
Page 172: ...172 CHAPTER 21 SHARED VLAN CONFIGURATION ...
Page 182: ...182 CHAPTER 22 PORT BASIC CONFIGURATION ...
Page 198: ...198 CHAPTER 24 PORT ISOLATION CONFIGURATION ...
Page 208: ...208 CHAPTER 25 PORT SECURITY CONFIGURATION ...
Page 224: ...224 CHAPTER 27 DLDP CONFIGURATION ...
Page 232: ...232 CHAPTER 28 MAC ADDRESS TABLE MANAGEMENT ...
Page 240: ...240 CHAPTER 29 CENTRALIZED MAC ADDRESS AUTHENTICATION CONFIGURATION ...
Page 280: ...280 CHAPTER 30 MSTP CONFIGURATION ...
Page 348: ...348 CHAPTER 35 IS IS CONFIGURATION ...
Page 408: ...408 CHAPTER 39 802 1X CONFIGURATION ...
Page 412: ...412 CHAPTER 40 HABP CONFIGURATION ...
Page 422: ...422 CHAPTER 41 MULTICAST OVERVIEW ...
Page 426: ...426 CHAPTER 42 GMRP CONFIGURATION ...
Page 480: ...480 CHAPTER 47 PIM CONFIGURATION ...
Page 506: ...506 CHAPTER 48 MSDP CONFIGURATION ...
Page 552: ...552 CHAPTER 51 TRAFFIC ACCOUNTING CONFIGURATION ...
Page 570: ...570 CHAPTER 53 HA CONFIGURATION ...
Page 582: ...582 CHAPTER 54 ARP CONFIGURATION SwitchA arp protective down recover interval 200 ...
Page 622: ...622 CHAPTER 58 DHCP RELAY AGENT CONFIGURATION ...
Page 684: ...684 CHAPTER 61 QOS CONFIGURATION ...
Page 718: ...718 CHAPTER 63 CLUSTER ...
Page 738: ...738 CHAPTER 67 UDP HELPER CONFIGURATION ...
Page 752: ...752 CHAPTER 69 RMON CONFIGURATION ...
Page 772: ...772 CHAPTER 70 NTP CONFIGURATION ...
Page 796: ...796 CHAPTER 72 FILE SYSTEM MANAGEMENT ...
Page 802: ...802 CHAPTER 73 BIMS CONFIGURATION ...
Page 814: ...814 CHAPTER 74 FTP AND TFTP CONFIGURATION ...
Page 830: ...830 CHAPTER 75 INFORMATION CENTER ...
Page 836: ...836 CHAPTER 76 DNS CONFIGURATION ...
Page 852: ...852 CHAPTER 77 BOOTROM AND HOST SOFTWARE LOADING ...
Page 858: ...858 CHAPTER 78 BASIC SYSTEM CONFIGURATION DEBUGGING ...