
Chapter 20
| Quality of Service Commands
– 533 –
Example
This example creates a policy called “rd-policy,” uses the
class
command to specify
the previously defined “rd-class,” uses the
command to classify the service
that incoming packets will receive, and then uses the
command to limit
the average bandwidth to 100,000 Kbps, the burst rate to 4,000 bytes, and
configure the response to drop any violating packets.
Console(config)#policy-map rd-policy
Console(config-pmap)#class rd-class
Console(config-pmap-c)#set phb 3
Console(config-pmap-c)#police flow 10000 4000 conform-action transmit
violate-action drop
Console(config-pmap-c)#
police flow
This command defines an enforcer for classified traffic based on the metered flow
rate. Use the no form to remove a policer.
Syntax
[
no
]
police flow
committed-rate committed-burst
conform-action
{
transmit
|
new-dscp
}
violate-action
{
drop
|
new-dscp
}
committed-rate
- Committed information rate (CIR) in kilobits per second.
(Range: 0-40000000 kbps or maximum port speed, whichever is lower)
committed-burst
- Committed burst size (BC) in bytes.
(Range: 1000-128000000 bytes)
conform-action
- Action to take when packet is within the CIR and BC.
(There are enough tokens to service the packet, the packet is set green).
violate-action
- Action to take when packet exceeds the CIR and BC. (There
are not enough tokens to service the packet, the packet is set red).
transmit
- Transmits without taking any action.
drop
- Drops packet as required by violate-action.
new-dscp
- Differentiated Service Code Point (DSCP) value. (Range: 0-63)
Default Setting
None
Command Mode
Policy Map Class Configuration
Command Usage
◆
You can configure up to 16 policers (i.e., class maps) for ingress ports.
◆
Policing is based on a token bucket, where bucket depth (i.e., the maximum
burst before the bucket overflows) is by specified the
committed-burst
field, and
the average rate tokens are added to the bucket is by specified by the
Summary of Contents for AS5700-54X
Page 42: ...Contents 42...
Page 44: ...Figures 44...
Page 52: ...Tables 52...
Page 54: ...Section I Getting Started 54...
Page 80: ...Chapter 1 Initial Switch Configuration Setting the System Clock 80...
Page 210: ...Chapter 6 Remote Monitoring Commands 210...
Page 358: ...Chapter 9 Access Control Lists ACL Information 358...
Page 418: ...Chapter 12 Port Mirroring Commands RSPAN Mirroring Commands 418...
Page 436: ...Chapter 15 UniDirectional Link Detection Commands 436...
Page 442: ...Chapter 16 Address Table Commands 442...
Page 506: ...Chapter 18 VLAN Commands Configuring VXLAN Tunneling 506...
Page 526: ...Chapter 19 Class of Service Commands Priority Commands Layer 3 and 4 526...
Page 544: ...Chapter 20 Quality of Service Commands 544...
Page 652: ...Chapter 22 Multicast Filtering Commands MLD Proxy Routing 652...
Page 680: ...Chapter 23 LLDP Commands 680...
Page 722: ...Chapter 24 CFM Commands Delay Measure Operations 722...
Page 732: ...Chapter 25 Domain Name Service Commands 732...
Page 790: ...Chapter 27 IP Interface Commands ND Snooping 790...
Page 1072: ...Section III Appendices 1072...
Page 1102: ...List of CLI Commands 1102...
Page 1115: ......
Page 1116: ...AS5700 54X AS6700 32X E032016 ST R02 149100000198A...