C
HAPTER
36
| Quality of Service Commands
– 837 –
■
police
commands define parameters such as the maximum
throughput, burst rate, and response to non-conforming traffic.
◆
Up to 16 classes can be included in a policy map.
E
XAMPLE
This example creates a policy called “rd-policy,” uses the
class
command
to specify the previously defined “rd-class,” uses the
set phb
command to
classify the service that incoming packets will receive, and then uses the
police flow
command to limit the average bandwidth to 100,000 Kbps, the
burst rate to 4,000 bytes, and configure the response to drop any violating
packets.
Console(config)#policy-map rd-policy
Console(config-pmap)#class rd-class
Console(config-pmap-c)#set phb 3
Console(config-pmap-c)#police flow 10000 4000 conform-action transmit
violate-action drop
Console(config-pmap-c)#
police flow
This command defines an enforcer for classified traffic based on the
metered flow rate. Use the no form to remove a policer.
S
YNTAX
[
no
]
police flow
committed-rate committed-burst
conform-action
transmit
violate-action
{
drop
|
new-dscp
}
committed-rate
- Committed information rate (CIR) in kilobits per
second. (Range: 64-1000000 kbps at a granularity of 64 kbps or
maximum port speed, whichever is lower)
committed-burst
- Committed burst size (BC) in bytes.
(Range: 4000-16000000 at a granularity of 4k bytes)
conform-action
- Action to take when packet is within the CIR and
BC. (There are enough tokens to service the packet, the packet is
set green).
violate-action
- Action to take when packet exceeds the CIR and
BC. (There are not enough tokens to service the packet, the packet
is set red).
transmit
- Transmits without taking any action.
drop
- Drops packet as required by violate-action.
new-dscp
- Differentiated Service Code Point (DSCP) value.
(Range: 0-63)
D
EFAULT
S
ETTING
None
Summary of Contents for ES3510MA
Page 1: ...Management Guide www edge core com 8 Port Layer 2 Fast Ethernet Switch...
Page 4: ...ABOUT THIS GUIDE 4...
Page 30: ...CONTENTS 30...
Page 40: ...FIGURES 40...
Page 46: ...TABLES 46...
Page 48: ...SECTION I Getting Started 48...
Page 72: ...SECTION II Web Configuration 72...
Page 88: ...CHAPTER 3 Using the Web Interface Navigating the Web Browser Interface 88...
Page 116: ...CHAPTER 4 Basic Management Tasks Resetting the System 116...
Page 154: ...CHAPTER 5 Interface Configuration VLAN Trunking 154...
Page 216: ...CHAPTER 8 Spanning Tree Algorithm Configuring Interface Settings for MSTP 216...
Page 350: ...CHAPTER 14 Security Measures DHCP Snooping 350...
Page 440: ...CHAPTER 17 IP Services Displaying the DNS Cache 440...
Page 484: ...CHAPTER 19 Using the Command Line Interface CLI Command Groups 484...
Page 554: ...CHAPTER 21 System Management Commands Switch Clustering 554...
Page 574: ...CHAPTER 22 SNMP Commands 574...
Page 582: ...CHAPTER 23 Remote Monitoring Commands 582...
Page 636: ...CHAPTER 24 Authentication Commands Management IP Filter 636...
Page 736: ...CHAPTER 29 Port Mirroring Commands RSPAN Mirroring Commands 736...
Page 816: ...CHAPTER 34 VLAN Commands Configuring Voice VLANs 816...
Page 830: ...CHAPTER 35 Class of Service Commands Priority Commands Layer 3 and 4 830...
Page 848: ...CHAPTER 36 Quality of Service Commands 848...
Page 900: ...CHAPTER 38 LLDP Commands 900...
Page 910: ...CHAPTER 39 Domain Name Service Commands 910...
Page 916: ...CHAPTER 40 DHCP Commands DHCP Client 916...
Page 948: ...CHAPTER 41 IP Interface Commands IPv6 Interface 948...
Page 950: ...SECTION IV Appendices 950...
Page 982: ...INDEX 982...
Page 983: ......