
1-29
Follow these steps to configure traffic policing for the incoming packets matching the
specific ACL rules in a port group:
To do…
Use the command…
Remarks
Enter system
view
system-view
—
Enter port group
view
port-group
group-id
—
Configure traffic
policing
traffic-limit
inbound
acl-rule target-rate
[
conform con-action
] [
exceed
exceed-action
] [
meter-statistic
]
Required
Disabled by default.
Clear traffic
policing
statistics
reset traffic-limit
inbound
acl-rule
Optional
4) Configuring traffic policing for a port
Follow these steps to configure traffic policing for the incoming packets matching the
specific ACL rules on a port:
To do…
Use the command…
Remarks
Enter system view
system-view
—
Enter Ethernet
port view
interface
interface-type
interface-number
—
Configure traffic
policing
traffic-limit
inbound
acl-rule target-rate
[
conform con-action
] [
exceed
exceed-action
] [
meter-statistic
]
Required
Disabled by default.
Clear traffic
policing statistics
reset traffic-limit
inbound
acl-rule
Optional
User-defined traffic classification rules configured for traffic policing in the global scope or
for a VLAN take precedence over the default rules used for processing protocol packets.
The device will execute traffic policing preferentially, which may affect device management
implemented through Telnet and so on.
Configuration example
# Configure traffic policing for the packets from network segment 10.1.1.0/24, setting the
rate limit to 128 kbps and marking the inbound packets exceeding the rate limit with DSCP
value 56 (assume that GigabitEthernet 1/0/1 carries VLAN 2 and is connected to network
segment 10.1.1.0/24).
1) Method I: configure traffic policing for port GigabitEthernet 1/0/1
Summary of Contents for H3C S5100-SI
Page 129: ...1 10...
Page 522: ...ii...
Page 701: ...3 2...
Page 797: ...1 20 0 00 packet loss round trip min avg max 50 60 70 ms...
Page 827: ...i Table of Contents 1 Acronyms 1 1...