4
IntServ model ························································································································ 25
DiffServ model ······················································································································· 25
QoS techniques ························································································································· 25
Applying QoS techniques in a network ···················································································· 26
QoS processing flow in an AC ································································································· 27
3
QoS configuration approaches ··························································································28
Non-policy approach ················································································································· 28
Policy approach ························································································································ 28
Configuring a QoS policy ············································································································ 28
Defining a class ····················································································································· 29
Defining a traffic behavior ······································································································ 30
Defining a policy ··················································································································· 31
Applying the QoS policy ········································································································· 32
Displaying and maintaining QoS policies ················································································· 34
4
Priority mapping configuration ···························································································35
Priority mapping overview ··········································································································· 35
Priority mapping tables ··············································································································· 35
Priority mapping configuration tasks ···························································································· 37
Configuring priority mapping······································································································· 38
Configuring a priority mapping table ······················································································ 38
Configuring a port to trust packet priority for priority mapping··················································· 39
Configuring the port priority of a port ······················································································ 39
Displaying and maintaining priority mapping ················································································ 40
Priority mapping configuration examples (on WX Series access controllers)····································· 41
Trusted priority type configuration example ············································································· 42
Port priority configuration example ························································································· 43
5
Traffic policing and line rate configuration ···········································································45
Traffic evaluation and token bucket ···························································································· 45
Token bucket features ··········································································································· 45
Evaluating traffic with the token bucket ·················································································· 45