Chapter 19
| Quality of Service Commands
– 446 –
Command Usage
◆
Use the
policy-map
command to specify the name of the policy map, and then
use the
class
command to configure policies for traffic that matches the criteria
defined in a class map.
◆
A policy map can contain multiple class statements that can be applied to the
same interface with the
service-policy
command.
◆
Create a Class Map (
page 445
) before assigning it to a Policy Map.
Example
This example creates a policy called “rd-policy,” uses the
class
command to specify
the previously defined “rd-class,” uses the
set
command to classify the service that
incoming packets will receive, and then uses the
police flow
command to limit the
average bandwidth to 100,000 Kbps, the burst rate to 4000 bytes, and configure the
response to drop any violating packets.
Console(config)#policy-map rd-policy
Console(config-pmap)#class rd-class
Console(config-pmap-c)#set ip dscp 3
Console(config-pmap-c)#police flow 100000 4000 conform-action transmit
violate-action drop
Console(config-pmap-c)#
class
This command defines a traffic classification upon which a policy can act, and
enters Policy Map Class configuration mode. Use the
no
form to delete a class map.
Syntax
[
no
]
class
class-map-name
class-map-name
- Name of the class map. (Range: 1-32 characters)
Default Setting
None
Command Mode
Policy Map Configuration
Command Usage
◆
Use the
policy-map
command to specify a policy map and enter Policy Map
configuration mode. Then use the
class
command to enter Policy Map Class
configuration mode. And finally, use the
set
command and one of the
police
commands to specify the match criteria, where the:
■
set phb
command sets the per-hop behavior value in matching packets.
(This modifies packet priority for internal processing only.)
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...