HP 6125G HP 6125G & 6125G/XG Blade Switches ACL and QoS Configuration - Page 4

Configuring a priority mapping table, ii

Page 4 highlights

Configuration procedure 19 Defining a traffic behavior 20 Defining a policy 21 Configuration restrictions and guidelines 21 Configuration procedure 21 Applying the QoS policy 21 Applying the QoS policy to an interface 22 Applying the QoS policy to online users 22 Applying the QoS policy to a VLAN 23 Applying the QoS policy globally 23 Displaying and maintaining QoS policies 23 Configuring priority mapping 25 Overview 25 Types of priorities 25 Priority mapping tables 25 Priority trust mode on a port 26 Priority mapping procedure 26 Configuration guidelines 27 Configuring a priority mapping table 27 Configuring a port to trust packet priority for priority mapping 27 Changing the port priority of an interface 27 Displaying priority mappings 28 Priority trust mode configuration example 28 Network requirements 28 Configuration procedure 29 Priority mapping table and priority marking configuration example 29 Network requirements 29 Configuration procedure 30 Configuring traffic policing, traffic shaping, and line rate 32 Overview 32 Traffic evaluation and token buckets 32 Traffic policing 33 Traffic shaping 34 Line rate 34 Configuring traffic policing 35 Configuration restrictions and guidelines 35 Configuration procedure 35 Configuring GTS 36 Configuring the line rate 36 Displaying and maintaining traffic policing, GTS, and line rate 37 Traffic policing configuration example 37 Network requirements 37 Configuration procedures 38 Configuring congestion management 40 Overview 40 Congestion management techniques 40 SP queuing 40 WRR queuing 41 WFQ queuing 42 SP+WRR queuing 43 SP+WFQ queuing 43 Configuring SP queuing 43 Configuration procedure 43 ii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84

ii
Configuration procedure ······································································································································ 19
Defining a traffic behavior ············································································································································ 20
Defining a policy ···························································································································································· 21
Configuration restrictions and guidelines ··········································································································· 21
Configuration procedure ······································································································································ 21
Applying the QoS policy··············································································································································· 21
Applying the QoS policy to an interface ············································································································ 22
Applying the QoS policy to online users ············································································································ 22
Applying the QoS policy to a VLAN ··················································································································· 23
Applying the QoS policy globally ······················································································································· 23
Displaying and maintaining QoS policies ·················································································································· 23
Configuring priority mapping ··································································································································· 25
Overview········································································································································································· 25
Types of priorities ·················································································································································· 25
Priority mapping tables ········································································································································· 25
Priority trust mode on a port································································································································· 26
Priority mapping procedure ································································································································· 26
Configuration guidelines ··············································································································································· 27
Configuring a priority mapping table
·························································································································· 27
Configuring a port to trust packet priority for priority mapping ··············································································· 27
Changing the port priority of an interface ·················································································································· 27
Displaying priority mappings ······································································································································· 28
Priority trust mode configuration example ··················································································································· 28
Network requirements··········································································································································· 28
Configuration procedure ······································································································································ 29
Priority mapping table and priority marking configuration example ······································································· 29
Network requirements··········································································································································· 29
Configuration procedure ······································································································································ 30
Configuring traffic policing, traffic shaping, and line rate ····················································································· 32
Overview········································································································································································· 32
Traffic evaluation and token buckets ··················································································································· 32
Traffic policing ······················································································································································· 33
Traffic shaping ······················································································································································· 34
Line rate ·································································································································································· 34
Configuring traffic policing ··········································································································································· 35
Configuration restrictions and guidelines ··········································································································· 35
Configuration procedure ······································································································································ 35
Configuring GTS ···························································································································································· 36
Configuring the line rate ··············································································································································· 36
Displaying and maintaining traffic policing, GTS, and line rate ·············································································· 37
Traffic policing configuration example ························································································································ 37
Network requirements··········································································································································· 37
Configuration procedures····································································································································· 38
Configuring congestion management ······················································································································ 40
Overview········································································································································································· 40
Congestion management techniques ··························································································································· 40
SP queuing ····························································································································································· 40
WRR queuing ························································································································································· 41
WFQ queuing ························································································································································ 42
SP+WRR queuing ·················································································································································· 43
SP+WFQ queuing ················································································································································· 43
Configuring SP queuing ················································································································································ 43
Configuration procedure ······································································································································ 43