HP 6125XLG R2306-HP 6125XLG Blade Switch ACL and QoS Configuration Guide - Page 41

Traffic policing,

Page 41 highlights

CBS is implemented with bucket C, and EBS with bucket E. When only the CIR is used for traffic evaluation, packets are measured against the following bucket scenarios: • If bucket C has enough tokens, packets are colored green. • If bucket C does not have enough tokens but bucket E has enough tokens, packets are colored yellow. • If neither bucket C nor bucket E has sufficient tokens, packets are colored red. When both CIR and PIR are used to evaluate traffic, bucket P, which is equal to the sum of the CBS and EBS in size, is introduced. In this case, packets are measured against the following bucket scenarios: • If both bucket C and bucket P have enough tokens, packets are colored green. • If bucket C does not have enough tokens but bucket P has enough tokens, packets are colored yellow. • If bucket P does not have enough tokens, packets are colored red. You can configure traffic control policies for packets of different colors by using the traffic policing feature. Traffic policing Traffic policing supports policing the inbound traffic and the outbound traffic. A typical application of traffic policing is to supervise the specification of certain traffic entering a network and limit it within a reasonable range, or to "discipline" the extra traffic to prevent aggressive use of network resources by a certain application. For example, you can limit bandwidth for HTTP packets to less than 50% of the total. If the traffic of a certain session exceeds the limit, traffic policing can drop the packets or reset the IP precedence of the packets. Figure 7 shows an example of policing outbound traffic on an interface. Figure 7 Traffic policing Traffic policing is widely used in policing traffic entering the networks of ISPs. It can classify the policed traffic and take pre-defined policing actions on each packet depending on the evaluation result: • Forwarding the packet if the evaluation result is "conforming." • Dropping the packet if the evaluation result is "excess." 35

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109

35
CBS is implemented with bucket C, and EBS with bucket E. When only the CIR is used for traffic
evaluation, packets are measured against the following bucket scenarios:
If bucket C has enough tokens, packets are colored green.
If bucket C does not have enough tokens but bucket E has enough tokens, packets are colored
yellow.
If neither bucket C nor bucket E has sufficient tokens, packets are colored red.
When both CIR and PIR are used to evaluate traffic, bucket P, which is equal to the sum of the CBS and
EBS in size, is introduced. In this case, packets are measured against the following bucket scenarios:
If both bucket C and bucket P have enough tokens, packets are colored green.
If bucket C does not have enough tokens but bucket P has enough tokens, packets are colored
yellow.
If bucket P does not have enough tokens, packets are colored red.
You can configure traffic control policies for packets of different colors by using the traffic policing
feature.
Traffic policing
Traffic policing supports policing the inbound traffic and the outbound traffic.
A typical application of traffic policing is to supervise the specification of certain traffic entering a
network and limit it within a reasonable range, or to "discipline" the extra traffic to prevent aggressive
use of network resources by a certain application. For example, you can limit bandwidth for HTTP
packets to less than 50% of the total. If the traffic of a certain session exceeds the limit, traffic policing can
drop the packets or reset the IP precedence of the packets.
Figure 7
shows an example of policing
outbound traffic on an interface.
Figure 7
Traffic policing
Traffic policing is widely used in policing traffic entering the networks of ISPs. It can classify the policed
traffic and take pre-defined policing actions on each packet depending on the evaluation result:
Forwarding the packet if the evaluation result is "conforming."
Dropping the packet if the evaluation result is "excess."