Operation Manual – QoS-QoS Profile
H3C S3600 Series Ethernet Switches-Release 1510 Chapter 1
QoS Configuration
1-5
The precedence is called 802.1p priority because the related applications of this
precedence are defined in detail in the 802.1p specifications.
1.1.4 Priority of Protocol Packets
Protocol packets carry their own priority. You can perform QoS actions on protocol
packets by setting their priorities.
1.1.5 Priority Remark
The priority remark function is to use ACL rules in traffic identification and remark the
priority for the packets matching the ACL rules.
1.1.6 Packet Filter
Packet filter means filtering the service traffic. For example, in the operation of dropping
packets, the service traffic matching the traffic classification rule is dropped and the
other traffic is permitted. The Ethernet switch adopts a complicated traffic classification
rule to filter the packets based on much information and to drop these useless,
unreliable, and doubtful packets. Therefore, the network security is enhanced.
The two critical steps in the packet filter operation are:
Step1: Classify the inbound packets to the port by the set classification rule.
Step 2: Perform the filter——drop operation on the classified packets.
The packet filter function can be implemented by applying ACL rules on the port. Refer
to the description in the ACL module for detailed configurations.
1.1.7 Port Rate Limit
Port rate limit is port-based rate limit. It limits the total rate of outbound packets on a
port.
1.1.8 TP
The network will be made more congested by plenty of continuous burst packets if the
traffic of each user is not limited. The traffic of each user must be limited in order to
make better use of the limited network resources and provide better service for more
users. For example, a traffic can be limited to get only its committed resources during a
time period to avoid network congestion caused by excessive bursts.
TP (traffic policing) is a kind of traffic control policy to limit the traffic and its resource
usage by supervising the traffic specification. The regulation policy is implemented
according to the evaluation result on the premise of knowing whether the traffic
exceeds the specification when TP or TS is performed. The token bucket is generally
adopted in the evaluation of traffic specification.