ii 
Configuring priority mapping ····························································· 23 
Overview ································································································································ 23 
Introduction to priorities ······································································································ 23 
Priority maps ···················································································································· 23 
Priority mapping configuration tasks ····························································································· 23 
Configuring a priority map ·········································································································· 24 
Configuring a port to trust packet priority for priority mapping ····························································· 24 
Changing the port priority of an interface ······················································································· 25 
Displaying and maintaining priority mapping ·················································································· 25 
Priority mapping configuration examples ······················································································· 25 
Network requirements ········································································································ 25 
Configuration procedure ····································································································· 26 
Configuring traffic policing ································································ 27 
Overview ································································································································ 27 
Traffic evaluation and token buckets ······················································································ 27 
Traffic policing ·················································································································· 27 
Configuration procedure ············································································································ 28 
Configuring traffic policing by using the MQC approach ····························································· 28 
Configuring traffic policing for a user profile by using the non-MQC approach ································· 29 
Displaying and maintaining traffic policing ····················································································· 30 
Configuring traffic filtering ································································ 31 
Configuration procedure ············································································································ 31 
Configuration example ·············································································································· 31 
Network requirements ········································································································ 31 
Configuration procedure ····································································································· 32 
Configuring priority marking ······························································ 33 
Configuration procedure ············································································································ 33 
Configuration example ·············································································································· 34 
Network requirements ········································································································ 34 
Configuration procedure ····································································································· 34 
Appendixes ··················································································· 36 
Appendix A Acronym ················································································································ 36 
Appendix B Default priority maps ································································································· 36 
Appendix C Introduction to packet precedences ············································································· 38 
IP precedence and DSCP values ·························································································· 38 
802.1p priority ··················································································································· 39 
802.11e priority ················································································································· 40 
Configuring time ranges ··································································· 41 
Feature and hardware compatibility ····························································································· 41 
Configuration procedure ············································································································ 42 
Displaying and maintaining time ranges ························································································ 42 
Time range configuration example ······························································································· 42 
Index ··························································································· 44