ii
Configuring priority mapping ····························································· 23
Overview ································································································································ 23
Introduction to priorities ······································································································ 23
Priority maps ···················································································································· 23
Priority mapping configuration tasks ····························································································· 23
Configuring a priority map ·········································································································· 24
Configuring a port to trust packet priority for priority mapping ····························································· 24
Changing the port priority of an interface ······················································································· 25
Displaying and maintaining priority mapping ·················································································· 25
Priority mapping configuration examples ······················································································· 25
Network requirements ········································································································ 25
Configuration procedure ····································································································· 26
Configuring traffic policing ································································ 27
Overview ································································································································ 27
Traffic evaluation and token buckets ······················································································ 27
Traffic policing ·················································································································· 27
Configuration procedure ············································································································ 28
Configuring traffic policing by using the MQC approach ····························································· 28
Configuring traffic policing for a user profile by using the non-MQC approach ································· 29
Displaying and maintaining traffic policing ····················································································· 30
Configuring traffic filtering ································································ 31
Configuration procedure ············································································································ 31
Configuration example ·············································································································· 31
Network requirements ········································································································ 31
Configuration procedure ····································································································· 32
Configuring priority marking ······························································ 33
Configuration procedure ············································································································ 33
Configuration example ·············································································································· 34
Network requirements ········································································································ 34
Configuration procedure ····································································································· 34
Appendixes ··················································································· 36
Appendix A Acronym ················································································································ 36
Appendix B Default priority maps ································································································· 36
Appendix C Introduction to packet precedences ············································································· 38
IP precedence and DSCP values ·························································································· 38
802.1p priority ··················································································································· 39
802.11e priority ················································································································· 40
Configuring time ranges ··································································· 41
Feature and hardware compatibility ····························································································· 41
Configuration procedure ············································································································ 42
Displaying and maintaining time ranges ························································································ 42
Time range configuration example ······························································································· 42
Index ··························································································· 44