Network Router User Manual
Table Of Contents
- Router Platform User Interface Reference
- NAT Policy Page
- Router Interfaces Page
- Advanced Interface Settings Page
- AIM-IPS Interface Settings Page
- Dialer Policy Page
- ADSL Policy Page
- SHDSL Policy Page
- PVC Policy Page
- PPP/MLP Policy Page
- AAA Policy Page
- Accounts and Credential s Policy Page
- Bridging Policy Page
- Clock Policy Page
- CPU Policy Page
- HTTP Policy Page
- Console Policy Page
- VTY Policy Page
- Secure Shell Policy Page
- SNMP Policy Page
- DNS Policy Page
- Hostname Policy Page
- Memory Policy Page
- Secure Device Provisioning Policy Page
- DHCP Policy Page
- NTP Policy Page
- 802.1x Policy Page
- Network Admission Control Policy Page
- Logging Setup Policy Page
- Syslog Servers Policy Page
- Quality of Service Policy Page
- BGP Routing Policy Page
- EIGRP Routing Policy Page
- OSPF Interface Policy Page
- OSPF Process Policy Page
- RIP Routing Policy Page
- Static Routing Policy Page

Appendix K Router Platform User Interface Reference
Quality of Service Policy Page
K-216
User Guide for Cisco Security Manager 3.2
OL-16066-01
Excess Burst The excess burst size, which determines how large traffic bursts can be
before all traffic exceeds the rate limit. In the token bucket algorithm, it
represents the full size of the second (exceed) token bucket.
The range of valid values is determined by the CIR:
• When the CIR is defined by percentage—Valid values range from 1 to
2000 milliseconds.
• When the CIR is defined by an absolute value—Valid values range from
1000-512000000 bytes.
Conform action The action to take on packets that conform to the rate limit:
• transmit—Transmits the packet.
• set-prec-transmit—Sets the IP precedence to a value you specify (0 to 7)
and then sends the packet. Not available on the control plane.
• set-dscp-transmit—Sets the DSCP to a value you specify (0 to 63) and
then sends the packet. Not available on the control plane.
• drop—Drops the packet.
Exceed action The action to take on packets that exceed the rate limit, but can be handled
using the second (exceed) token bucket.
The actions available for selection depend on the defined conform action.
For example, if you select one of the set options as the conform action, you
cannot select transmit as the exceed action. If you select drop as the conform
action, then you must also select drop as the exceed action.
Violate action The action to take on packets that cannot be serviced by either the conform
bucket or the exceed bucket.
The actions available for selection depend on the defined exceed action. For
example, if you select one of the set options as the exceed action, you cannot
select transmit as the violate action. If you select drop as the exceed action,
then you must also select drop as the violate action.
Table K-96 QoS Class Dialog Box—Policing Tab (Continued)










