Setup Guide

Test CAM Usage............................................................................................................................................................225
View CAM Proles.........................................................................................................................................................225
View CAM-ACL Settings.............................................................................................................................................. 225
View CAM Usage...........................................................................................................................................................226
Conguring CAM Threshold and Silence Period........................................................................................................226
Setting CAM Threshold and Silence Period......................................................................................................... 226
CAM Optimization..........................................................................................................................................................227
Troubleshoot CAM Proling..........................................................................................................................................227
CAM Prole Mismatches........................................................................................................................................ 227
QoS CAM Region Limitation...................................................................................................................................228
Syslog Error When the Table is Full....................................................................................................................... 228
Syslog Warning Upon 90 Percent Utilization of CAM.........................................................................................228
Syslog Warning for Discrepancies Between Congured Extended Prexes....................................................228
Unied Forwarding Table (UFT) Modes......................................................................................................................228
Conguring UFT Modes......................................................................................................................................... 229
10 Control Plane Policing (CoPP)................................................................................................................. 230
Congure Control Plane Policing.................................................................................................................................. 231
Conguring CoPP for Protocols............................................................................................................................. 231
Conguring CoPP for CPU Queues...................................................................................................................... 233
Displaying CoPP Conguration ............................................................................................................................. 234
11 Data Center Bridging (DCB)......................................................................................................................236
Ethernet Enhancements in Data Center Bridging..................................................................................................... 236
Priority-Based Flow Control....................................................................................................................................237
Enhanced Transmission Selection..........................................................................................................................238
Data Center Bridging Exchange Protocol (DCBx)...............................................................................................239
Data Center Bridging in a Trac Flow...................................................................................................................240
Enabling Data Center Bridging.....................................................................................................................................240
DCB Maps and its Attributes.................................................................................................................................. 241
Data Center Bridging: Default Conguration...............................................................................................................241
Conguring Priority-Based Flow Control.................................................................................................................... 242
Conguring Lossless Queues................................................................................................................................. 243
Conguring PFC in a DCB Map................................................................................................................................... 244
PFC Conguration Notes........................................................................................................................................244
PFC Prerequisites and Restrictions....................................................................................................................... 245
Applying a DCB Map on a Port.................................................................................................................................... 245
Conguring PFC without a DCB Map.........................................................................................................................246
Conguring Lossless QueuesExample:..................................................................................................................246
Priority-Based Flow Control Using Dynamic Buer Method....................................................................................247
Pause and Resume of Trac..................................................................................................................................247
Buer Sizes for Lossless or PFC Packets.............................................................................................................248
Behavior of Tagged Packets.........................................................................................................................................248
Conguration Example for DSCP and PFC Priorities................................................................................................249
SNMP Support for PFC and Buer Statistics Tracking........................................................................................... 250
Performing PFC Using DSCP Bits Instead of 802.1p Bits.........................................................................................250
8
Contents