Web Management Guide-R03
Table Of Contents
- How to Use This Guide
- Contents
- Figures
- Tables
- Getting Started
- Web Configuration
- Basic Management Tasks
- Displaying System Information
- Displaying Hardware/Software Versions
- Configuring Support for Jumbo Frames
- Displaying Bridge Extension Capabilities
- Managing System Files
- Setting the System Clock
- Configuring the Console Port
- Configuring Telnet Settings
- Displaying CPU Utilization
- Displaying Memory Utilization
- Resetting the System
- Interface Configuration
- VLAN Configuration
- Address Table Settings
- Spanning Tree Algorithm
- Congestion Control
- Class of Service
- Quality of Service
- VoIP Traffic Configuration
- Security Measures
- AAA Authorization and Accounting
- Configuring User Accounts
- Web Authentication
- Network Access (MAC Address Authentication)
- Configuring HTTPS
- Configuring the Secure Shell
- Access Control Lists
- Setting A Time Range
- Showing TCAM Utilization
- Setting the ACL Name and Type
- Configuring a Standard IPv4 ACL
- Configuring an Extended IPv4 ACL
- Configuring a Standard IPv6 ACL
- Configuring an Extended IPv6 ACL
- Configuring a MAC ACL
- Configuring an ARP ACL
- Binding a Port to an Access Control List
- Configuring ACL Mirroring
- Showing ACL Hardware Counters
- ARP Inspection
- Filtering IP Addresses for Management Access
- Configuring Port Security
- Configuring 802.1X Port Authentication
- DoS Protection
- IP Source Guard
- DHCP Snooping
- Basic Administration Protocols
- Configuring Event Logging
- Link Layer Discovery Protocol
- Power over Ethernet
- Simple Network Management Protocol
- Configuring Global Settings for SNMP
- Setting the Local Engine ID
- Specifying a Remote Engine ID
- Setting SNMPv3 Views
- Configuring SNMPv3 Groups
- Setting Community Access Strings
- Configuring Local SNMPv3 Users
- Configuring Remote SNMPv3 Users
- Specifying Trap Managers
- Creating SNMP Notification Logs
- Showing SNMP Statistics
- Remote Monitoring
- Switch Clustering
- IP Configuration
- IP Services
- Multicast Filtering
- Overview
- Layer 2 IGMP (Snooping and Query)
- Configuring IGMP Snooping and Query Parameters
- Specifying Static Interfaces for a Multicast Router
- Assigning Interfaces to Multicast Services
- Setting IGMP Snooping Status per Interface
- Filtering Multicast Data at Interfaces
- Displaying Multicast Groups Discovered by IGMP Snooping
- Displaying IGMP Snooping Statistics
- Filtering and Throttling IGMP Groups
- MLD Snooping (Snooping and Query for IPv6)
- Multicast VLAN Registration
- Basic Management Tasks
- Appendices
- Glossary
- Index
– 227 –
10 Quality of Service
This chapter describes the following tasks required to apply QoS policies:
◆ Class Map – Creates a map which identifies a specific class of traffic.
◆ Policy Map – Sets the boundary parameters used for monitoring inbound
traffic, and the action to take for conforming and non-conforming traffic.
◆ Binding to a Port – Applies a policy map to an ingress port.
Overview
The commands described in this section are used to configure Quality of Service
(QoS) classification criteria and service policies. Differentiated Services (DiffServ)
provides policy-based management mechanisms used for prioritizing network
resources to meet the requirements of specific traffic types on a per hop basis.
Each packet is classified upon entry into the network based on access lists, IP
Precedence, DSCP values, VLAN lists, or CoS values. Using access lists allows you
select traffic based on Layer 2, Layer 3, or Layer 4 information contained in each
packet. Based on configured network policies, different kinds of traffic can be
marked for different kinds of forwarding.
All switches or routers that access the Internet rely on class information to provide
the same forwarding treatment to packets in the same class. Class information can
be assigned by end hosts, or switches or routers along the path. Priority can then
be assigned based on a general policy, or a detailed examination of the packet.
However, note that detailed examination of packets should take place close to the
network edge so that core switches and routers are not overloaded.
Switches and routers along the path can use class information to prioritize the
resources allocated to different traffic classes. The manner in which an individual
device handles traffic in the DiffServ architecture is called per-hop behavior. All
devices along a path should be configured in a consistent manner to construct a
consistent end-to-end QoS solution.
Note:
You can configure up to 16 rules per class map. You can also include multiple
classes in a policy map.
Note:
You should create a class map before creating a policy map. Otherwise, you
will not be able to select a class map from the policy rule settings screen (see
page 232).