Traffic Policing - HP MSR4080 Configuration Manual

Acl and qos
Hide thumbs Also See for MSR4080:
Table of Contents

Advertisement

EBS—Size of bucket E, which specifies the transient burst of traffic that bucket E can forward.
CBS is implemented with bucket C, and EBS with bucket E. In each evaluation, packets are measured
against the following bucket scenarios:
If bucket C has enough tokens, packets are colored green.
If bucket C does not have enough tokens but bucket E has enough tokens, packets are colored
yellow.
If neither bucket C nor bucket E has sufficient tokens, packets are colored red.

Traffic policing

Traffic policing supports policing the inbound traffic and the outbound traffic.
A typical application of traffic policing is to supervise the specification of traffic entering a network and
limit it within a reasonable range. Another application is to "discipline" the extra traffic to prevent
aggressive use of network resources by an application. For example, you can limit bandwidth for HTTP
packets to less than 50% of the total. If the traffic of a session exceeds the limit, traffic policing can drop
the packets or reset the IP precedence of the packets.
traffic on an interface.
Figure 7 Traffic policing
Traffic policing is widely used in policing traffic entering the ISP networks. It can classify the policed traffic
and take predefined policing actions on each packet depending on the evaluation result:
Forwarding the packet if the evaluation result is "conforming."
Dropping the packet if the evaluation result is "excess."
Forwarding the packet with its precedence re-marked if the evaluation result is "conforming."
Delivering the packet to next-level traffic policing with its precedence re-marked if the evaluation
result is "conforming."
Entering the next-level policing (you can set multiple traffic policing levels each focused on objects
at different levels).
Figure 7
shows an example of policing outbound
36

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents