Traffic Policing And Traffic Shaping Configuration; Configuring Traffic Policing - 3Com 3C13636 Configuration Manual

Router 3000 ethernet family
Hide thumbs Also See for 3C13636:
Table of Contents

Advertisement

3Com Router 3000 Ethernet Family
Configuration Guide
incoming packets
Figure 2-4 LR processing diagram
If Token Bucket is used to control the traffics, when there are tokens in Token Bucket,
the packets can be sent in burst; if no tokens are available, packets will not be sent until
new tokens generate in the Token Bucket. Thus, the traffic of packets is restricted under
the generating rate of new token to achieve the goal of restricting the traffics while
allowing bursting traffic overpass.
Compared with TP, LR can restrict all packets via physical port. TP is realized at IP
layer implementing no function for packets not through IP layer. If users demand to limit
the rate of all packets, LR is easier to be implemented.

2.3 Traffic Policing and Traffic Shaping Configuration

Traffic policing configuration includes:
Configure CAR list
Apply CAR policy
Traffic shaping configuration includes:
Set shaping parameters for a certain kind of traffic
Set shaping parameters for all traffics
LR on physical port configuration includes:
Set LR on physical port

2.3.1 Configuring Traffic Policing

The traffic-policing configuration is divided into two tasks: one is to define the
characters of the packets that need traffic policing; the other is to define the policing
policy.
I. Configuring CAR list
CAR list can be regard as a particular class of access control list (ACL), which is to
define the rules of matching packets. For different carl-index, the repeat execution of
queue
classify
3Com Corporation
2-5
Chapter 2 Traffic Classification, Policing, and Shaping
Tokens enter bucket
at the given speed
outgoing packets
Token Bucket
buffer

Advertisement

Table of Contents
loading

This manual is also suitable for:

3c13636-us - router 30363000 series

Table of Contents