1 QoS Overview ············································································································································1-1
Introduction to QoS ·································································································································1-1
Causes ············································································································································1-2
Impacts ············································································································································1-2
Countermeasures ····························································································································1-3
End-to-End QoS ······························································································································1-3
Traffic Classification ························································································································1-4
Packet Precedences························································································································1-4
2 QoS Policy Configuration ·························································································································2-1
QoS Policy Overview ······························································································································2-1
Configuring a QoS Policy························································································································2-1
Defining a Class ······························································································································2-1
Defining a Traffic Behavior ··············································································································2-3
Defining a Policy······························································································································2-3
QoS Policy Configuration Example ·································································································2-4
Applying the QoS Policy··························································································································2-5
Priority Mapping Overview ······················································································································3-1
Concepts ·········································································································································3-1
Configuration Prerequisites ·············································································································3-4
Configuration Procedure··················································································································3-4
Configuration Example ····················································································································3-4
Configuration Prerequisites ·············································································································3-5
Configuration Procedure··················································································································3-5
Configuration Example ····················································································································3-5
Configuration Prerequisites ·············································································································3-6
Configuration Procedure··················································································································3-6
Configuration Example ····················································································································3-6
Table of Contents
i