HP 6125G Command Reference Manual
HP 6125G Command Reference Manual

HP 6125G Command Reference Manual

Acl and qos command reference
Hide thumbs Also See for 6125G:
Table of Contents

Advertisement

HP 6125 Blade Switch Series
ACL and QoS

Command Reference

Part number: 5998-3170
Software version: Release 2103
Document version: 6W100-20120907

Advertisement

Table of Contents
loading

Summary of Contents for HP 6125G

  • Page 1: Command Reference

    HP 6125 Blade Switch Series ACL and QoS Command Reference Part number: 5998-3170 Software version: Release 2103 Document version: 6W100-20120907...
  • Page 2 HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material.
  • Page 3: Table Of Contents

    Contents ACL configuration commands ····································································································································· 1   acl ·············································································································································································· 1   acl copy ····································································································································································· 2   acl ipv6 ······································································································································································ 3   acl ipv6 copy ···························································································································································· 4   acl ipv6 name ··························································································································································· 4   acl name ···································································································································································· 5   description ································································································································································· 5  ...
  • Page 4 display qos policy global ····································································································································· 53   display qos policy interface ································································································································· 55   display qos vlan-policy ········································································································································· 57   qos apply policy (interface view) ························································································································ 59   qos apply policy (user-profile view) ···················································································································· 59   qos apply policy global ········································································································································ 60  ...
  • Page 5 display qos car name ··········································································································································· 90   qos car aggregative ·············································································································································· 91   reset qos car name ················································································································································ 92   Burst function configuration commands ···················································································································· 94   burst-mode enable ················································································································································· 94   Support and other resources ····································································································································· 95   Contacting HP ································································································································································ 95  ...
  • Page 6: Acl Configuration Commands

    ACL configuration commands Syntax acl number acl-number [ name acl-name ] [ match-order { auto | config } ] undo acl { all | name acl-name | number acl-number } View System view Default level 2: System level Parameters number acl-number: Specifies the number of an access control list (ACL): •...
  • Page 7: Acl Copy

    [Sysname] acl number 2000 [Sysname-acl-basic-2000] # Create IPv4 basic ACL 2001 with the name flow, and enter its view. <Sysname> system-view [Sysname] acl number 2001 name flow [Sysname-acl-basic-2001-flow] acl copy Syntax acl copy { source-acl-number | name source-acl-name } to { dest-acl-number | name dest-acl-name } View System view Default level...
  • Page 8: Acl Ipv6

    acl ipv6 Syntax acl ipv6 number acl6-number [ name acl6-name ] [ match-order { auto | config } ] undo acl ipv6 { all | name acl6-name | number acl6-number } View System view Default level 2: System level Parameters number acl6-number: Specifies the number of an IPv6 ACL: •...
  • Page 9: Acl Ipv6 Copy

    acl ipv6 copy Syntax acl ipv6 copy { source-acl6-number | name source-acl6-name } to { dest-acl6-number | name dest-acl6-name } View System view Default level 2: System level Parameters source-acl6-number: Specifies an existing source IPv6 ACL by its number: 2000 to 2999 for IPv6 basic ACLs •...
  • Page 10: Acl Name

    Parameters acl6-name: Specifies the name of an existing IPv6 ACL, a case-insensitive string of 1 to 63 characters. It must start with an English letter. Description Use acl ipv6 name to enter the view of an IPv6 ACL that has a name. Related commands: acl ipv6.
  • Page 11: Display Acl

    Parameters text: ACL description, a case-sensitive string of 1 to 127 characters. Description Use description to configure a description for an ACL. Use undo description to remove the ACL description. By default, an ACL has no ACL description. Related commands: display acl and display acl ipv6. Examples # Configure a description for IPv4 basic ACL 2000.
  • Page 12 exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Description Use display acl to display configuration and match statistics for the specified or all IPv4 ACLs. This command displays ACL rules in config or depth-first order, whichever is configured.
  • Page 13: Display Acl Ipv6

    display acl ipv6 Syntax display acl ipv6 { acl6-number | all | name acl6-name } [ slot slot-number ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters acl6-number: Specifies an IPv6 ACL by its number: 2000 to 2999 for IPv6 basic ACLs •...
  • Page 14: Display Acl Resource

    rule 10 permit source1::/64 rule 10 comment This rule is used in rd. rule 5 permit source 2::/64 rule 0 permit Table 2 Command output Field Description Category and number of the ACL. The following field Basic IPv6 ACL 2000 information is about this IPv6 basic ACL 2000.
  • Page 15: Display Packet-Filter

    include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Description Use display acl resource to display the usage of ACL rules. Examples # Display the usage of ACL rules on a device. <Sysname>...
  • Page 16 View Any view Default level 1: Monitor level Parameters all: Specifies all interfaces. interface interface-type interface-number: Specifies an interface by its type and number. VLAN interfaces are not supported. inbound: Specifies the inbound direction. outbound: Specifies the outbound direction. interface vlan-interface vlan-interface-number: Specifies a VLAN interface by its number. slot slot-number: Specifies an IRF member switch.
  • Page 17: Display Time-Range

    Table 4 Command output Field Description Interface Interface to which the ACL applies. In-bound Policy ACL used for filtering incoming traffic on the interface. Out-bound Policy ACL used for filtering outgoing traffic on the interface. acl 2001, Successful IPv4 ACL 2001 has been applied to the interface. acl6 2500, Fail The device has failed to apply IPv6 ACL 2500 to the interface.
  • Page 18: Hardware-Count Enable

    Table 5 Command output Field Description Current time Current system time Configuration and status of the time range, including its name, Time-range status (active or inactive), and start time and end time hardware-count enable Syntax hardware-count enable undo hardware-count enable View IPv4 basic/advanced ACL view, IPv6 basic/advanced ACL view, Ethernet frame header ACL view Default level...
  • Page 19: Packet-Filter

    packet-filter Syntax packet-filter { acl-number | name acl-name } { inbound | outbound } undo packet-filter { acl-number | name acl-name } { inbound | outbound } View Layer 2 Ethernet interface view, VLAN interface view Default level 2: System level Parameters acl-number: Specifies an IPv4 ACL by its number: •...
  • Page 20: Reset Acl Counter

    Parameters acl6-number: Specifies an IPv6 ACL by its number: 2000 to 2999 for IPv6 basic ACLs • • 3000 to 3999 for IPv6 advanced ACLs name acl6-name: Specifies an IPv6 ACL by its name. The acl6-name argument takes a case-insensitive string of 1 to 63 characters.
  • Page 21: Reset Acl Ipv6 Counter

    Examples # Clear statistics for IPv4 basic ACL 2001. <Sysname> reset acl counter 2001 # Clear statistics for IPv4 ACL flow. <Sysname> reset acl counter name flow reset acl ipv6 counter Syntax reset acl ipv6 counter { acl6-number | all | name acl6-name } View User view Default level...
  • Page 22 Default level 2: System level Parameters rule-id: Specifies a rule ID, in the range of 0 to 65534. If no rule ID is provided when you create an ACL rule, the system automatically assigns it a rule ID. This rule ID takes the nearest higher multiple of the numbering step to the current highest rule ID, starting from 0.
  • Page 23: Rule (Ipv4 Advanced Acl View)

    NOTE: The lsap keyword is not supported if the ACL is for QoS traffic classification or packet filtering. Examples # Create a rule in ACL 4000 to permit ARP packets and deny RARP packets. <Sysname> system-view [Sysname] acl number 4000 [Sysname-acl-ethernetframe-4000] rule permit type 0806 ffff [Sysname-acl-ethernetframe-4000] rule deny type 8035 ffff rule (IPv4 advanced ACL view)
  • Page 24 Table 6 Match criteria and other rule information for IPv4 advanced ACL rules Parameters Function Description The sour-addr sour-wildcard arguments represent a source IP address and wildcard mask in source { sour-addr sour-wildcard | dotted decimal notation. An all-zero Specifies a source address any } wildcard specifies a host address.
  • Page 25 Parameters Function Description The time-range-name argument takes a case-insensitive string of 1 to 32 characters. It must start with an Specifies a time range for the English letter. If the time range is not time-range time-range-name rule configured, the system creates the rule;...
  • Page 26 Parameters Function Description Specifies the flags for Parameter specific to TCP. indicating the established The rule matches TCP connection packets established status of a with the ACK or RST flag bit set. TCP connection If the protocol argument takes icmp (1), you can set the parameters shown in Table Table 8 ICMP-specific parameters for IPv4 advanced ACL rules Parameters...
  • Page 27 ICMP message name ICMP message type ICMP message code ttl-exceeded Description Use rule to create or edit an IPv4 advanced ACL rule. You can edit ACL rules only when the match order is config. Use undo rule to delete an entire IPv4 advanced ACL rule or some attributes in the rule. If no optional keywords are provided, you delete the entire rule.
  • Page 28: Rule (Ipv4 Basic Acl View)

    [Sysname-acl-adv-3003] rule permit udp source-port eq snmptrap [Sysname-acl-adv-3003] rule permit udp destination-port eq snmp [Sysname-acl-adv-3003] rule permit udp destination-port eq snmptrap rule (IPv4 basic ACL view) Syntax rule [ rule-id ] { deny | permit } [ counting | fragment | source { sour-addr sour-wildcard | any } | time-range time-range-name | vpn-instance vpn-instance-name ] * undo rule rule-id [ counting | fragment | source | time-range | vpn-instance ] * View...
  • Page 29: Rule (Ipv6 Advanced Acl View)

    Within an ACL, the permit or deny statement of each rule must be unique. If the ACL rule you are creating or editing has the same deny or permit statement as another rule in the ACL, your creation or editing attempt will fail.
  • Page 30 protocol: Matches protocol carried over IPv6. It can be a number in the range of 0 to 255, or in words, gre (47), icmpv6 (58), ipv6, ipv6-ah (51), ipv6-esp (50), ospf (89), tcp (6), or udp (17). Table 10 describes the parameters that you can specify regardless of the value that the protocol argument takes. Table 10 Match criteria and other rule information for IPv6 advanced ACL rules Parameters Function...
  • Page 31 If the protocol argument takes tcp (6) or udp (17), you can set the parameters shown in Table 1 Table 11 TCP/UDP-specific parameters for IPv6 advanced ACL rules Parameters Function Description The operator argument can be lt (lower than), gt (greater than), eq (equal to), neq (not equal to), or range (inclusive range).
  • Page 32 Table 12 ICMPv6-specific parameters for IPv6 advanced ACL rules Parameters Function Description The icmp6-type argument is in the range of 0 to 255. The icmp6-code argument is in the range of 0 to 255. icmp6-type { icmp6-type icmp6-code Specifies the ICMPv6 The icmp6-message argument specifies a | icmp6-message } message type and code...
  • Page 33: Rule (Ipv6 Basic Acl View)

    Within an ACL, the permit or deny statement of each rule must be unique. If the ACL rule you are creating or editing has the same deny or permit statement as another rule in the ACL, your creation or editing attempt will fail.
  • Page 34 View IPv6 basic ACL view Default level 2: System level Parameters rule-id: Specifies a rule ID, in the range of 0 to 65534. If no rule ID is provided when you create an ACL rule, the system automatically assigns it a rule ID. This rule ID takes the nearest higher multiple of the numbering step to the current highest rule ID, starting from 0.
  • Page 35: Rule Comment

    Examples # Create an IPv6 basic ACL rule to deny the packets from any source IP segment but 1001::/16, 3124:1 123::/32, or FE80:5060:1001::/48. <Sysname> system-view [Sysname] acl ipv6 number 2000 [Sysname-acl6-basic-2000] rule permit source 1001:: 16 [Sysname-acl6-basic-2000] rule permit source 3124:1123:: 32 [Sysname-acl6-basic-2000] rule permit source fe80:5060:1001:: 48 [Sysname-acl6-basic-2000] rule deny source any rule comment...
  • Page 36: Rule Remark

    rule remark Syntax rule [ rule-id ] remark text undo rule [ rule-id ] remark [ text ] View IPv4 basic/advanced ACL view, IPv6 basic/advanced ACL view, Ethernet frame header ACL view Default level 2: System level Parameters rule-id: Specifies a rule number in the range of 0 to 65534. The specified rule can be one that has been created or not.
  • Page 37: Step

    <Sysname> system-view [Sysname] acl number 2000 [Sysname-acl-basic-2000] display this acl number 2000 rule 0 permit source 14.1.1.0 0.0.0.255 rule 5 permit source 10.1.1.1 0 time-range work-time rule 10 permit source 192.168.0.0 0.0.0.255 rule 15 permit source 1.1.1.1 0 rule 20 permit source 10.1.1.1 0 rule 25 permit counting return # Add a start comment "Rules for VIP_start"...
  • Page 38: Time-Range

    Description Use step to set a rule numbering step for an ACL. The rule numbering step sets the increment by which the system numbers rules automatically. For example, the default ACL rule numbering step is 5. If you do not assign IDs to rules you are creating, they are numbered 0, 5, 10, 15, and so on.
  • Page 39 A day of a week in words, sun, mon, tue, wed, thu, fri, and sat. • • working-day for Monday through Friday. off-day for Saturday and Sunday. • daily for the whole week. • from time1 date1: Specifies the start time and date of an absolute statement. The time1 argument specifies the time of the day in hh:mm format (24-hour clock).
  • Page 40 [Sysname] time-range t2 from 00:00 1/1/2010 to 23:59 12/31/2010 # Create a compound time range t3, setting it to be active from 08:00 to 12:00 on Saturdays and Sundays of the year 2010. <Sysname> system-view [Sysname] time-range t3 08:00 to 12:00 off-day from 00:00 1/1/2010 to 23:59 12/31/2010 # Create a compound time range t4, setting it to be active from 10:00 to 12:00 on Mondays and from 14:00 to 16:00 on Wednesdays in the period of January through June of the year 2010.
  • Page 41: Qos Policy Configuration Commands

    QoS policy configuration commands Class configuration commands display traffic classifier Syntax display traffic classifier user-defined [ tcl-name ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters user-defined: Displays user-defined classes. tcl-name: Class name, a string of 1 to 31 characters.
  • Page 42: If-Match

    Table 14 Command output Field Description Classifier Class name and its match criteria. The match operator you set for the class. If the operator is AND, the class matches the packets that Operator match all its match criteria. If the operator is OR, the class matches the packets that match any of its match criteria.
  • Page 43 Keyword and argument combination Description Matches the 802.1p priority of the service provider network. service-dot1p 8021p-list The 8021p-list argument is a list of up to eight 802.1p priority values. An 802.1p priority ranges from 0 to 7. Matches IP precedence. The ip-precedence-list argument is a list of up to eight ip-precedence ip-precedence-list IP precedence values.
  • Page 44 Use undo if-match to delete a match criterion. When defining match criteria, use the usage guidelines described in these subsections. Defining an ACL-based match criterion If the ACL referenced in the if-match command does not exist, the class cannot be applied to hardware. For a class, you can reference an ACL twice by its name and number, respectively, with the if-match command.
  • Page 45 # Define a match criterion for class class2 to match the packets with their source MAC addresses being 0050-ba27-bed2. <Sysname> system-view [Sysname] traffic classifier class2 [Sysname-classifier-class2] if-match source-mac 0050-ba27-bed2 # Define a match criterion for class class1 to match the packets with their customer network 802.1p priority values being 3.
  • Page 46: Traffic Classifier

    # Define a match criterion for class class1 to match the packets with their IP precedence values being 1 or 6. <Sysname> system-view [Sysname] traffic classifier class1 operator or [Sysname-classifier-class1] if-match ip-precedence 1 [Sysname-classifier-class1] if-match ip-precedence 6 # Define a match criterion for class class1 to match the packets of a customer network VLAN of 1, 6, or <Sysname>...
  • Page 47: Traffic Behavior Configuration Commands

    Traffic behavior configuration commands accounting Syntax accounting { byte | packet } undo accounting View Traffic behavior view Default level 2: System level Parameters byte: Counts traffic in bytes. packets: Counts traffic in packets. Description Use accounting to configure the traffic accounting action in a traffic behavior. Use undo accounting to delete the traffic accounting action from a traffic behavior.
  • Page 48 Parameters cir committed-information-rate: Specifies the committed information rate (CIR) in kbps. The committed-information-rate argument ranges from 8 to 32000000 and must be a multiple of 8. cbs committed-burst-size: Specifies the committed burst size (CBS) in bytes. If you do not specify the cbs keyword, the CBS is 62.5 × committed-information-rate by default and •...
  • Page 49: Display Traffic Behavior

    display traffic behavior Syntax display traffic behavior user-defined [ behavior-name ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters user-defined: Displays user-defined traffic behaviors. behavior-name: Behavior name, a string of 1 to 31 characters. If no traffic behavior is specified, this command displays information about all the user-defined behaviors.
  • Page 50: Filter

    Table 16 Command output Field Description User Defined Behavior Information User-defined behavior information. Behavior Traffic behavior name. Marking Information about traffic marking. Type of precedence marked for traffic, which can be DSCP, IP precedence, dot1p (COS), qos local ID, local precedence, drop precedence, customer VLAN Remark ID or service VLAN ID.
  • Page 51: Redirect

    <Sysname> system-view [Sysname] traffic behavior database [Sysname-behavior-database] filter deny redirect Syntax redirect { cpu | interface interface-type interface-number | next-hop { ipv4-add1 [ ipv4-add2 ] | ipv6-add1 [ interface-type interface-number ] [ ipv6-add2 [ interface-type interface-number ] ] } } undo redirect { cpu | interface interface-type interface-number | next-hop } View Traffic behavior view...
  • Page 52: Remark Drop-Precedence

    undo remark dot1p View Traffic behavior view Default level 2: System level Parameters 8021p: 802.1p priority to be marked for packets, which ranges from 0 to 7. customer-dot1p-trust: Copies the 802.1p priority value in the inner VLAN tag to the outer VLAN tag. This option does not apply to single-tagged packets.
  • Page 53: Remark Dscp

    Use undo remark drop-precedence to delete the action. Related commands: qos policy, traffic behavior, and classifier behavior. Examples # Configure traffic behavior database to mark matching traffic with drop precedence 2. <Sysname> system-view [Sysname] traffic behavior database [Sysname-behavior-database] remark drop-precedence 2 remark dscp Syntax remark dscp dscp-value...
  • Page 54: Remark Ip-Precedence

    Keyword DSCP value (binary) DSCP value (decimal) 101000 110000 111000 101110 Description Use remark dscp to configure a DSCP marking action. Use undo remark dscp to delete the action. Related commands: qos policy, traffic behavior, and classifier behavior. Examples # Configure the traffic behavior database to mark matching traffic with DSCP 6. <Sysname>...
  • Page 55: Remark Local-Precedence

    remark local-precedence Syntax remark local-precedence local-precedence undo remark local-precedence View Traffic behavior view Default level 2: System level Parameters local-precedence: Sets the local precedence to be marked for packets, which ranges from 0 to 7. Description Use remark local-precedence to configure a local precedence marking action. Use undo remark local-precedence to delete the action.
  • Page 56: Traffic Behavior

    Examples # Configure the action of marking packet with local QoS ID 2. <Sysname> system-view [Sysname] traffic behavior database [Sysname-behavior-database] remark qos-local-id 2 traffic behavior Syntax traffic behavior behavior-name undo traffic behavior behavior-name View System view Default level 2: System level Parameters behavior-name: Sets a behavior name, a string of 1 to 31 characters.
  • Page 57: Display Qos Policy

    Parameters tcl-name: Class name, a string of 1 to 31 characters. behavior-name: Behavior name, a string of 1 to 31 characters. mode dot1q-tag-manipulation: Specifies that the class-behavior association is for VLAN mapping purposes. For more information about VLAN mapping, see Layer 2—LAN Switching Configuration Guide.
  • Page 58: Display Qos Policy Global

    |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression.
  • Page 59 View Any view Default level 1: Monitor level Parameters inbound: Displays information about the inbound global QoS policy. An inbound global QoS policy applies to the inbound direction of all ports. outbound: Displays information about the outbound global QoS policy. An outbound global QoS policy applies to the outbound direction of all ports.
  • Page 60: Display Qos Policy Interface

    Direction: Outbound Policy: 2 Classifier: 2 (Failed) Operator: AND Rule(s) : If-match customer-dot1p 3 Behavior: 1 Marking: Remark local precedence 2 Table 19 Command output Field Description Indicates that the QoS policy is applied in the inbound direction Direction or outbound direction. Policy Policy name and its contents.
  • Page 61 inbound: Displays information about the QoS policy applied in the inbound direction of the specified interface. outbound: Displays information about the QoS policy applied in the outbound direction of the specified interface. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide.
  • Page 62: Display Qos Vlan-Policy

    Field Description Classifier Class name and configuration information Operator Logical relationship between match criteria in the class Rule(s) Match criteria in the class Behavior Behavior name and configuration information display qos vlan-policy Syntax display qos vlan-policy { name policy-name | vlan [ vlan-id ] } [ slot slot-number ] [ inbound | outbound ] [ | { begin | exclude | include } regular-expression ] View Any view...
  • Page 63 <Sysname> display qos vlan-policy name test slot 6 Policy test Vlan 200: inbound Vlan 300: outbound Table 21 Command output Field Description Policy Name of the QoS policy. Vlan ID of the VLAN where the VLAN policy is applied. The QoS policy is applied in the inbound direction of inbound the VLAN.
  • Page 64: Qos Apply Policy (Interface View)

    Field Description Direction Direction in which the QoS policy is applied for the VLAN. The name and content of a class. If the switch has failed to apply the class-behavior association, the field displays "(Failed)" after the class name. In an IRF environment: •...
  • Page 65: Qos Apply Policy Global

    undo qos apply policy [ policy-name ] { inbound | outbound } View User profile view Default level 2: System level Parameters inbound: Applies the QoS policy to the traffic sent by the online users. outbound: Applies the QoS policy to the traffic received by the online users. policy-name: Policy name, a string of 1 to 31 characters.
  • Page 66: Qos Policy

    Description Use qos apply policy global to apply a QoS policy globally. A global QoS policy takes effect on all inbound or outbound traffic depending on the direction in which the policy is applied. Use undo qos apply policy global to remove the QoS policy. Examples # Apply the QoS policy user1 in the inbound direction globally.
  • Page 67: Reset Qos Policy Global

    Default level 2: System level Parameters policy-name: QoS policy name, a string of 1 to 31 characters. vlan-id-list: Specifies a list of up to eight VLAN IDs. A VLAN ID ranges from 1 to 4094. You can input individual discontinuous VLAN IDs and VLAN ID ranges in the form of start-vlan-id to end-vlan-id where the start VLAN ID must be smaller than the end VLAN ID.
  • Page 68: Reset Qos Vlan-Policy

    reset qos vlan-policy Syntax reset qos vlan-policy [ vlan vlan-id ] [ inbound | outbound ] View User view Default level 1: Monitor level Parameters vlan-id: VLAN ID, which ranges from 1 to 4094. inbound: Clears the statistics of the QoS policy applied in the inbound direction of the specified VLAN. outbound: Clears the statistics of the QoS policy applied in the outbound direction of the specified VLAN.
  • Page 69: Priority Mapping Configuration Commands

    Priority mapping configuration commands Priority mapping table configuration commands display qos map-table Syntax display qos map-table [ dot1p-dp | dot1p-lp | dscp-dot1p | dscp-dp | dscp-dscp ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters...
  • Page 70: Import

    # Display the configuration information of the 802.1p-to-drop mapping table. <Sysname> display qos map-table dot1p-dp MAP-TABLE NAME: dot1p-dp TYPE: pre-define IMPORT EXPORT Table 23 Command output Field Description MAP-TABLE NAME Name of the priority mapping table TYPE Type of the priority mapping table IMPORT Input values of the priority mapping table EXPORT...
  • Page 71: Qos Map-Table

    Related commands: display qos map-table. Examples # Configure the 802.1p-to-drop mapping table to map 802.1p priority values 4 and 5 to drop precedence 1. <Sysname> system-view [Sysname] qos map-table dot1p-dp [Sysname-maptbl-dot1p-dp] import 4 5 export 1 qos map-table Syntax qos map-table { dot1p-dp | dot1p-lp | dscp-dot1p | dscp-dp | dscp-dscp } View System view Default level...
  • Page 72: Port Priority Trust Mode Configuration Commands

    Default level 2: System level Parameters priority-value: Port priority value, in the range of 0 to 7. Description Use qos priority to change the port priority of an interface. Use undo qos priority to restore the default. The default port priority is 0. You can use the display qos trust interface command to view the port priority of an interface.
  • Page 73: Qos Trust

    Description Use display qos trust interface to display priority trust mode and port priority information on an interface. If no interface is specified, the command displays priority trust mode and port priority information for all interfaces. Examples # Display the priority trust mode and port priority settings of GigabitEthernet 1/0/1. <Sysname>...
  • Page 74 <Sysname> system-view [Sysname] interface GigabitEthernet 1/0/1 [Sysname-GigabitEthernet1/0/1] qos trust dscp...
  • Page 75: Gts And Line Rate Configuration Commands

    GTS and line rate configuration commands GTS configuration commands display qos gts interface Syntax display qos gts interface [ interface-type interface-number ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters interface-type interface-number: Specifies an interface by its type and number.
  • Page 76: Qos Gts

    Field Description Committed information rate (CIR) in kbps Committed burst size in bytes, which specifies the depth of the token bucket for holding bursty traffic qos gts Syntax qos gts queue queue-number cir committed-information-rate [ cbs committed-burst-size ] undo qos gts queue queue-number View Interface view Default level...
  • Page 77: Line Rate Configuration Commands

    Line rate configuration commands display qos lr interface Syntax display qos lr interface [ interface-type interface-number ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters interface-type interface-number: Specifies an interface by its type and number. |: Filters command output by specifying a regular expression.
  • Page 78: Qos Lr

    qos lr Syntax qos lr { inbound | outbound } cir committed-information-rate [ cbs committed-burst-size ] undo qos lr { inbound | outbound } View Interface view Default level 2: System level Parameters inbound: Limits the rate of incoming packets on the interface. outbound: Limits the rate of outgoing packets on the interface.
  • Page 79: Congestion Management Configuration Commands

    Congestion management configuration commands SP queuing configuration commands display qos sp Syntax display qos sp interface [ interface-type interface-number ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters interface-type interface-number: Specifies an interface by its type and number.
  • Page 80: Qos Sp

    Field Description Strict-priority queue SP queuing is used for queue scheduling. qos sp Syntax qos sp undo qos sp View Interface view Default level 2: System level Parameters None Description Use qos sp to configure SP queuing on a port. Use undo qos sp to restore the default.
  • Page 81: Qos Wrr

    |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression.
  • Page 82: Qos Wrr Byte-Count

    undo qos wrr View Interface view Default level 2: System level Parameters byte-count: Enables byte-count WRR, which allocates bandwidth to queues in terms of bytes. If you specify neither byte-count nor weight for this command, this command enables byte-count WRR. weight: Enables packet-based WRR, which allocates bandwidth to queues in terms of packets.
  • Page 83: Qos Wrr Group Sp

    Before using this command to configure weights for queues, make sure that byte-count WRR queuing is enabled on the interface. Otherwise, the weight configuration does not take effect. Related commands: display qos wrr interface and qos wrr. Examples # Enable byte-count WRR queuing on GigabitEthernet 1/0/1, and assign queue 0, with the scheduling weight 10, to WRR group 1.
  • Page 84: Qos Wrr Weight

    qos wrr weight Syntax qos wrr queue-id group 1 weight schedule-value undo qos wrr queue-id group 1 weight View Interface view Default level 2: System level Parameters queue-id: Queue ID, which ranges from 0 to 7. 1: Assigns the queue to group 1, the WRR queuing group. weight schedule-value: Specifies a scheduling weight for the specified queue in packet-based WRR queuing.
  • Page 85 Default level 1: Monitor level Parameters interface-type interface-number: Specifies an interface by its type and number. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression.
  • Page 86: Qos Bandwidth Queue

    qos bandwidth queue Syntax qos bandwidth queue queue-id min bandwidth-value undo qos bandwidth queue queue-id [ min bandwidth-value ] View Interface view Default level 2: System level Parameters queue-id: Queue ID, ranging from 0 to 7. min bandwidth-value: Sets the minimum guaranteed bandwidth (in kbps) for a queue when the port is congested.
  • Page 87: Qos Wfq Byte-Count

    Description Use qos wfq to enable WFQ on a port. Use undo qos wfq to restore the default queuing algorithm on a port. The default queuing algorithm on a port is SP queuing. You must enable WFQ before you can configure WFQ queuing parameters for a queue on an interface. Examples # Enable byte-count WFQ on GigabitEthernet 1/0/1.
  • Page 88: Qos Wfq Group Sp

    [Sysname-GigabitEthernet1/0/1] qos wfq 0 group 1 byte-count 10 qos wfq group sp Syntax qos wfq queue-id group sp undo qos wfq queue-id group sp View Interface view Default level 2: System level Parameters queue-id: Specifies a queue by its ID, which ranges from 0 to 7. sp: Specifies strict priority (SP) queuing.
  • Page 89 group 1: Assigns a queue to the WFQ group. weight schedule-value: Specifies a scheduling weight for the specified queue. The scheduling weight ranges from 1 to 15. Description Use qos wfq weight to assign a queue to a WFQ group, with a certain scheduling weight, on an interface that performs packet-based WFQ queuing.
  • Page 90: Congestion Avoidance Configuration Commands

    Congestion avoidance configuration commands display qos wred interface Syntax display qos wred interface [ interface-type interface-number ] [ | { begin | exclude | include } regular-expression ] View Any view Default level 1: Monitor level Parameters interface-type interface-number: Specifies a port by its type and number. |: Filters command output by specifying a regular expression.
  • Page 91 Default level 1: Monitor level Parameters table-name: Name of the WRED table to be displayed. |: Filters command output by specifying a regular expression. For more information about regular expressions, see Fundamentals Configuration Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression.
  • Page 92: Qos Wred Apply

    Field Description Upper threshold configured for yellow packets, whose drop precedence ymax is 1 Drop probability slope configured for yellow packets, whose drop yprob precedence is 1 rmin Lower threshold configured for red packets, whose drop precedence is 2 rmax Upper threshold configured for red packets, whose drop precedence is 2 Drop probability slope configured for red packets, whose drop rprob...
  • Page 93: Queue

    Default level 2: System level Parameters table table-name: Specifies a name for the table. Description Use qos wred queue table to create a WRED table and enter WRED table view. Use undo qos wred table to delete a WRED table. By default, no WRED table is created.
  • Page 94 By default, low-limit is 100, high-limit is 1000, and discard-prob is 10 for a queue-based WRED table. Related commands: qos wred queue table. Examples # Modify the drop-related parameters for queue-based WRED table queue-table1 as follows: set the lower threshold to 120, upper threshold to 300, and discard-probability to 20 for packets with drop level 1 in queue 1.
  • Page 95: Aggregate Car Configuration Commands

    Aggregate CAR configuration commands car name Syntax car name car-name undo car View Traffic behavior view Default level 2: System level Parameters car-name: Name of an aggregate CAR action. Description Use car name to reference an aggregate CAR action in the traffic behavior. Use undo car to remove the aggregate CAR action from the traffic behavior.
  • Page 96: Qos Car Aggregative

    regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Description Use display qos car name to display the configuration and statistics of a specified aggregate CAR action. If no CAR action is specified, this command displays the configuration and statistics of all the aggregate CAR actions.
  • Page 97: Reset Qos Car Name

    Parameters car-name: Name of the aggregate CAR action, a string of 1 to 31 characters. cir committed-information-rate: Specifies the committed information rate (CIR) in kbps. The committed-information-rate argument ranges from 8 to 32000000 and must be a multiple of 8. cbs committed-burst-size: Specifies the committed burst size (CBS) in bytes.
  • Page 98 Parameters car-name: Name of an aggregate CAR action. Description Use reset qos car name to clear the statistics about the specified aggregate CAR action. If no car-name is specified, the statistics about all the aggregate CAR actions is cleared. Examples # Clear the statistics about the aggregate CAR action aggcar-1.
  • Page 99: Burst Function Configuration Commands

    Burst function configuration commands burst-mode enable Syntax burst-mode enable undo burst-mode enable View System view Default level 2: System level Parameters None Description Use burst-mode enable to enable the burst function. Use undo burst-mode enable to disable the burst function. By default, the burst function is disabled.
  • Page 100: Support And Other Resources

    Support and other resources Contacting HP For worldwide technical support information, see the HP support website: http://www.hp.com/support Before contacting HP, collect the following information: Product model names and numbers • • Technical support registration number (if applicable) Product serial numbers •...
  • Page 101: Conventions

    Conventions This section describes the conventions used in this documentation set. Command conventions Convention Description Boldface Bold text represents commands and keywords that you enter literally as shown. Italic Italic text represents arguments that you replace with actual values. Square brackets enclose syntax choices (keywords or arguments) that are optional. Braces enclose a set of required syntax choices separated by vertical bars, from which { x | y | ...
  • Page 102 Network topology icons Represents a generic network device, such as a router, switch, or firewall. Represents a routing-capable device, such as a router or Layer 3 switch. Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports Layer 2 forwarding and other Layer 2 features.
  • Page 103: Index

    Index A B C D F H I P Q R S T W display traffic classifier,36 Documents,95 accounting,42 acl,1 copy,2 filter,45 ipv6,3 acl ipv6 copy,4 hardware-count enable,13 acl ipv6 name,4 name,5 if-match,37 import,65 burst-mode enable,94 packet-filter,14 car,42 packet-filter ipv6,14 name,90 classifier behavior,51...
  • Page 104 queue,88 rule (IPv4 basic ACL view),23 rule (IPv6 advanced ACL view),24 rule (IPv6 basic ACL view),28 redirect,46 rule comment,30 remark dot1p,46 rule remark,31 remark drop-precedence,47 remark dscp,48 remark ip-precedence,49 step,32 remark local-precedence,50 Subscription service,95 remark qos-local-id,50 reset acl counter,15 time-range,33 reset acl ipv6 counter,16 traffic...

This manual is also suitable for:

6125 blade switch series

Table of Contents