4IntServ model ························································································································ 25DiffServ model ······················································································································· 25QoS techniques ························································································································· 25Applying QoS techniques in a network ···················································································· 26QoS processing flow in an AC ································································································· 273 QoS configuration approaches ··························································································28Non-policy approach ················································································································· 28Policy approach ························································································································ 28Configuring a QoS policy ············································································································ 28Defining a class ····················································································································· 29Defining a traffic behavior ······································································································ 30Defining a policy ··················································································································· 31Applying the QoS policy ········································································································· 32Displaying and maintaining QoS policies ················································································· 344 Priority mapping configuration ···························································································35Priority mapping overview ··········································································································· 35Priority mapping tables ··············································································································· 35Priority mapping configuration tasks ···························································································· 37Configuring priority mapping······································································································· 38Configuring a priority mapping table ······················································································ 38Configuring a port to trust packet priority for priority mapping··················································· 39Configuring the port priority of a port ······················································································ 39Displaying and maintaining priority mapping ················································································ 40Priority mapping configuration examples (on WX Series access controllers)····································· 41Trusted priority type configuration example ············································································· 42Port priority configuration example ························································································· 435 Traffic policing and line rate configuration ···········································································45Traffic evaluation and token bucket ···························································································· 45Token bucket features ··········································································································· 45Evaluating traffic with the token bucket ·················································································· 45