iiConfiguring priority mapping ····························································· 23Overview ································································································································ 23Introduction to priorities ······································································································ 23Priority maps ···················································································································· 23Priority mapping configuration tasks ····························································································· 23Configuring a priority map ·········································································································· 24Configuring a port to trust packet priority for priority mapping····························································· 24Changing the port priority of an interface ······················································································· 25Displaying and maintaining priority mapping ·················································································· 25Priority mapping configuration examples ······················································································· 25Network requirements ········································································································ 25Configuration procedure ····································································································· 26Configuring traffic policing ································································ 27Overview ································································································································ 27Traffic evaluation and token buckets ······················································································ 27Traffic policing ·················································································································· 27Configuration procedure ············································································································ 28Configuring traffic policing by using the MQC approach ····························································· 28Configuring traffic policing for a user profile by using the non-MQC approach ································· 29Displaying and maintaining traffic policing ····················································································· 30Configuring traffic filtering ································································ 31Configuration procedure ············································································································ 31Configuration example ·············································································································· 31Network requirements ········································································································ 31Configuration procedure ····································································································· 32Configuring priority marking ······························································ 33Configuration procedure ············································································································ 33Configuration example ·············································································································· 34Network requirements ········································································································ 34Configuration procedure ····································································································· 34Appendixes ··················································································· 36Appendix A Acronym ················································································································ 36Appendix B Default priority maps································································································· 36Appendix C Introduction to packet precedences ············································································· 38IP precedence and DSCP values ·························································································· 38802.1p priority··················································································································· 39802.11e priority ················································································································· 40Configuring time ranges ··································································· 41Feature and hardware compatibility ····························································································· 41Configuration procedure ············································································································ 42Displaying and maintaining time ranges ························································································ 42Time range configuration example ······························································································· 42Index ··························································································· 44