Brocade Communications Systems 53-1001761-01 Manual De Usuario

Descargar
Página de 164
Converged Enhanced Ethernet Administrator’s Guide
95
53-1001761-01
Queueing
9
DRAFT: BROCADE CONFIDENTIAL
Creating a CoS-to-CoS mutation QoS map
Perform the following steps from Privileged EXEC mode to create a CoS-to-CoS mutation.
1. Enter global configuration mode.
switch#configure terminal 
2. Create the CoS-to-CoS mutation QoS map name. In this example ‘test’ is used. 
switch(config)#qos map cos-mutation test 0 1 2 3 5 4 6 7
3. Exit the configuration mode and return to EXEC mode.
switch(conf-if-te-0/2)#exit
switch(config)#end
4. Enter the copy command to save the running-config file to the startup-config file.
switch#copy running-config startup-config
Applying a CoS-to-CoS mutation QoS map
Perform the following steps from Privileged EXEC mode to apply a CoS-to-CoS mutation QoS map.
1. Enter global configuration mode.
switch#configure terminal 
2. Specify the 10-gigabit Ethernet interface.
Example  of selecting the 10-Gigabit Ethernet interface port 0/2.
switch(config)#interface tengigabitethernet 0/2
3. Activate or apply changes made to the CoS-to-CoS mutation QoS map name. In this example 
‘test’ is used.
switch(conf-if-te-0/2)#qos map cos-mutation test 0 1 2 3 5 4 6 7
4. Specify the trust mode for incoming traffic.
Use this command to specify the interface ingress QoS trust mode, which controls user priority 
mapping of incoming traffic. The untrusted mode overrides all incoming priority markings with 
the Interface Default CoS. The CoS mode sets the user priority based on the incoming CoS 
value, if the incoming packet is not priority tagged, then fallback is to the Interface Default CoS 
value.
switch(conf-if-te-0/2)#qos trust cos
5. Exit the configuration mode and return to EXEC mode.
switch(conf-if-te-0/2)#exit
switch(config)#end
6. Enter the copy command to save the running-config file to the startup-config file.
switch#copy running-config startup-config
Traffic class mapping
The Brocade 8000 supports eight unicast traffic classes for isolation and to control servicing for 
different priorities of application data. Traffic classes are numbered from 0 through 7, with higher 
values designating higher priority.