Huawei v200r001 user manual II. Configuring priority queue

Page 89

User Manual - Configuration Guide (Volume 3)

Chapter 3

Versatile Routing Platform

Congestion Management

II. Configuring priority queue

Priority queue includes the definition for a group of priority queues and it specifies in which queue a packet is placed and the maximum length of different priority queues.

To complete the queuing of a priority queue, you must allocate this list to the interface. The same priority queue can be applied to multiple interfaces. Certainly, you can create multiple different priority policies to be applied to different interfaces.

16 groups can be configured in the priority list at most (that is, the value range of the list-number is 1-16). In each group, the following information is specified: ￿what kind of packets enters what kind of queue, length of each queue, the number of the bytes that can be sent continuously from the respective queues in each polling, etc.

The priority queue can be defined as four levels: high, medium, normal and low. Packets will be forwarded by the level sequence. That is, after all the packets in the high queue are sent out, send all the packets in the medium queue, and then send all the packets in the normal queue, and at last send the packets in the low queue.

Priority queue can be configured according to the modes below.

1)Configure priority queue according to network layer protocols

Data packets can be classified according to different types of protocols to make them enter different priority queues.

Perform the following task in the global configuration mode.

Table QC-3-2Configure the priority queue according to the network layer protocol

Operation

Command

 

 

Configure the priority queue according to the

priority-list list-numberprotocol protocol-name{ high medium

network layer protocol

normal low } [ queue-keyword keyword-value ]

Delete classification policy in the priority

no priority-list list-numberprotocol protocol-name{ high

queues

medium normal low } [ queue-keyword keyword-value ]

No priority queue is established by default.

Here, list-numberis the group number of priority queue. protocol-nameis the name of the protocol, the value of which can be IP and IPX at present.

When protocol-name is IP, the value of queue-keyword and keyword-value is shown in the table below.

Table QC-3-3Value of queue-keyword and keyword-value in IP

queue-keyword

keyword-value

Meaning

 

 

 

Null

Null

If it is an IP packet, it enters the queue.

fragments

Null

If it is a fragmentary IP packet, it enters the priority queue

list

access-list-number

IP packet in compliance with a specific access-list-number(normal)

definition enters the priority queue.

 

 

lt

Length Value

IP packet whose length is smaller than a count value enters the priority

queue.

 

 

gt

Length Value

IP packet whose length is larger than a count value enters the priority queue.

tcp

Port No.

If the source of IP packet or destination TCP port number is the specified port

number, the packet enters the queue.

 

 

udp

Port No.

If the source of IP packet or destination UDP port number is the specified

port number, the packet enters the priority queue.

 

 

3-8

Image 89
Contents V200R001 HuaweiBOM31010868 Manual Version T2-080168-20011213-C-1.5About This Manual ContentsBracket, e.g. Enter , Tab , Backspace , or a Format Description KeyKey 1 + Key Key 1, KeyAction Description SymbolHuawei Security Configuration SCII. IKE features Configuration of IKECreating IKE Security Policy IKE Configuration Task ListSelect Encryption Algorithm Select Authentication AlgorithmNo IKE security policy is created by default Select DH Group ID Set Pre-shared KeySelect Hashing Algorithm Show IKE SA parameter Quidway# show crypto ike sa Set Lifetime of IKE Association SAShow IKE security policy Quidway# show crypto ike policy Networking requirementsIII. Configuration procedure II. Networking diagramProblem 1 Invalid user ID information VPN Configuration VPN Table of Contents VPN Overview VPN featuresClassification of IP VPN According to operation modeIII. According to service purpose II. According to the layer where the tunnel isIV. According to networking model Brief Introduction to L2TP Protocol Configuration of L2TPOverview of Vpdn Brief induction to VpdnTunnel and session 2 L2TP ProtocolIII. Method to realize Vpdn III. Two typical L2TP tunnel modes II. Control message and data messageCall setup flow of L2TP channel is shown in the following IV. Call setup flow of L2TP tunnelFigure VPN-2-3Call setup flow of L2TP channel Features of L2TP protocolConfiguring at LAC Side Configuring L2TP1 L2TP Configuration Task List II. Create Vpdn group Disable Vpdn to run by defaultDisable Vpdn running by default Configuring at LNS SideIV. Set the connection request to originate L2TP channel Table VPN-2-4L2TP attribute tableNo vpdn group group-number III. Create/delete virtual interface templateAccept dialin l2tp virtual-template virtual No accept dialinSet local name of channel Optional configurationIII. Force local end to perform Chap authentication LCP does not renegotiate by default Local end does not perform Chap authentication by defaultIV. LNS forces LCP to renegotiate Set domain name delimiter and search sequenceDisable hiding AV pairs by default VII. Enable/disable hiding AV pairsVIII. Force to disconnect tunnel Monitoring and Maintenance of L2TPShow l2tp session command domain Typical Configuration of L2TPNAS-Initialized VPN Networking requirementIII. Configuration procedure Client-Initialized VPN Figure VPN-2-5Networking diagram of Client-Initialized VPNSingle User Interconnects Headquarters via Router Chapter Fault Diagnosis of L2TP Brief introduction to the protocol Configuration of GREBrief Introduction to GRE Protocol Figure VPN-3-2Format of transmission message in the tunnel II. Applicable rangeGRE Configuration Task List Configuring GRECreating Virtual Tunnel Interface Setting the Source Address of Tunnel InterfaceSetting the Destination Address of Tunnel Interface Setting the Encapsulation Mode of Tunnel Interface Message Setting the Network Address of Tunnel InterfaceSetting the Identification Key Word of Tunnel Interface Setting Tunnel Interface to Check with Check SumShow interface tunnel tunnel-number Monitoring and Maintenance of GREDisable tunnel interface to check with check sum by default Figure VPN-3-6Networking diagram of GRE application Typical Configuration of GREChapter Troubleshooting GRE Reliability Configuration LC Configuration of Hsrp Configuration of Backup CenterBackup Center Overview Configuration of Backup CenterConfiguring the Backup Center Configuration Task ListBackup logic-channel logic-channel No backup delay Backup state-up interval-time Configuring Routes for Main and Backup InterfacesBackup state-down number Typical Configuration of Backup Center Monitoring and Maintaining of Backup CenterAn example of Backup Between Interfaces An Example of Multiple Backup InterfacesChapter Chapter Hsrp Overview Configuration of HsrpStarting Hsrp Function Configuring HsrpSetting Router’s Preemption Mode in Hsrp Standby Group Setting Router’s Priority in Hsrp Hot Standby GroupSetting Hsrp Authorization Word Standby group-number preemptTable LC-2-4Set Hsrp authorization word Setting Hsrp TimerStandby group-numberauthentication string Monitoring the Specified InterfaceTable LC-2-6Monitor the specified interface Using Actual Interface MAC AddressModifying Virtual MAC Address An example for single hot standby group configuration Typical Configurations of HsrpMonitoring and Maintaining Hsrp Show relevant Hsrp information Quidway# show standby202.38.160.111 An example for setting Hsrp to monitor a specified interface An example for multiple hot standby groups configuration Fault Diagnosis and Troubleshooting of Hsrp QoS Configuration QC Apply CAR Rules to Packets Which is Matched the ACL CAR Configuration ExampleConfigure CAR Rules Based on the MAC Address Best-effort Service Three service types of QoSII.Integrated Service QoS OverviewFunctions of QoS III. Differentiated ServiceChapter Traffic Classification and Policing II. CAR Committed Access RateTraffic Classification and Policing Introduction to Traffic ClassificationIntroduction to Traffic Policing Features of Token BucketIII Complicacy Evaluation Introduction to CARII.Traffic Measuring with Token Bucket CAR Configuration Task List CAR ConfigurationNo CAR rule is specified by default Specify CAR rulesTable QC-2-3Monitoring and maintenance of CAR Monitoring and Maintenance of CARApply the CAR Rule on the Interface Show CAR statistics Quidway# show car interface serialII.Configuration CAR Configuration ExampleApplying CAR Rules to All Packets RequirementsApply CAR Rules to Packets Which is Matched the ACL III. ConfigurationII.Networking diagram Configure CAR Rules Based on the Priority LevelConfigure CAR Rules Based on the MAC Address Chapter Congestion and Congestion Management Congestion ManagementAbout Congestion Congestion Management PolicyFifo Queuing IV. WFQ Weighted Fair QueuingII. PQ Priority Queuing III. CQ Custom QueuingSelecting Congestion Management Policy No. Advantages Disadvantages Queue Working Principle of Congestion Management PolicyFifo III. CQ PQ Configuration task list Configuration of Congestion ManagementConfiguring PQ II. Configuring priority queue Normal low Priority-list list-number interface type number high mediumInterface adopts Fifo queuing by default Table QC-3-7Configuration of queue length of priority queueIII. Applying priority queue to the interface IV. Maintaining and monitoring the priority queueII. Configuring the custom queue Configuring CQCQ configuration task list No custom-list list-number interface type number Operation Command Configure the default custom queueNo custom-list list-number queue queue-number limit III. Applying custom queue to the interfaceCustom-list list-number queue queue-number byte-count No custom-list list-number queue queue-number byte-countWFQ configuration task list Configuring WFQII. Configuring the weighted fair queue III. Maintenance and monitoring of the weighted fair queueCQ Configuration Example Configuration Example of Congestion ManagementPQ Configuration Example Figre QC-3-6Networking diagram of CQ Configuration Versatile Routing Platform Troubleshooting of Congestion Management DDR Configuration DC DDR in Which the Router Calls Back PC Configuring Synchronous/Asynchronous Serial Port Using DDRDDR Configuration Configuration of Modem Management Introduction to DDR Technology DDR ConfigurationBrief Introduction to Dial Configuration Figure DC-1-1DDR configuration preparation flow Preparing DDR ConfigurationConfiguring Legacy DDR Configuring DDRConfiguration tasks of Legacy DDR include II. Configure an interface to send callsDialer string dial-string isdn-address Dialer rotary-group number Figure DC-1-2Schematic diagram of Dialer Rotary Group III. Configure an interface to receive callsVersatile Routing Platform DDR Configuration IV. Configure an interface to send and receive callsSet the attribute parameters of Legacy DDR Table DC-1-13Set the idle time of busy interface Access-list access-list-numberdeny permit Table DC-1-16Set access control of the dial interfaceAccess-list access-list-number deny permit Permit denyIntroduction to Dialer Profile Configuring Dialer ProfileDefault interval is 300 seconds IV. Set the attribute parameters of a dial interface II. Configuration task list of Dialer ProfileIII. Configure a logic dial interface Bind physical interfaces for a dialer pool Configuring CallbackSignificance of callback II. Terms and abbreviationsDialer caller remote-number callback IV. Configure Isdn calling line identification callbackOr dialer caller remote-number Interface dialerUser name callback-dialstring telephone-number Configure PPP callbackChapter Table DC-1-28Client end using Legacy DDR to configure PPP Configure Isdn dedicated line Configuring DDR Special FunctionsAutodial interval is 300 seconds by default II. Configure autodialIII. Configure cyclic use of dialer map Name Meaning Monitoring and Maintenance of DDRTable DC-1-34Configure cyclic use of dialer map Network requirements DDR Typical Configuration ExampleLegacy DDR Chapter Dialer Profile Chapter Point-to-Point DDR Networking diagramII. Configuration procedure Chapter Chapter 8810063 Point-to-Multipoint DDRChapter Chapter 8810148 Multipoint-to-Multipoint DDR8810052 III. Configuration procedure Chapter Chapter Chapter Chapter DDR Bearing IPX Chapter Chapter Chapter DDR Bearing IP and IPX at the Same Time Chapter Chapter Chapter RouterA RouterB BRI0 Flow Control of Dialer Profile MP over Dialer Profile-Case2.2 661012Chapter Channels for Dial-up and Connection to the Remote End Case Figure DC-1-11Networking diagram of DDR CaseChapter Two Serial Ports for Dial-up and Remote Dial Connection Case One Serial Port for Dial-up and Remote Dial Connection Case Chapter DDR for Access Service Chapter Chapter Chapter Chapter DDR for Inter-Router Callback Chapter DDR in Which the Router Calls Back PC III. Configuration procedure DDR for Autodial DDR Using Dialer Map Cyclically Solution 1 Logical interface as backup interface DDR Using Dialer Map as BackupChapter Configuring Synchronous/Asynchronous Serial Port Using DDR Precautions for DDR ConfigurationConfiguring Dialer-group Configuring Network Layer Address Apply PAP authentication Configuring PPP In Dialer Profile Configuration ModeChapter II. Apply Chap authentication Chapter Configuring PPP In Legacy DDR Configuration Mode Chapter II. Apply Chap authentication Chapter Configure Dialer-list Troubleshooting DDRDDR Fault Diagnosis Whether modem is normalIII. Check whether dialer-group is configured IV. Check whether dialer-list is configured correctly Chapter DDR Fault Elimination Information displayed at the calling end Troubleshooting with DDR Debugging InformationHow to acquire DDR debugging information Information displayed at the call receiving end DDR link negotiation Down on interface Modem Management Functions Provided by VRP1.4 Configuration of Modem ManagementModem Script FunctionKey words Description Timeout secondsModem Management Configuration Task List Configuring Modem ManagementConfiguring Modem Call-In and Call-Out Authorities Configuring Modem ScriptSpecifying the Event to Trigger Modem Script Configuring Modem Answer ModeExecuting Modem Script Manually Managing Modem with Modem Script Typical Configuration of Modem ManagementNetworking requirements Direct Dial with Script Configuration requirementsRouter Initialization with Initialization Script Interactively Connect Cisco Router Through Modem VoIP Configuration VC IP Fax Configuration VoIP ConfigurationIphc Configuration E1 Voice ConfigurationGK Client Configuration Versatile Routing Platform Table of Contents VoIP Overview VoIP ConfigurationII. H.323 protocol stack VoIP PrincipleBasic composition III. a typical telephone call processing by VoIP IP Voice Implementation over VRPSwitch Router Capacity channel IP Voice Feature over VRPChapter Configuring Dial-peer VoIP Configuration Task ListII. VoIP dial-peer configuration Pots dial-peer configurationIp precedence priority-number Configuring Dial TerminatorConfiguring Voice Port Configuring Abbreviated DialingBy default, we do not configure the dial terminator By default, we do not configure the abbreviated dialingTable VC-1-6Configuring voice-port By default, please use the shortest number match policy Configuring Global Number Match PolicyConfiguring the Recovery Method of Voice Board By default, Watchdog is enabled VoIP Monitoring and MaintenanceKHT Rcvccactivecall Channel = Status = Chtransframe Configuring Router FXS Port for Interconnection Typical VoIP Configuration ExamplesIII. Configuration procedures Shanghai Chapter Figure VC-1-7RouterShenzhen FXO works in the Plar mode LAN III. Configuration description VoIP TroubleshootingConfiguring IP Fax IP Fax ConfigurationTask List of IP Fax Configuration Overview to IP FaxGateway does not use ECM mode by default Checking If Configuring Fax to Use ECM ModeConfiguring Fax Rate Configuring Fax Local-train Threshold Value Configuring Fax Train ModeBy default, the fax rate will be determined by voice mode Mode is local-train mode local by defaultFax protocol t38 ls-redundancy number Configuring Gateway Carrier Transmit Energy LevelNo fax protocol t38 ls-redundancy Fax protocol t38 hs-redundancy numberBy default, rtp protocol is used Monitoring and Maintenance of IP FaxBy default, T.38 protocol is used Versatile Routing Platform IP Fax Configuration Typical Configuration of IP FaxChapter Overview of E1 Voice Configuration E1 Voice ConfigurationFunction of E1 Voice Usage of cE1/PRI InterfaceSignaling modes supported Features of E1 VoiceII. Protocols and standards supported III. Support single stage dialing and two-stage dialingConfiguration Task List of E1 Voice E1 Voice ConfigurationConfiguring Pots dial-peer IV. Integrated transmission of voice and dataTable VC-3-1Configuration Commands of Pots dial-peer Configuring VoIP dial-peerIncoming called-number number No incoming called-numberTable VC-3-2Configuration Commands of VoIP dial-peer Configuring the Basic Parameters of E1 InterfaceTable VC-3-3Configuration Commands of E1 Interface Configuring Voice Port E1 InterfaceTable VC-3-4Configuration Commands of E1 Voice Port Configuring E1 Voice R2 SignalingConfiguring DS0 group By default, the system has not created any DS0 group II. Configuring Related Parameters of R2 SignalingTable VC-3-6Configuration Commands of R2 Signaling Pri-group timeslots timeslots-list Configuring the Basic Parameters of Isdn PRI InterfaceNo pri-group Interface serial serial-noMaintaining the MFC Channel and Circuit of the Specified TS Monitoring and Maintenance of E1 VoiceConfiguring Voice Port Isdn PRI Interface II. show Command Related to E1 Voice Quidway# show voice-port R2 signalling call statistics III. debug Commands Related to E1 VoiceRouter Connected to PBX through E1 Voice Port Typical Configuration Examples of E1 VoiceTable VC-3-11debug Commands of E1 Voice Versatile Routing Platform Router Connected to PBX in Isdn PRI Mode Two-stage Dialing Configuration II. Netwoking diagram Transmission of Data and Voice Simultaneously Parameter configuration of Beijing-side routerFault Diagnosis and Troubleshooting of E1 Voice Configuration of GK Client GK Client ConfigurationConfiguration Task List of GK Client Configuring One Interface as H.323 Gateway InterfaceConfigure the GK Server Name and Address Configuring Gateway AliasBy default, GK Client function is deactivated Activating or Deactivate GK Client FunctionBy default, there is not any tech-prefix Configuring Tech-PrefixConfiguring GK Interworking Mode Versatile Routing Platform GK Client Configuration Typical Configuration Examples of GK ClientBe default, the GK interworking mode is cisco mode Chapter Fault Diagnosis and Troubleshooting of GK Client Overview of Iphc Iphc ConfigurationConfiguration Task List of Iphc Iphc ConfigurationEnable/disable RTP header compression No ip rtp compression-connectionsConfigure the deleting of udpchk field from UDP header Configure the Cisco-compatible RTP header compressionBy default, the udpchk field in UDP packet field is set to No ip tcp header-compressionTable VC-5-6Monitoring and Maintenance of Iphc Monitoring and Maintenance of IphcExcellent Good Fair Poor How Are We DoingMistake Suggested Correction Line No
Related manuals
Manual 13 pages 6.76 Kb