Index
IN-37
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
policy maps on physical ports 36-48
port trust states within the domain 36-35
trusted boundary 36-38
default auto configuration 36-21
default standard configuration 36-30
displaying statistics 36-78
DSCP transparency 36-39
egress queues
allocating buffer space 36-71
buffer allocation scheme, described 36-18
configuring shaped weights for SRR 36-75
configuring shared weights for SRR 36-76
described 36-4
displaying the threshold map 36-74
flowchart 36-17
mapping DSCP or CoS values 36-73
scheduling, described 36-4
setting WTD thresholds 36-71
WTD, described 36-19
enabling globally 36-34
flowcharts
classification 36-6
egress queueing and scheduling 36-17
ingress queueing and scheduling 36-15
policing and marking 36-10
implicit deny 36-7
ingress queues
allocating bandwidth 36-68
allocating buffer space 36-68
buffer and bandwidth allocation, described 36-16
configuring shared weights for SRR 36-68
configuring the priority queue 36-69
described 36-4
displaying the threshold map 36-67
flowchart 36-15
mapping DSCP or CoS values 36-67
priority queue, described 36-16
scheduling, described 36-4
setting WTD thresholds 36-67
WTD, described 36-16
IP phones
automatic classification and queueing 36-20
detection and trusted settings 36-20, 36-38
limiting bandwidth on egress interface 36-77
mapping tables
CoS-to-DSCP 36-60
displaying 36-78
DSCP-to-CoS 36-63
DSCP-to-DSCP-mutation 36-64
IP-precedence-to-DSCP 36-61
policed-DSCP 36-62
types of 36-12
marked-down actions 36-50, 36-55
marking, described 36-4, 36-8
overview 36-2
packet modification 36-19
policers
configuring 36-50, 36-55, 36-58
described 36-8
displaying 36-78
number of 36-33
types of 36-9
policies, attaching to an interface 36-8
policing
described 36-4, 36-8
token bucket algorithm 36-9
policy maps
characteristics of 36-48
displaying 36-78