Index
IN-59
Catalyst 3750 SwitchSoftware Configuration Guide
OL-8550-09
IP standard ACLs 35-48
MAC ACLs 35-50
policy maps, hierarchical 35-57
port trust states within the domain 35-41
trusted boundary 35-43
default auto configuration 35-22
default standard configuration 35-35
displaying statistics 35-85
DSCP transparency 35-45
egress queues
allocating buffer space 35-78
buffer allocation scheme, described 35-18
configuring shaped weights for SRR 35-82
configuring shared weights for SRR 35-83
described 35-5
displaying the threshold map 35-81
flowchart 35-18
mapping DSCP or CoS values 35-80
scheduling, described 35-5
setting WTD thresholds 35-78
WTD, described 35-19
enabling globally 35-40
flowcharts
classification 35-7
egress queueing and scheduling 35-18
ingress queueing and scheduling 35-16
policing and marking 35-11
implicit deny 35-8
ingress queues
allocating bandwidth 35-75
allocating buffer space 35-75
buffer and bandwidth allocation, described 35-17
configuring shared weights for SRR 35-75
configuring the priority queue 35-76
described 35-4
displaying the threshold map 35-74
flowchart 35-16
mapping DSCP or CoS values 35-73
priority queue, described 35-17
scheduling, described 35-4
setting WTD thresholds 35-73
WTD, described 35-17
IP phones
automatic classification and queueing 35-21
detection and trusted settings 35-21, 35-43
limiting bandwidth on egress interface 35-84
mapping tables
CoS-to-DSCP 35-67
displaying 35-86
DSCP-to-CoS 35-70
DSCP-to-DSCP-mutation 35-71
IP-precedence-to-DSCP 35-68
policed-DSCP 35-69
types of 35-13
marked-down actions 35-55, 35-61
marking, described 35-4, 35-9
overview 35-2
packet modification 35-20
policers
configuring 35-55, 35-61, 35-65
described 35-9
displaying 35-85
number of 35-39
types of 35-10
policies, attaching to an interface 35-9
policing
described 35-4, 35-9
token bucket algorithm 35-10
policy maps
characteristics of 35-53
displaying 35-86
hierarchical 35-9
hierarchical on SVIs 35-57
nonhierarchical on physical ports 35-53
QoS label, defined 35-4
queues
configuring egress characteristics 35-77
configuring ingress characteristics 35-73