No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


AR500, AR510, and AR530 V200R007 Commands Reference

This document describes all the configuration commands of the device, including the command function, syntax, parameters, views, default level, usage guidelines, examples, and related commands.

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
qos pre-classify

qos pre-classify


The qos pre-classify command enables pre-extraction of original IP packets.

The undo qos pre-classify command disables pre-extraction of original IP packets.

By default, pre-extraction of original IP packets is disabled.


qos pre-classify

undo qos pre-classify




Tunnel interface view, IPSec Efficient VPN policy view, Manual IPSec policy view, IPSec policy view , IPSec policy template view, IPSec profile view, GDOI policy view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

In tunnel mode, QoS parameters such as the packet header and protocol type in original packets are hidden after IP packets are encapsulated through IPSec. Although IPSec uses the DSCP field in original packets as the DSCP field in the IP packet header, some QoS solutions require quintuple information. The encryption device can pre-extract quintuple information including the source address, destination address, protocol type, source port number, and destination port number to facilitate refined QoS management on IPSec packets.

In an A2A VPN solution, the device uses the IP header of original packets as the IP header for encapsulated A2A VPN packets. Therefore, you do not need to configure this command if the device classifies packets based on the source address, destination address, or protocol type only.

Follow-up Procedure

After pre-extraction of original IP packets is enabled, run the if-match acl { acl-number | acl-name } command in the traffic classifier view to configure a matching rule based on the ACL.


# Enable pre-extraction of original IP packets in the IPSec policy view.

<Huawei> system-view
[Huawei] ipsec policy policy1 10 isakmp
[Huawei-ipsec-policy-isakmp-policy1-10] qos pre-classify
Updated: 2019-05-29

Document ID: EDOC1000097293

Views: 135232

Downloads: 148

Average rating:
This Document Applies to these Products

Related Version

Related Documents

Previous Next