- About This Document
MQC Configuration
Priority Mapping Configuration
- Overview of Priority Mapping
- Understanding Priority Mapping
- Application Scenarios for Priority Mapping
- Licensing Requirements and Limitations for Priority Mapping
- Default Settings for Priority Mapping
Configuring Priority Mapping
Configuration Examples for Priority Mapping
Troubleshooting Priority Mapping
FAQ About Priority Mapping
Traffic Policing and Traffic Shaping Configuration
- Overview of Traffic Policing and Traffic Shaping
Understanding Traffic Policing, Traffic Shaping, and Interface-based Rate Limiting
- Application Scenarios for Traffic Policing, Traffic Shaping, and Interface-based Rate Limiting
- Licensing Requirements and Limitations for Traffic Policing and Traffic Shaping
- Default Settings for Traffic Policing and Traffic Shaping
- Configuring the Working Mode for Traffic Management
Configuring Traffic Policing
Configuring Traffic Shaping
- Configuring Rate Limiting on a Physical Interface
Maintaining Traffic Policing and Traffic Shaping
Configuration Examples for Traffic Policing and Traffic Shaping
FAQ About Traffic Policing and Traffic Shaping
- Does the Device Support Rate Limiting Based on IP Addresses?
- How Is Bandwidth of Different Types of Traffic Guaranteed?
- Why IP-based CAR Is Invalid on a WAN-side Interface?
- Can IP-based Rate Limit Be Configured on a Layer 2 Interface?
- What Are Differences Between the Outbound Traffic Policing and Traffic Shaping?
- Can the qos gts and qos car Commands Be Used Simultaneously for Outgoing Packets?
- The Interval at Which the Traffic Shaping Rate Increases Can Be Set, But the Interval at Which the Traffic Shaping Rate Decreases Cannot Be Set. Why?
- Can the Adaptive Traffic Profile Be Bound to an NQA Test Instance?
- Is the Upper or Lower Threshold for the Traffic Shaping Rate in the Adaptive Traffic Profile Used by Default?
Congestion Management and Congestion Avoidance Configuration
- Overview of Congestion Management and Congestion Avoidance
Understanding Congestion Management and Congestion Avoidance
- Application Scenarios for Congestion Avoidance and Congestion Management
- Licensing Requirements and Limitations for Congestion Management and Congestion Avoidance
- Default Settings for Congestion Management and Congestion Avoidance
Configuring Congestion Management
Configuring Congestion Avoidance
Configuration Examples for Congestion Management and Congestion Avoidance
FAQ About Congestion Management and Congestion Avoidance
- How Is the Bandwidth Calculated in the AF and EF Queues on a Tunnel Interface?
- Which Scheduling Modes Do LAN-Side Boards and WAN-Side Boards Support?
- Are There Any Requirements for Weights Assigned to Queues for WFQ Scheduling, and Do I Have to Ensure That the Sum of All Weights Is 100?
- What Impact Does the Queue Length Have?
- What Functions Do Drop Profiles Have?
- In Which Situation Do EF Queues Preempt the Idle Bandwidth?
ACL-based Simplified Traffic Policy Configuration
HQoS Configuration
- Overview of HQoS
- Understanding HQoS
- Application Scenarios for HQoS
- Licensing Requirements and Limitations for HQoS
Configuring Traffic Policy Nesting
- Configuring a Sub-interface to Inherit the Traffic Policy on a VE Interface
- Configuring MQC to Implement Hierarchical Scheduling on Tunnel Interfaces
- (Optional) Configuring Traffic Policing on an Interface
- (Optional) Configuring Traffic Shaping on an Interface
- Verifying the HQoS Configuration
Configuration Examples for HQoS
Packet Filtering Configuration
Priority Re-marking Configuration
Traffic Statistics Configuration
Bandwidth Management Configuration
Application Control Management Configuration
- Overview of Application Control Management
- Understanding Application Control Management
- Licensing Requirements and Limitations for Application Control Management
- Application Scenarios for Application Control Management
Configuring Application Control Management
Configuration Examples for Application Control Management
SAC Configuration
- Overview of SAC
Implementation of SAC
- Application Scenarios for SAC
- Licensing Requirements and Limitations for SAC
Configuring SAC
- Enabling Deep Security Defense and Loading the SAC Signature Database
- (Optional) Configuring an FPI Application
- Configuring SA Applications
- (Optional) Configuring a User-defined Application Group
- Configuring an SAC Traffic Policy
- Enabling the SA Statistics Function on an Interface
- Verifying the Configuration
Maintaining SAC
Configuration Examples for SAC