Default VSP QOS behaviour

Enabling DiffServ on a port

Enable DiffServ so that the system provides DiffServ-based QoS on the port. By default, DiffServ is enabled.

Procedure

1. Enter Interface Configuration mode:
enable
configure terminal
interface GigabitEthernet {slot/port[/sub-port][-slot/port[/subport]][,…]}
or interface vlan <1–4059>

Note:
If your platform supports channelization for 40 Gbps ports and the port is channelized,
you must also specify the sub-port in the format slot/port/sub-port.

2. Enable DiffServ:
enable-diffserv [port {slot/port[/sub-port][-slot/port[/sub-port]]
[,…]}] [enable]
3. Disable Diffserv:
no enable-diffserv [port {slot/port[/sub-port][-slot/port[/subport]][,…]}]
[enable]

Enables DiffServ for the specified port. The default is enabled.

Configuring Layer 3 trusted or untrusted ports

Configure a port as trusted or untrusted to determine the Layer 3 QoS actions the switch performs.
A trusted (core) port honors incoming Differentiated Services Code Point (DSCP) markings. An untrusted (access) port overrides DSCP markings. The default configuration is trusted.

Procedure

1. Enter Interface Configuration mode:
enable
configure terminal
interface GigabitEthernet {slot/port[/sub-port][-slot/port[/subport]][,…]}
or interface vlan <1–4059>

Note:
If your platform supports channelization for 40 Gbps ports and the port is channelized,
you must also specify the sub-port in the format slot/port/sub-port.

2. Enable DiffServ.
3. Configure the port as an access port:
access-diffserv [port {slot/port[/sub-port][-slot/port[/sub-port]]
[,…]}] [enable]
4. Configure the port as a core port:
no access-diffserv [port {slot/port[/sub-port][-slot/port[/subport]][,…]}]
[enable]

If enabled, specifies an access port and overrides incoming DSCP bits. If disabled, specifies a core port that honors and services incoming DSCP bits.

Configuring Layer 2 trusted or untrusted ports

Configure a port as trusted or untrusted to determine the Layer 2 QoS actions the switch performs.
A trusted port (override disabled) honors incoming 802.1p bit markings. An untrusted port (override enabled) overrides 802.1p bit markings.

Procedure

1. Enter Interface Configuration mode:
enable
configure terminal
interface GigabitEthernet {slot/port[/sub-port][-slot/port[/subport]][,…]}
or interface vlan <1–4059>

Note:
If your platform supports channelization for 40 Gbps ports and the port is channelized,
you must also specify the sub-port in the format slot/port/sub-port.

2. Enable DiffServ.
3. Configure the port as Layer 2 untrusted:
qos 802.1p-override [enable]
4. Configure the port as Layer 2 trusted:
no qos 802.1p-override [enable]

If you use this variable, the port overrides incoming 802.1p bits; if you do not use this variable, the port honors and services incoming 802.1p bits. The default is disable (Layer 2 trusted).

Configuring the port QoS level

Configure the port QoS level to assign a default QoS level for all traffic if the packet does not match an access control list (ACL) that re-marks the packet. If you configure port QoS levels, Layer 2 and Layer 3 traffic from the same port use the same QoS level. The default value is 1.

For VoIP traffic, Avaya recommends that you use QoS level 6.

Procedure

1. Enter GigabitEthernet Interface Configuration mode:
enable
configure terminal
interface GigabitEthernet {slot/port[/sub-port][-slot/port[/subport]][,…]}

Note:
If your platform supports channelization for 40 Gbps ports and the port is channelized,
you must also specify the sub-port in the format slot/port/sub-port.

2. Configure the port QoS level:
qos level [port {slot/port[sub-port]}] <0-6>

Specifies the default QoS level for the port traffic. The system reserves QoS level 7 for network control traffic. The default is 1.