Table Of Contents
Numerics - A - B - C - D - E - F - G - H - I - K - L - M - N - O - P - Q - R - S - T - U - V - W -
Index
Numerics
802.1q 4-3
A
ABR (available bit rate) 3-5
absolute value 6-10
access circuit 1-1
access router 2-1
activate protocols 6-12
address, source 3-2
address range 4-7
add service class 6-21
Administration tab 4-4
advanced options, congestion avoidance 6-17
aggregated
rate limiters 3-5, 6-31
traffic shapers 3-5, 5-17
architecture, network 2-1
assumptions, implementation 4-1
ATM
link 2-3
switches 2-1
traffic shapers 3-5, 6-26
auditing configuration 8-1
audit message 8-3
autodiscovery 4-1
available bit rate 6-23
average
cell rate 6-26
queue size 6-17
rate shaping 6-13
transmission rate 6-4, 6-13, 7-9
avoidance options 6-17
B
bandwidth
guarantee 1-2
minimum 3-3
percentage 5-10
static 6-23
best effort service class 3-3, 6-11
BGP protocol 6-3
bucket, token 6-23
burst
extended 6-4, 6-13
setting size 3-5, 6-4, 6-13, 6-26
tolerance 6-28
business-data-1 service class 3-3, 6-11
C
candidates for QoS 5-6
CAR (committed access rate) 3-2, 5-5
CBR (constant bit rate) 3-5
CEF (Cisco expressed forwarding) 4-3
cell delay variation 6-23
cell rate 6-26
cell transfer delay 6-23
CIR (committed information rate) 6-13
Cisco IOS
commands 4-4, 8-9
documentation 4-4
versions 4-2
Cisco platforms supported 4-2
class-based rate limiting 1-5
class-based traffic shaper 3-5, 6-25
classification, see traffic classification
class-maps 8-14
CLE (customer location equipment) 7-14
CLI (command line interface) 4-4
closed state 8-7
collection, device 4-1
commands
downloaded to device 8-14
missing 8-3
sample A-7
committed access rate 3-2, 5-5
components, QoS 1-2
compression, header 3-5, 6-30
concepts, QoS 1-1, 2-2
configlet
example 4-7
generated 5-25
sample A-1
viewing 8-13
configuration
audit 8-1
device 4-1
editing 4-4
messages 8-14
network 5-2
prerequisites 4-1
sample A-1
viewing 4-1
conform action 1-5, 6-5, 6-14
conformed burst size 6-4, 6-13
congestion avoidance
defined 1-6
options 6-17
congestion indication setting 6-29
congestion management
defined 1-6
constant bit rate 6-23
container, for network object 4-7
control messages 3-3
CPE
defined 1-1
managed 2-3
marking 5-5
unmanaged 2-5
untrusted 5-12
cRTP (compressed real-time protocol) 3-5, 6-30
D
data applications 3-4
data service class 3-3, 6-11
data service class, adding 6-21
dCEF (distributed CEF) 4-3
DCPL (dynamic component properties library) 4-4, 4-6
default service class 3-2
defining link objects 5-5
delay, serialization 3-5
deleting service classes 5-14, 6-21, 7-7
deployed state 5-26, 8-5, 8-6
deploying service requests 5-26, 7-15
deployment
forcing 5-26
scheduling 5-26
verify 8-1
deployment example 5-2
destination port 1-3
device
collection 4-1
configuration 4-1
prefix properties 6-19
sample configurations A-7
DiffServ 3-3, 7-2
direction, of traffic 6-32
documentation, Cisco IOS 4-4
documents, related xiv, 6-8
downloaded commands 8-14
drop, based on 6-17
drop packet 6-5, 6-14
DSCP marking 1-4
E
editing devices 5-9
editing service classes 5-14, 7-6
EIGRP protocol 6-3
encapsulation, layer 2 4-2, 5-22
entry fields, defined 6-1
EoMPLS link settings 5-15
error messages 5-14, 7-7
Ethernet QoS 1-4, 7-1, 8-14, A-18
example configurations 5-2
exceed action 1-5
experimental value, MPLS 1-4
exponential weighing constant 6-17
expressed forwarding 4-3
extended burst 6-4, 6-13
F
failed audit 8-3
failed audit state 8-6
failed deploy state 8-6
failed service request 8-5
force deploy 5-26
forwarding, distributed 4-3
forwarding, layer 2 4-3
fragmentation 6-30
fragment delay 6-31
Frame Relay
LFI 3-5
protocols 4-3
traffic shapers 3-5, 6-23
FRF.12 3-5
FRTS (Frame Relay traffic shaper) 3-5
FTP protocol 6-12
G
generate audit 8-1
GRE (generic routing encapsulation) 4-3
GUI, launching 5-3
GUI process 5-1
H
HDLC (high-level data link control) 4-3
header, RTP 3-5
header compression 6-30
home window 5-4
host configuration 4-4
hostname 5-3
Hosts window 4-4
HTTP protocol 6-12
I
implementation assumptions 4-1
ingress router 7-14
input traffic 6-32
interface
customer-facing 2-3
ingress, egress 1-1
marking 5-1
provider-facing 2-3
interface-based
aggregated rate limiters 5-17
parameters 6-21
rate limiting 1-5, 6-31
introduction 1-2
invalid state 8-6
IP address, for login 5-3
IP link settings 5-15
IP precedence, marking 1-4
IP QoS 1-1, 5-1, 7-14
IPSec (IP security) 4-3
ISL (inter-switch link) 4-3
K
keepalives 3-3
L
L2TP (layer 2 transport protocol) 4-3
L2VPN
CLE 7-14
prerequisties for QoS 7-10
service request 7-11
latency, defined 1-2
launching GUI 5-3
layer 2 encapsulation 4-2, 5-22
layer 2 forwarding 4-3
leaky bucket 6-23
line cards supported 4-2
link efficiency 5-17
parameters 6-30
settings 3-5
link endpoint pair 7-18
link endpoints 5-9
link ID 8-10
link level policy 2-2, 3-4
link objects 5-5
link QoS settings 2-3, 5-1, 5-15
link speed 2-2, 6-31
log entries 8-15
logging in 5-3
lost state 8-6
M
managed CPE 2-3
managed PE 2-4
management service class 3-3
management service class, entry fields 6-3, 7-9
mandatory parameters 6-1
marking
CPE devices 5-5
defined 1-4
packets 6-8
PE devices 5-7
mark probability 6-20
maximum burst size 6-26
maximum threshold 6-20
mean rate 6-4, 6-13, 7-9
messages, configuration 8-14
messages, status 5-14, 7-7
Microsoft, version required 5-3
minimum bandwidth 3-3
minimum threshold 6-20
MLPPP (multilink point-to-point protocol) 3-5, 4-3
MLPPP for LFI 3-5
modular QoS commands 4-4
Monitoring tab 8-14
MPLS
checking prerequisites 7-14
experimental value 1-4
network 7-14
provisioning 7-18
multiple data links 6-30
N
Netscape, version required 5-3
network
address range 4-6
architecture 2-1
configuration 5-2
operator 2-3, 2-6
requirements 1-2
network object, attributes 4-7
NI (no increase setting) 6-29
O
optional entry parameters 6-1
optional traffic shapers 6-22
OSPF protocol 6-3
output traffic 6-32
P
packet
conform action 6-5, 6-14
fragments 6-31
marking 6-4, 7-9
sequencing 3-5
parent level class-based traffic shaper 6-25
partially-managed CPE 5-12
password, for login 5-4
PE
defined 1-1
marking 5-7
re-marking 5-8
unmanaged configuration 2-6
peak
burst 6-4, 6-13
cell rate 6-26
rate shaping 6-13
pending state 5-26, 8-5, 8-6
PHB (per-hop-behavior) 7-14
platform supported 4-2
policy
categories 5-9
components 3-1
example 2-3
link level 3-4
service level 3-2
types 5-9
policy manager 5-3
port, destination 1-3
port adapter 4-2
port range 6-19
ports, for traffic classification 6-19
PPP (point-to-point protocol) 4-3
preconfigure properties 4-4
preface xiii
prerequistes, configuration 4-1
probability, marking 6-20
process flowchart 5-2
properties file 4-4
protocol ID 1-3
protocols
activating 6-12
adding for classification 6-19
cRTP 3-5, 6-30
layer 2 transport 4-3
MLPPP 3-5, 4-3
PPP 4-3
provider region name 5-23
provisioning
model 2-1
process 5-1
strategies 2-3
PVC, point-to-point 4-3
Q
QoS
candidates 5-6
components 1-2, 2-2
concepts 2-2
for L2VPNs 7-10
for MPLS VPNs 7-14
for standard IP 1-1
for VPN services 7-1
introduction 1-2
policy 3-1
requirements 1-2
QoS provisioning 5-1
queue
depth 6-8, 6-17, 6-21, 7-10
determining size 6-17
limits 1-6, 7-10
R
rate, committed 6-13
rate factors 6-29
rate limiting 5-17, 7-9
aggregated 6-31
defined 1-5
setting 6-5, 6-14
rate shaping 6-13
real-time applications 6-23
related documents
ISC xiv
QoS technology xiv
re-marking PE devices 5-8
reports, audit 8-1
repository, ISC 3-6, 5-18, 5-25, 8-3
requested service request 7-15
requested state 8-6
requirements, multimedia 1-2
re-rate limiting, PE devices 5-8
resource management 1-2
resource management cell 6-29
RIP protocol 6-3
router supported 4-2
routing protocol service class 3-2, 3-3
RTP data packets 6-30
RTP header 3-5
S
sample commands A-7
sample configlets, generated for QoS A-1
scheduling packets 1-2
sequencing packets 3-5
serialization delay 3-5
service class
adding 5-14, 7-7
attributes 6-21
data 3-3, 6-11
defined 3-2
deleting 6-21
editing 5-14, 7-6
management 3-3
routing protocol 3-2, 3-3
voice 3-2
Service Design tab 5-3
Service Inventory tab 4-1
service level agreement 2-3
service level policy 2-2, 3-2, 5-11
service license 5-4
service model 2-2
service name 6-3, 7-9
service request
creating 5-18
deploying 5-26
saving 5-25
transition state 8-10
transition states 8-5
verifying 8-5
set dscp transmit 6-5, 6-14
set name, link Qos profile 5-16
set prec transmit 6-5, 6-14
SLA (service level agreement) 2-3
SMTP protocol 6-12
source IP address 3-2, 6-19
states of service requests 8-6
static bandwidth 6-23
status messages 5-14, 7-7
strategies, for provisioning QoS 2-3
streaming video 1-2
subinterfaces 2-5
sustained cell rate 6-27
switches supported 4-2
system properties 4-4
T
T1, link speed 6-31
tabs
Administration 4-4
Monitoring 8-14
Service Design 5-3
Service Inventory 4-1
task logs 8-5
Telnet protocol 6-12
template service class 3-2
terminology xiii
TFTP protocol 6-12
threshold, minumum 6-20
TOC, in window 4-1
token bucket 6-23
TOS (type of service) 1-4
traffic classification
based on marking 6-3, 6-10, 7-9
based on source IP 6-19
based on variable 4-6
by port 6-19
defined 1-3
entry field 6-3
management LAN address 6-4
protocols 6-12
routing protocols 6-8
traffic direction 6-32
traffic shaper
aggregated 6-22
ATM 3-5
ATM (ABR) 6-28
ATM (CBR) 6-28
ATM (VBR-nrt) 6-26
ATM (VBR-rt) 6-26
class-based 3-5
Frame Relay 3-5
optional 6-22
parent-level class-based 6-25
transition states 8-5, 8-10
transmission rate
increase or decrease 6-29
setting 6-4, 6-13, 7-9
variations 6-23
transmit packet 6-5, 6-14
troubleshooting 8-5
type of service 1-4
U
UDP port 6-3
unmanaged devices 2-5
untrusted device 5-12
user interface, ISC 5-2
username, for login 5-4
V
variable, for classification 4-6
variable bit rate 6-23
VBR-nrt (variable bit rate non real-time) 3-5
VBR-rt (variable bit rate real-time) 3-5
VC (virtual circuit) 5-22
verify deployment 8-1
verifying service requests 8-5
version, Cisco IOS 4-2
video-conferencing 1-2
viewing QoS configlet 8-13
violate action 1-5
VIP, non-VIP 6-25
voice service class 3-2
VoIP (voice-over-IP) 3-3
VPN services 5-18, 7-1
W
warning messages 5-14, 7-7
weighing constant 6-17
WRED (weighted random early detection) 1-4, 6-17