This section describes the traffic behaviors supported by the device and how to configure actions for a traffic behavior.
The device supports various types of traffic behaviors. You can choose one or more traffic behaviors as required.
The system view is displayed.
A traffic behavior is configured, and the traffic behavior view is displayed.
Packets are allowed or forbidden to pass.
If both the if-match any and deny parameters are configured in an MF classification rule, the device discards all packets, including protocol packets, that flow through an interface. Therefore, exercise caution when configuring both the if-match any and deny parameters in a traffic classification rule.
If the permit or deny action is configured in both the rule command and the traffic behavior view, only the packets that are permitted by the rule command are processed according to the configured traffic behavior. If the deny action is configured in either the rule command or the traffic behavior view, all the matched packets are discarded.
The configuration is committed.
The system view is displayed.
A traffic behavior is configured, and the traffic behavior view is displayed.
A traffic policing action is configured.After you configure a traffic policing action for a traffic policy, the traffic policy can be applied to both incoming and outgoing traffic on an interface.
The original qos car command that is configured on an interface will be affected after a traffic policy configured with a traffic policing action is applied to the interface.
If this command is run more than once, the last configuration overrides the previous one.
If the CoS of a packet is re-marked as EF, BE, CS6, or CS7, the packet can be re-marked only green.
Class-based HQoS scheduling is specified as the traffic behavior.
The user-queue and car commands are mutually exclusive in the same traffic behavior.
The outgoing traffic supports class-based HQoS scheduling only when the traffic policy works in unshared mode and is applied to an ETM subcard.
Flow CAR is implemented for flows with the source or destination IP addresses residing on the specified network segment.
The configuration is committed.
The system view is displayed.
A traffic behavior is configured, and the traffic behavior view is displayed.
The rate at which broadcast packets are transmitted is restricted.
The rate at which multicast packets are transmitted is restricted.
The rate at which unknown unicast packets are transmitted is restricted.
The configured traffic behavior can be applied to the incoming or outgoing traffic on an interface.
After traffic suppression is applied to an interface, the packets matching the rules are processed based on the traffic behavior, and the packets not matching the rules are forwarded.
The system view is displayed.
A traffic behavior is configured, and the traffic behavior view is displayed.
Packets with a certain CoS are colored.
The function of marking matching packets' CoS and color based on the status of the specified BFD session is configured.
The configuration is committed.
The system view is displayed.
A traffic behavior is configured, and the traffic behavior view is displayed.
To re-mark the precedence of IP packets, run the remark ip-precedence ip-precedence command.
To re-mark the DSCP value of IP packets, run the remark [ ipv6 ] dscp dscp-value command.
To re-mark the precedence of VLAN packets, run the remark 8021p 8021p-value command.
To re-mark the ToS value of IP packets, run the remark tos tos command.
The configuration is committed.
The system view is displayed.
A traffic behavior is configured, and the traffic behavior view is displayed.
To directly forward packets without redirecting them, run the permit command in the traffic behavior view.
To directly drop packets without redirecting them, run the deny command in the traffic behavior view.
The deny action is mutually exclusive with other traffic actions. Traffic that is configured with the deny action cannot be further processed unless the traffic is configured with the permit action.
To redirect IP packets to the public network LSP, run the redirect lsp public dest-ipv4-address [ nexthop-address | interface interface-type interface-number | secondary ] command.
To redirect packets to a specified VPN group, run the redirect vpn-group vpn-group-name command.
To configure the next hop of the packets to be sent to the CPU according to limits of idle web users, run the redirect-cpu http-redirect-chasten command.
In VS mode, this command is supported only by the admin VS.
When the redirection policy in the traffic behavior is a discard PBR policy, the IP address and outbound interface of the next hop must be specified. When the redirection policy in the traffic behavior is a forward PBR policy, the IP address of the next hop must be specified.
In IPv6 application, the IP address of the next hop specified for a discard PBR policy must be an IPv6 link-local address or an IPv6 unicast address; the IP address of the next hop specified for a forward PBR policy can be only an IPv6 unicast address.
The configuration is committed.
The system view is displayed.
A traffic behavior is configured, and the traffic behavior view is displayed.
A load balancing mode is set for packets.
The configuration is committed.
ACL rules are generally used for redirection in traffic behavior. However, the specifications of ACL rules are limited. When ACL rules defined for MF classification do not meet the live network requirements, you can redirect the traffic behavior to a configured traffic policy to implement cascaded MF classification.
The system view is displayed.
A traffic behavior is configured, and the traffic behavior view is displayed.
The traffic behavior is redirected to the traffic policy.
The parameters specified for a traffic policy, such as inbound, outbound, link-layer, mpls-layer, and all-layer, are inherited by the cascaded traffic policy.
When the traffic behaviors for two-level ACLs are service-class, level-1 service-class preferentially takes effect. However, if level 1 service-class carries no-remark, level-2 service-class preferentially takes effect.
Hierarchical CAR is enabled in a cascaded traffic policy.
When a traffic policy is configured in a traffic behavior, CAR can also be configured in the traffic policy to implement hierarchical CAR.
The configuration is committed.
To charge the subscribers or collect traffic statistics based on traffic classifiers, you can configure the corresponding traffic classifier and run the following commands to enable NetStream sampling:
The system view is displayed.
A traffic behavior is configured, and the traffic behavior view is displayed.
NetStream sampling is enabled.
Traffic sampling using a share-mode traffic policy is not supported.
NetStream is not applied to traffic matching the ACL rule or traffic behavior that contains deny.
The configuration is committed.
If both BGP flow specification and MF classification are configured on a device, you can run the increase-priority command to allow the traffic behavior configured in MF classification to preferentially take effect.
The system view is displayed.
A traffic behavior is configured, and the traffic behavior view is displayed.
The priority of the traffic behavior is increased.
The configuration is committed.