Traffic Policing Overview Traffic policing is the process of monitoring network traffic for compliance with a traffic policy and then enforcing that policy. Traffic policing involves such tools as rate limiting and shaping, CIR, EIR, color markers, service policies, class and policy maps, and storm control.
Policy Maps A policy map is a unique set of class maps, policing parameters, and QoS parameters that you can apply to a certain class of traffic.
Class Maps Class maps are used in a policy map to apply policing and QoS policies to a particular class of traffic. You can use matching criteria to classify the traffic.
Single rate three color marker Single rate three color marker (SrTCM) meters an IP packet stream and marks its packets either green, yellow, or red.
Two-rate, three-color marker The two-rate, three-color marker (TrTCM) meters an IP packet stream and marks its packets either green, yellow, or red.
Match Access-Group Class Map Policing The ACL-based policing feature controls the amount of bandwidth consumed by an individual flow or aggregate of inbound flows by limiting the traffic rate on a port according to criteria defined by the match access-group class map.
Control Plane Policing Control Plane Policing helps regulate the flow of control packets to a local processor.
Receive ACL Rate Limiting IP Receive access list (RACL) provides hardware-based filtering capability for Layer 3 IPv4 or IPv6 traffic that is destined to the CPU.
Egress ACL Rate Limiting The device supports egress port and ACL rate limiting. With egress ACL rate limiting, you can control the egress rate limit on a Layer 2 VLAN, a bridge domain, or an ACL.
TTL 0/1 Rate Limiting IPv4 and IPv6 frames with a TTL of 0 or 1 are primarily data frames. These frames are rate limited so that they do not congest the queues and prevent other control protocol frames from reaching the CPU.
Subnet Trap Rate Limiting When the destination IP address of an ingress Layer 3-routed frame is not present in the forwarding routing table, the frame is trapped to the CPU (subnet trap frame) to generate an ICMP message. An ICMP destination host unreachable message is returned to the sender, informing the source host that the destination address is unreachable. If not rate-limited, the subnet trap frames can prevent other important control frames from reaching the CPU.