Chapter 18 Traffic Shaping : Examples
  
Examples
While it is possible to configure QoS using a combination of security policies and in ToS­based priorities, and to distribute traffic over all six of the possible queues for each physical interface, the results of those configurations can be more difficult to analyze due to their complexity. In those cases, prioritization behavior can vary by several factors, including traffic volume, ToS (type of service) or differentiated services markings, and correlation of session to a security policy.
The following simple examples illustrate QoS configurations using either prioritization by security policy, or prioritization by ToS bit, but not both. The examples also assume you are not configuring traffic shaping for interfaces that receive hardware acceleration from network processing units (NPU).
See also 
QoS using priority from security policies
QoS using priority from ToS or differentiated services
Example setup for VoIP