Cisco WS-X6248-RJ-45 - Catalyst 6000 Expansion Module Manual de usuario Pagina 31

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 42
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 30
Cisco Systems, Inc.
All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.
Page 31 of 42
Configuring QoS Policies
TheconfigurationofQoSpoliciesdifferssignificantly between the Cisco IOS Software and CatOS. For CatOS, a QoS
ACL statement is used to configure all match and action parameters for marking and policing. Cisco IOS QoS
supports classification, marking, and policing using the Modular QoS CLI (MQC) syntax.
A Cisco IOS policy uses traffic classes (with the class-map statement) to identify interesting traffic. These traffic
classescanbedefinedfordifferent types of traffic flows—for example, a user could have a different class for IP traffic,
IPX traffic, and MAC traffic. Each traffic class uses IOS based access control lists and/or class match statements to
identify traffic. The policy-map includes the desired action for the matched traffic (mark, police, trust, etc.). The
policy defined by a policy-map is mapped to an interface using the service-policy command.
Examples of both are included below.
Trust with an ACL
As an alternative to setting the trust state for all traffic on a port (as described above), a QoS policy can be created
to trust traffic that matches a specific QoS ACL. This functionality is available in both CatOS and the Cisco IOS
Software. As such, it is a straightforward example of the configuration differences between the CatOS QoS ACL
syntax and the Cisco IOS MQC syntax described above. In this example, the function of using an ACL for trusting
the CoS on all traffic coming into port gigabit into port gigabit 3/1 is compared.
When a CatOS ACL is created, modified, or deleted, the changes exist temporarily in an edit buffer in memory.
CatOS requires that the ACL be committed for it to take effect. Cisco IOS Software does not utilize the edit buffer
concept. Once a policy has been built in IOS, it must then be mapped to either a port or a VLAN for that policy to
take effect. When a policy is mapped to an “up” interface, the ASIC hardware is programmed with the necessary
information and that policy is in effect.
Policers
The policing function is primarily used for rate limiting traffic to a configured speed. If traffic exceeds the configured
speed,thenitcaneither be dropped or marked down to a lower priority. This is usefultoensurecompliancetoservice
level agreements or for security protection. The policer can either be an aggregate or a microflow policer. An
aggregate policer will rate limit all traffic in a class or group of classes to one combined (or aggregate) rate. A
microflow policer will rate limit each flow (a unique SA/DA MAC address, SA/DA IP address, and TCP/UDP port
numbers) in a traffic class to an individual rate. A total of 63 microflows and 1023 aggregates can be configured per
chassis (independent of the operating system).
CatOS Cisco IOS Software
set qos acl ip CatOS trust-cos any
commit qos acl CatOS
set qos acl map CatOS 3/1
access-list 101 permit ip any any
policy-map IOS
class IOS access-group 101
trust cos
interface gigabitethernet 3/1
service-policy input IOS
Vista de pagina 30
1 2 ... 26 27 28 29 30 31 32 33 34 35 36 ... 41 42

Comentarios a estos manuales

Sin comentarios