• Aucun résultat trouvé

Building Cisco Multilayer Building Cisco Multilayer Switched Networks (BCMSN) Switched Networks (BCMSN) Layer 2 Quality of Service (QoS)

N/A
N/A
Protected

Academic year: 2022

Partager "Building Cisco Multilayer Building Cisco Multilayer Switched Networks (BCMSN) Switched Networks (BCMSN) Layer 2 Quality of Service (QoS)"

Copied!
5
0
0

Texte intégral

(1)

http://www.INE.com

Building Cisco Multilayer Building Cisco Multilayer Switched Networks (BCMSN) Switched Networks (BCMSN)

Layer 2

Quality of Service (QoS)

DiffServ

DiffServ QoS ReviewQoS Review

• Goal is for network to enforce QoS policy based on traffic classes

– E.g. “differentiate” voice vs. data

• Model only works if markings are correct

– E.g. if network sees voice and data as the same class, voice isn’t preferred

• True end-to-end QoS design must enforce proper marking and classification policy down to the layer 2 access level

(2)

Copyright

Copyright ©© 2009 Internetwork Expert, Inc 2009 Internetwork Expert, Inc www.INE.com

www.INE.com

DiffServ

DiffServ ClassificationClassification

• For IP over Ethernet, DiffServ

classification occur in one of three ways…

• Layer 2

– Ethernet CoS

• Layer 3

– IP Precedence & DSCP

• Layer 4+

– TCP/UDP ports – NBAR

Copyright

Copyright ©© 2009 Internetwork Expert, Inc 2009 Internetwork Expert, Inc www.INE.com

www.INE.com

Trust Boundaries Trust Boundaries

• Catalyst switches enforce marking and

classification policy based on “trust” boundaries – Trusted ports maintain markings received

– Untrusted ports remark/rewrite/overwrite markings received

• Trust boundary typically occurs on…

– Switch to host facing ports – Switch to IP phone facing ports – Switch to switch facing ports

• Goal of the trust boundary is to ensure correct inbound marking, which in turn allows correct outbound classification

(3)

Copyright

Copyright ©© 2009 Internetwork Expert, Inc 2009 Internetwork Expert, Inc www.INE.com

www.INE.com

Trust Boundary Examples Trust Boundary Examples

Configuring Trust Boundaries Configuring Trust Boundaries

• Trust state is configured per-port with the mls qos trust command

• Trust can be defined based on…

– CoS

– IP Precedence – DSCP

– CDP (cisco-phone)

• For ports connected to IP phones, separate

“extension” trust can be defined with

switchport priority extend [cos | trust]

(4)

Copyright

Copyright ©© 2009 Internetwork Expert, Inc 2009 Internetwork Expert, Inc www.INE.com

www.INE.com

Voice VLANs Voice VLANs

• A single physical link can connect to a phone and PC at the same time

• Voice & data traffic must have some way of being differentiated

• 802.1Q trunk encapsulation typically used for this separation

• Also allows encoding of CoS value

– Regular Ethernet header has no CoS field

Copyright

Copyright ©© 2009 Internetwork Expert, Inc 2009 Internetwork Expert, Inc www.INE.com

www.INE.com

Voice VLAN Variations Voice VLAN Variations

SW1#

interface FastEthernet0/1 switchport access vlan 20 switchport voice vlan 10

!

interface FastEthernet0/2 switchport access vlan 20 switchport voice vlan dot1p

!

interface FastEthernet0/3 switchport access vlan 20 switchport voice vlan untagged

!

interface FastEthernet0/4 switchport access vlan 20 switchport voice vlan none

(5)

Copyright

Copyright ©© 2009 Internetwork Expert, Inc 2009 Internetwork Expert, Inc www.INE.com

www.INE.com

Layer 2

Layer 2 AutoQoSAutoQoS

• Layer 2 AutoQoS simplifies QoS implementation for VoIP

• Effectively a macro that defines…

– Trust boundaries – Marking policy – Classification policy – Queueing policy

• Configured as port-level auto qos voip [cisco-phone| cisco-softphone | trust]

Références

Documents relatifs

• Some DHCP implementation don’t use client source MAC address but instead use “Client Hardware Address” inside DHCP request payload. • Attacker can keep source MAC

– Upstream switch sends TCAck in Configuration BPDU back – Upstream switch sends TCN out Root Port. – Next upstream switch sends TCAck in Configuration BPDU back – Next

Administrative private-vlan host-association: none Administrative private-vlan mapping: none Administrative private-vlan trunk native VLAN: none Administrative private-vlan

Copyright © © 2009 Internetwork Expert, Inc 2009 Internetwork Expert, Inc

– Next-hop is the IP address used to peer with the EBGP neighbor they learned it from. •

• Administrative distance used to decide between multiple routes from different

Copyright © © 2009 Internetwork Expert, Inc 2009 Internetwork Expert, Inc

• Build multicast tree based on reverse path away from source – i.e. IGP already assumed to be