Blade ICE G8000 manual Per Hop Behavior, Drop Class Precedence

Page 108

RackSwitch G8000 Application Guide

Per Hop Behavior

The DSCP value determines the Per Hop Behavior (PHB) of each packet. The PHB is the for- warding treatment given to packets at each hop. QoS policies are built by applying a set of rules to packets, based on the DSCP value, as they hop through the network.

The default settings are based on the following standard PHBs, as defined in the IEEE stan- dards:

„Expedited Forwarding (EF)—This PHB has the highest egress priority and lowest drop precedence level. EF traffic is forwarded ahead of all other traffic. EF PHB is described in RFC 2598.

„Assured Forwarding (AF)—This PHB contains four service levels, each with a different drop precedence, as shown below. Routers use drop precedence to determine which packets to discard last when the network becomes congested. AF PHB is described in RFC 2597.

Drop

Class 1

Class 2

Class 3

Class 4

Precedence

 

 

 

 

Low

AF11 (DSCP 10)

AF21 (DSCP 18)

AF31 (DSCP 26)

AF41 (DSCP 34)

Medium

AF12 (DSCP 12)

AF22 (DSCP 20)

AF32 (DSCP 28)

AF42 (DSCP 36)

High

AF13 (DSCP 14)

AF23 (DSCP 22)

AF33 (DSCP 30)

AF43 (DSCP 38)

„Class Selector (CS)—This PHB has eight priority classes, with CS7 representing the high- est priority, and CS0 representing the lowest priority, as shown below. CS PHB is described in RFC 2474.

Priority

Class Selector

DSCP

 

 

 

Highest

CS7

56

 

 

 

 

CS6

48

 

 

 

 

CS5

40

 

 

 

 

CS4

32

 

 

 

 

CS3

24

 

 

 

 

CS2

16

 

 

 

 

CS1

8

 

 

 

Lowest

CS0

0

 

 

 

108 „ Chapter 6: Quality of Service

BMD00041, November 2008

Image 108
Contents Application Guide RackSwitch G8000 Application Guide Contents Ports and Trunking Quality of Service Appendix a Troubleshooting Figures RackSwitch G8000 Application Guide Tables RackSwitch G8000 Application Guide Preface Who Should Use This GuideWhat You’ll Find in This Guide Typographic Conventions Typographic ConventionsHow to Get Help Accessing the Switch Configuring an IP Interface Log on to the switch Enter IP interface modeConfigure the default gateway. Enable the gateway Using Telnet Using the Browser-Based Interface Configuring BBI access via HttpConfiguring BBI access via Https RS G8000 config# access https import-certificate Using Snmp Default configurationSnmp v1 SnmpUser configuration Privacy-password22 „ Accessing the Switch Configuring Snmp Trap Hosts SNMPv2 trap host configurationConfigure an entry in the notify table SNMPv1 trap hostSNMPv3 trap host configuration Securing Access to the Switch Radius Authentication and Authorization How Radius authentication worksConfiguring Radius Configure the Radius secret and enable the featureRadius authentication features in Blade OS Switch User Accounts Radius Attributes for G8000 user privilegesTACACS+ Authentication How TACACS+ authentication worksTACACS+ authentication features in Blade OS AuthorizationCommand authorization and logging AccountingConfiguring TACACS+ Authentication Configure the TACACS+ secret and second secretConfiguring SSH features on the switch Secure ShellSSH encryption of management messages Generating RSA Host and Server Keys for SSH access SSH Integration with RADIUS/TACACS+ AuthenticationEnd User Access Control Considerations for configuring End User AccountsUser Access Control Listing current Users Logging into an End User accountRackSwitch G8000 Application Guide 38 „ Accessing the Switch Port-based Network Access Control Extensible Authentication Protocol over LAN 802.1X authentication process Port UnauthorizedEAPoL message exchange 802.1X port states „ Unauthorized„ Authorized „ Force UnauthorizedSupported Radius attributes Support for Radius AttributesConfiguration guidelines BMD00041, November VLANs Overview VLANs and Port Vlan ID Numbers Vlan numbersViewing VLANs Viewing and Configuring PVIDs Pvid numbersVlan Tagging 1Default Vlan settings 2Port-based Vlan assignment 4802.1Q tag assignment Vlan configuration rules Vlan Topologies and Design ConsiderationsMultiple VLANs with Tagging Adapters Component DescriptionVlan Vlan configuration example Enable tagging on uplink ports that support multiple VLANsConfigure the VLANs and their member ports Private VLANs Private Vlan portsConfiguration example Select a Vlan and define the Private Vlan type as primaryConfigure a secondary Vlan and map it to the primary Vlan Verify the configurationRackSwitch G8000 Application Guide 62 „ VLANs Ports and Trunking Built-In fault tolerance Statistical load distributionBefore you configure static trunks Static trunk group configuration rules66 „ Ports and Trunking Port Trunking Example Follow these steps on the G8000Repeat the process on the other switch Examine the trunking information on each switchConfigurable Trunk Hash Algorithm „ Source IP SIP + Destination IP DIPAdmin key Link Aggregation Control ProtocolRS G8000 # show lacp information Lacp configuration guidelines Configuring LacpSet the Lacp mode Spanning Tree 1Ports, Trunk Groups, and VLANs Bridge Protocol Data Units BPDUs Determining the Path for Forwarding BPDUsSpanning Tree Group configuration guidelines Changing the Spanning Tree modeAssigning a Vlan to a Spanning Tree Group Creating a Vlan Rules for Vlan Tagged portsAdding and removing ports from STGs RackSwitch G8000 Application Guide Rapid Spanning Tree Protocol Port state changesRstp configuration guidelines Port Type and Link TypeEdge Port Link TypeRstp configuration example Configure Rapid Spanning TreeDefault Spanning Tree configuration Per Vlan Rapid Spanning TreeWhy do we need multiple Spanning Trees? 1Two VLANs on one Spanning Tree GroupPvrst configuration guidelines Configuring PvrstSet the Spanning-tree mode to PVRST+ Multiple Spanning Tree Protocol Mstp RegionCommon Internal Spanning Tree Mstp configuration guidelines Passing Vlan Blocking Vlan Configuring Multiple Spanning Tree Groups Configure Multiple Spanning Tree Protocol90 „ Spanning Tree Configuring Fast Uplink Convergence Fast Uplink ConvergenceRackSwitch G8000 Application Guide 92 „ Spanning Tree Quality of Service COS Using ACL Filters MAC Extended ACLsIP Standard ACLs IP Extended ACLs1Well-known protocol types Understanding ACL priority Assigning ACLs to a portUse the following command to view ACL statistics Viewing ACL statisticsACL configuration examples Configure an Access Control ListExample Assign the ACL to port100.10.1.0 Add the ACL to port Add the ACL to a portConfigure IP ACLs to deny all other traffic Configure a MAC ACL to deny all other trafficAssign the ACLs to a port Using Storm Control Filters Configuring storm controlBroadcast storms Using Dscp Values to Provide QoS Differentiated Services ConceptsRackSwitch G8000 Application Guide Per Hop Behavior Drop Class PrecedenceDefault QoS Service Levels QoS LevelsUse the following command to perform DSCP-to-802.1p mapping DSCP-to-802.1p mappingUsing 802.1p Priority to Provide QoS 3Layer 2 802.1q/802.1p Vlan tagged packet802.1p configuration example Configure a port’s default 802.1p priority value toQueuing and Scheduling Remote Monitoring OverviewConfiguring Rmon statistics Enable Rmon on a portConfigure the Rmon statistics on a port Rmon group 1-StatisticsRmon group 2-History History MIB Object IDRmon group 3-Alarms Configuring Rmon HistoryConfigure the Rmon History parameters for a port View Rmon History for the portAlarm MIB objects Configuring Rmon AlarmsConfigure Rmon events Configure the Rmon Alarm parameters to track Icmp messagesConfigure the Rmon event parameters Rmon group 9-EventsBasic IP Routing IP Routing Benefits Routing Between IP Subnets 1The Router Legacy Network122 „ Basic IP Routing 2Switch-Based Routing Topology Example of Subnet RoutingUsing VLANs to segregate Broadcast Domains 1Subnet Routing Example IP Address AssignmentsAdd the switch ports to their respective VLANs 3Subnet Routing Example Optional Vlan PortsConfigure the default gateway to the routers’ addresses Enable IP routingAssign a Vlan to each IP interface Dynamic Host Configuration Protocol RackSwitch G8000 Application Guide 128 „ Basic IP Routing Igmp Igmp Snooping FastLeave IGMPv3 SnoopingIgmp Snooping configuration example Configure Igmp SnoopingEnable IGMPv3 Snooping optional Add VLANs to Igmp SnoopingView dynamic Igmp information RS G8000# show ip igmp groupsConfigure a Static Multicast Router Static Multicast RouterHigh Availability Uplink Failure Detection 1Uplink Failure Detection exampleSpanning Tree Protocol with UFD Configuration guidelines Failure Detection PairConfiguring UFD Monitoring UFDTurn on Uplink Failure Detection UFD Troubleshooting Monitoring Ports Figure A-1Monitoring PortsConfiguring Port Mirroring Enable port mirroringView the current configuration Port Mirroring behaviorBMD00041, November Index NumericsIgmp TACACS+
Related manuals
Manual 28 pages 31.53 Kb