Example 2: Trusted Applications and DSCP
Example 2: Trusted Applications and DSCP
This example shows how to avoid overwriting the DSCP field of traffic from an originating application that sets a DSCP value. Use this type of configuration for trusted applications that include their own DSCP setting.
####
#Sample file for protecting DSCP on trusted applications
filter dscp_set { # recognize traffic that already has dscp set dscplo 1
dscphi 63 priority 1
}
filter no_dscp_set { # recognize traffic that does not have dscp set dscplo 0
dscphi 0 priority 2
}
policy allowthru { # don’t change anything about the dscp field uses dscp_set
}
policy setdscp { # set the dscp field for traffic with no previous dscp setting uses no_dscp_set
dscp 10
}
adapter lan0 {
uses allowthru, setdscp
}
#
#
####
This example illustrates how to avoid overwriting DSCP fields for application traffic that controls its own DSCP fields. Additionally, you can create several classes of traffic, then use different policies to set the DSCP field for each traffic class to an appropriate value for each class.
Appendix B | 121 |