Configure Policy-based Routing
|
|
|
- Shanna Marshall
- 9 years ago
- Views:
Transcription
1 How To Note How To Configure Policy-based Routing Introduction Policy-based routing provides a means to route particular packets to their destination via a specific next-hop. Using policy-based routing you can control which packets follow which path through the net work. The specific path that these packets will take can be based on configurable parameters such as priority, address, protocol, or VLAN membership. The Allied Telesis SwitchBlade x908, x900, x600 and x610 series switches all support policy-based routing at wire speed, using hardware-based policy routing facilities. These switch models provide flexible options for configuring policy-based routing, and can support multiple different policy routes, with different nexthops, simultaneously. Possible benefits include both QoS and cost savings: QoS by using dedicated links for certain types of traffic. cost savings by splitting traffic between low-bandwidth, lowcost permanent paths and high-bandwidth, high-cost switched paths. A data network is a significant investment. It is a tool that can add significant value to a business. In order to reap the maximum benefit from this investment, you need to have as much control as possible over the traffic that is flowing in the network. Often straight-out destination-based IP routing does not provide the level of traffic-direction control that a network manager really needs. Policy-based routing provides a much finer-grained level of control over where packets are routed to. List of terms: Ping Poll Ping polling is used to ensure that a device is still present, live, and contactable in the network by periodically sending a packet to an IP address and waiting for a response. Configurable actions can be performed if responses are no longer arriving. DSCP value The Differentiated Services Code Point within the TOS field of an IP packet header. This is a 6- bit number in the range The premark-dscp map allows you to assign packets to egress queues based on the DSCP value in the incoming packet. Next-hop IP routing involves forwarding packets from one router to the next, until they reach their destination. Routers do not need to know the full path to a packet s destination, they just need to know the next router to forward the packet on to. This next router is referred to as the Next-hop of an IP route. C REV B x alliedtelesis.com
2 Configuring Policy-based Routing What information will you find in this document? This How To Note begins with the following information: "Introduction" on page 1 "Which products and software version does it apply to?" on page 2 Then it describes how to configure policy-based routing using three examples: "Example 1- managing VoIP" on page 3 "Example 2 - reducing data transmission costs" on page 5 "Example 3 - routing TCP traffic" on page 9 Which products and software version does it apply to? This How To Note applies to the following Allied Telesis managed Layer 3 switches: x900, x600, and x610 series switches SwitchBlade x908 switches This configuration applies to switches running Software Version or later. Configuring Policy-based Routing Policy-based routing adds flexibility and makes it possible to route traffic among multiple paths based on the traffic characteristics. From a configuration point of view, Policy-based routing is presented as an action in a QoS policy. It can be combined with other QoS actions performed in the same policy. Other QoS actions applied to the traffic will be carried out before the traffic is sent to its nexthop. The selection of packets to be policy routed is carried out by the standard class-map packet matching rules. If the switch doesn t have the configured next-hop in its ARP table, it will send an ARP request for it. If it does not receive a reply, the switch will send an ICMP destination unreachable message to the originating host. The switch does not use the configured default route if the policy-based routing next-hop is unavailable. The following three examples will provide you with a good understanding of how policybased routing can be implemented. Each example has step-by-step instructions and some suggested configuration commands. Configure Policy-based Routing Page 2
3 Example 1- managing VoIP Example 1- managing VoIP VoIP is being used to provide voice communications within an organisation. To ensure high voice quality, dedicated data circuits are leased between remote sites, and a central site. All VoIP data is routed via these dedicated circuits from the remote sites to a central site. The VoIP is then distributed from the central site to its eventual destinations. By using this huband-spoke arrangement of low-bandwidth circuits for transporting VoIP, the organisation is provided with good-quality voice communications in a cost-effective manner. All other data communication between the sites is transported over the Internet. The VoIP traffic is marked with a DSCP value of 46. Policy routing is used to ensure that the VoIP packets are sent via the dedicated circuit, whilst all other data is sent over the Internet. The VoIP traffic is also put into the highest queue on the egress port, to ensure minimum packet loss and delay. Central Site Internet VLAN /16 Dedicated Circuit VLAN /24 Data Voice port1.0.2 port1.0.3 VLAN /24 VLAN /16 port1.0.1 Data and Voice VLAN /8 Remote Site Configure Policy-based Routing Page 3
4 Example 1- managing VoIP Configuring the x900 at the remote site 1. Create the VLANs and assign IP addresses to them awplus(config)# vlan database awplus(config-vlan)# vlan 2-3 state enable #VLAN1 connects to the local LAN awplus(config)# interface vlan1 awplus(config-if)# ip address /8 #VLAN2 connects to the Internet awplus(config)# interface vlan2 awplus(config-if)# ip address /30 #VLAN3 is directed towards the dedicated circuit awplus(config)# interface vlan3 awplus(config-if)# ip address /30 2. Assign the VLANs to the ports (port is already in VLAN 1 by default) awplus(config)# interface port1.0.1 mode access awplus(config)# interface port1.0.2 mode access access vlan2 awplus(config)#interface port1.0.3 mode access access vlan3 3. Configure the default route. This is the route to the Internet awplus(config)# ip route / Enable QoS globally awplus(config)# mls qos enable Configure Policy-based Routing Page 4
5 Example 2 - reducing data transmission costs 5. Create the class-map which will match on traffic with a DSCP value of 46 awplus(config)# class-map test awplus(config-cmap)# match dscp Create the policy-map which will specify the actions to be taken on the classified traffic. The first action instructs the switch to send this packet to queue 7 on the egress port. The second action sets the next-hop for this traffic to , so that it will be directed towards the dedicated circuit. awplus(config)# policy-map pbr awplus(config-pmap)# class test awplus(config-pmap-c)# set queue 7 awplus(config-pmap-c)# set ip next-hop Finally, the policy-map must be attached to the ingress port awplus(config)# interface port1.0.1 awplus(config-if)# service-policy input pbr Example 2 - reducing data transmission costs In this scenario (using the same diagram as in example 1 above) we have a faster Internet connection on port1.0.2, which costs the company more to use. The ISP providing this faster connection charges on the basis of the amount of data sent over the connection. The company has decided that traffic from their Web server will be sent to the Internet via this connection on Monday to Friday during business hours only (9.00am to 5.30 pm). This provides good web service during business hours, whilst keeping some limit on the total amount of data sent over the faster (more expensive) connection. Outside these times, traffic from the web server is sent via the default route. Any other traffic is always sent via the default route. Additionally a ping poll can be configured that will regularly check that the Policy Route nexthop is reachable. If the ping poll fails to get a response from the next-hop, a trigger will be run which removes the policy from the ingress port. This will ensure that if the Policy Route next-hop fails, the configured default route will be used, ensuring no loss of connectivity. Once the next-hop is reachable again, another trigger adds the policy back onto the ingress port. Configure Policy-based Routing Page 5
6 Example 2 - reducing data transmission costs Configuration steps 1. Create the VLANs and assign IP addresses to them awplus(config)# vlan database awplus(config-vlan)# vlan 2-3 state enable awplus(config)# interface vlan1 awplus(config-if)# ip address /8 awplus(config)# interface vlan2 awplus(config-if)# ip address /30 awplus(config)# interface vlan3 awplus(config-if)# ip address /30 2. Assign the VLANs to the ports (port is already in VLAN1 by default) awplus(config)# interface port1.0.1 mode access awplus(config)# interface port1.0.2 mode access access vlan 2 awplus(config)# interface port1.0.3 mode access access vlan 3 3. Configure the default route awplus(config)# ip route / Enable QoS globally awplus(config)# mls qos enable Configure Policy-based Routing Page 6
7 Example 2 - reducing data transmission costs 5. Create the access-list which classifies on traffic from the Web server awplus(config)# access-list 3001 permit tcp <web-server-ip address> eq 80 any 6. Apply this access-list to a class-map awplus(config)# class-map web-server awplus(config-cmap)# match access-group Apply this class-map to a Policy-map and configure the policy to send the traffic matching class web-server to a specific next-hop awplus(config)# policy-map pbr awplus(config-pmap)# class web-server awplus(config-pmap-c)# set ip next-hop Create the script which will add the policy to the ingress port when trigger 1 is run Edit policy-on.scp enable conf t int port1.0.1 service-policy input pbr 9. Create the script which will remove the policy from the ingress port when trigger 2 is run Edit policy-off.scp enable conf t int port1.0.1 no service-policy input pbr 10. Configure the trigger which will add the policy to the ingress port at the required day/time awplus(config)# trigger 1 awplus(config-trigger)# type time 09:00 awplus(config-trigger)# day monday tuesday wednesday thursday friday awplus(config-trigger)# script 1 policy-on.scp Configure Policy-based Routing Page 7
8 Example 2 - reducing data transmission costs 11. Configure the trigger which will remove the policy from the ingress port at the required day/time awplus(config)# trigger 2 awplus(config-trigger)# type time 17:30 awplus(config-trigger)# day monday tuesday wednesday thursday friday awplus(config-trigger)# script 1 policy-off.scp 12. Configure the ping poll which will regularly check that the next-hop is reachable awplus(config)# ping-poll 1 awplus(config-ping-poll)# description check policy route next hop awplus(config-ping-poll)# ip awplus(config-ping-poll)# source-ip awplus(config-ping-poll)# active 13. Configure the trigger which will be activated when the ping poll fails awplus(config)# trigger 3 awplus(config-trigger)# type ping-poll 1 down awplus(config-trigger)# script 1 policy-off.scp awplus(config-trigger)# active awplus(config-trigger)# time after 09:00:00 before 17:30:00 awplus(config-trigger)# day monday tuesday wednesday thursday friday 14. Configure the trigger which will be activated when the next-hop is reachable awplus(config)# trigger 4 awplus(config-trigger)# type ping-poll 1 up awplus(config-trigger)# script 1 policy-on.scp awplus(config-trigger)# active awplus(config-trigger)# time after 09:00:00 before 17:30:00 awplus(config-trigger)# day monday tuesday wednesday thursday friday Configure Policy-based Routing Page 8
9 Example 3 - routing TCP traffic Example 3 - routing TCP traffic PC-A VLAN /30 VLAN / /8 TCP Traffic port1.0.1 Service-policy input PBR port1.0.5 PC-B /8 When using policy-based routing, traffic that's destined for the switch itself can be unexpectedly routed to the PBR next-hop. This includes TCP traffic such as telnet. In the example below, all TCP traffic is to be Policy Routed. However, this will also affect Telnet to the switch itself. To avoid this, the following configuration can be used: 1. Create two IP interfaces - VLAN1 and VLAN2 awplus(config)# interface vlan1 awplus(config-if)# ip address /8 awplus(config)# interface vlan2 awplus(config-if)# ip address /30 We do not want traffic destined to the addresses of either of these interfaces to be Policy Routed. 2. Create ACLs for any TCP traffic destined for these networks, as well as the PBR ACL awplus(config)# mls qos enable awplus(config)# access-list 3001 permit tcp any /8 awplus(config)# access-list 3002 permit tcp any /32 awplus(config)# access-list 3003 permit tcp any any Configure Policy-based Routing Page 9
10 Example 3 - routing TCP traffic Note: In the diagram above, any traffic matching the Policy-Based Routing access-list 3003, which classifies on TCP traffic ingressing port1.0.1, will be sent to the next-hop address of on VLAN2. Even L2 traffic in the same VLAN through the switch will be sent to the PBR next-hop if it matches the PBR access-list. This would mean that any TCP traffic from PC-A destined for another device connected to the switch in the same VLAN (e.g. PC-B) would not be forwarded to its destination but sent to the next-hop of So, we configure ACL 3001 to match on any TCP traffic destined for the entire subnet in use on VLAN1, not just the IP address of the switch itself. Allied Telesis recommends that the PBR policy always includes a class to allow traffic. This class must precede the Policy Routing class. 3. Apply these access-lists to class-maps awplus(config)# class-map local1 awplus(config-cmap)# match access-group 3001 awplus(config)# class-map local2 awplus(config-cmap)# match access-group 3002 awplus(config)# class-map tcp awplus(config-cmap)# match access-group Apply the class-maps to a Policy-map and configure the policy to send the matching TCP traffic to a specific next-hop The effect of the policy map is that: Any traffic matching classes local1 or local2 (i.e. ACLs 3001 or 3002) will simply pass through to the normal forwarding process. Any traffic matching class tcp will be policy routed. awplus(config)# policy-map pbr awplus(config-pmap)# class local1 awplus(config-pmap)# class local2 awplus(config-pmap)# class tcp awplus(config-pmap-c)# set ip next-hop Configure Policy-based Routing Page 10
11 5. Finally, the policy-map must be attached to the ingress port awplus(config)# interface port1.0.1 mode access awplus(config-if)# service-policy input pbr Note: Further reading - more detail of the configuration of policy-based routing can be seen in the QoS chapter of the x900, x600, and x610 series software reference manuals. Americas Headquarters North Creek Parkway Suite 100 Bothell WA USA T: F: Asia-Pacifi c Headquarters 11 Tai Seng Link Singapore T: F: EMEA Headquarters Via Motta Chiasso Switzerland T: F: alliedtelesis.com 2012 Allied Telesis, Inc. All rights reserved. Information in this document is subject to change without notice. All company names, logos, and product designs that are trademarks or registered trademarks are the property of their respective owners. C REV B
AlliedWare Plus OS How To. Configure QoS to prioritize SSH, Multicast, and VoIP Traffic. Introduction
AlliedWare Plus OS How To Configure QoS to prioritize SSH, Multicast, and VoIP Traffic Introduction This How To Note explains how to create a QoS policy that prioritizes SSH, multicast, and VoIP traffic
Configure QoS on x900-24, x900-12, and SwitchBlade x908 Series Switches
AlliedWare Plus TM OS How To Configure QoS on x900-24, x900-12, and SwitchBlade x908 Series Switches Introduction This document describes some generic configuration examples for Quality of Service (QoS)
configure WAN load balancing
How To configure WAN load balancing Introduction With the increasing use of the Internet to service core business functions comes the need for reliable WAN connectivity. A specific aspect of this requirement
Configure WAN Load Balancing
AlliedWare TM OS How To Configure WAN Load Balancing Introduction With the increasing use of the Internet to service core business functions comes the need for reliable WAN connectivity. A specific aspect
Apply Firewall Policies And Rules
How To Apply Firewall Policies And Rules Introduction This How To Note describes some of the more subtle aspects of dealing with firewall policies and how to apply rules to various traffic flows when using
This How To Note describes one possible basic VRRP configuration.
AlliedWare TM OS How To Configure VRRP (Virtual Router Redundancy Protocol) Introduction VRRP is a popular protocol for providing device redundancy, for connecting redundant WAN gateway routers or server
Routing. Static Routing. Fairness. Adaptive Routing. Shortest Path First. Flooding, Flow routing. Distance Vector
CSPP 57130 Routing Static Routing Fairness Adaptive Routing Shortest Path First Flooding, Flow routing Distance Vector RIP Distance Vector Sometimes called Bellman-FOrd Original Arpanet, DECNet, Novell,
WiNG 5.X How To. Policy Based Routing Cache Redirection. Part No. TME-05-2012-01 Rev. A
WiNG 5.X How To Policy Based Routing Cache Redirection Part No. TME-05-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark
AlliedWare Plus OS How To Use Web-authentication
AlliedWare Plus OS How To Use Web-authentication Introduction Web-authentication, (also known as Captive Portal), is a simple way to provide secure guestuser access to a network. It is used in a wide range
AlliedWare Plus TM OS How To. Configure QoS to Conform to Standard Marking Schemes. Introduction. Contents
AlliedWare Plus TM OS How To Configure QoS to Conform to Standard Marking Schemes Introduction This How To Note describes how to deploy a QoS solution across an entire network. It explains how to define
How To Configure Some Basic OSPF Routing Scenarios. Introduction. Technical Guide. List of terms
Technical Guide How To Configure Some Basic OSPF Routing Scenarios Introduction OSPF is an Open Standards link-state routing protocol used to exchange routing information between devices dynamically. This
AlliedWare Plus OS How To Use sflow in a Network
AlliedWare Plus OS How To Use sflow in a Network Introduction sflow is an industry-standard sampling system that is embedded in Allied Telesis' high-performing Layer 3 switches. sflow enables you to use
Case Study Ministry of Agriculture, France
Case Study Ministry of Agriculture, France The Ministry of Agriculture and Fishing in France selects Allied Telesis for their new network solution in the central Paris offices, providing the strong network
x900 Switch Access Requestor
Network Security Solutions Implementing Network Access Control (NAC) Tested Solution: Protecting your network with Microsoft Network Access Protection (NAP) and Switches Today s networks increasingly require
In fact, the three most common reasons for a network slow down are: congestion data corruption collisions
How To Troubleshoot Slow Network Performance Introduction This How To Note describes techniques for troubleshooting slow network performance. When troubleshooting a network slow down problem, it is very
Lab 8: Confi guring QoS
Lab 8: Objective Implement QoS, mark traffi c, and display and interpret QoS output. Lab Topology For this lab, your network design will include two pods of devices. You will be responsible for confi guring
Lab 8.1.10.2 Introduction to the Modular QoS Command-Line Interface
Lab 8.1.10.2 Introduction to the Modular QoS Command-Line Interface Objective Configuring Quality of Service (QoS) involves classifying, marking, and policing traffic flows. It is often necessary to apply
Configuring QoS in a Wireless Environment
12 CHAPTER This chapter describes how to configure quality of service (QoS) on your Cisco wireless mobile interface card (WMIC). With this feature, you can provide preferential treatment to certain traffic
AlliedWare TM OS How To. Use DHCP Snooping and ARP Security to Block ARP Poisoning Attacks. Introduction. Related How To Notes
AlliedWare TM OS How To Use DHCP Snooping and ARP Security to Block ARP Poisoning Attacks Introduction When you use DHCP servers to allocate IP addresses to clients on a LAN, you can also configure DHCP
Quality of Service (QoS) for Enterprise Networks. Learn How to Configure QoS on Cisco Routers. Share:
Quality of Service (QoS) for Enterprise Networks Learn How to Configure QoS on Cisco Routers Share: Quality of Service (QoS) Overview Networks today are required to deliver secure, measurable and guaranteed
The network configuration for these examples is shown in the following figure. Load Balancer 1. public address 172.214.1.3
How To Configure Load Balancer Redundancy on Allied Telesis Routers and Switches Introduction In many Server Hosting environments, two requirements are important: maximising throughput availability to
Troubleshooting the Firewall Services Module
CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
- QoS and Queuing - Queuing Overview
1 Queuing Overview - QoS and Queuing - A queue is used to store traffic until it can be processed or serialized. Both switch and router interfaces have ingress (inbound) queues and egress (outbound) queues.
Configuring Network Address Translation
CHAPTER5 Configuring Network Address Translation The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. This chapter contains the following major sections
Configuring an efficient QoS Map
Configuring an efficient QoS Map This document assumes the reader has experience configuring quality of service (QoS) maps and working with traffic prioritization. Before reading this document, it is advisable
- QoS Classification and Marking -
1 - QoS Classification and Marking - Classifying and Marking Traffic Conceptually, DiffServ QoS involves three steps: Traffic must be identified and then classified into groups. Traffic must be marked
VCStack - Powerful Simplicity. Network Virtualization for Today's Business
Network Virtualization for Today's Business Introduction Today's enterprises rely on Information Technology resources and applications, for accessing business-critical information and for day-to-day work.
Configuring QoS in a Wireless Environment
Configuring QoS in a Wireless Environment This chapter describes how to configure quality of service (QoS) on your Cisco wireless interface. With this feature, you can provide preferential treatment to
Configuring Flexible NetFlow
CHAPTER 62 Note Flexible NetFlow is only supported on Supervisor Engine 7-E, Supervisor Engine 7L-E, and Catalyst 4500X. Flow is defined as a unique set of key fields attributes, which might include fields
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Configuring Denial of Service Protection
24 CHAPTER This chapter contains information on how to protect your system against Denial of Service (DoS) attacks. The information covered in this chapter is unique to the Catalyst 6500 series switches,
Firewall Stateful Inspection of ICMP
The feature categorizes Internet Control Management Protocol Version 4 (ICMPv4) messages as either malicious or benign. The firewall uses stateful inspection to trust benign ICMPv4 messages that are generated
Firewall Technologies. Access Lists Firewalls
Firewall Technologies Access Lists Firewalls ACLs Standard Extended Numbered Named Stateful Tables to track real-time state of end-end sessions Session oriented nature of network traffic TCP established
Configure the Firewall VoIP Support Service (SIP ALG)
AlliedWare TM OS How To Configure the Firewall VoIP Support Service (SIP ALG) Introduction SIP (Session Initiation Protocol) is an increasingly popular protocol for managing VoIP call setup. The structure
DMT: A new Approach of DiffServ QoS Methodology
DMT: A new Approach of DiffServ QoS Methodology Rashid Hassani, Amirreza Fazely Department of Computer Science University of Rostock Rostock, Germany [email protected] [email protected]
Cisco - Catalyst 2950 Series Switches Quality of Service (QoS) FAQ
Page 1 of 8 Catalyst 2950 Series Switches Quality of Service (QoS) FAQ Document ID: 46523 TAC Notice: What's C han g i n g o n T A C We b H el p u s h el p y ou. Questions Introduction What is the software
Certes Networks Layer 4 Encryption. Network Services Impact Test Results
Certes Networks Layer 4 Encryption Network Services Impact Test Results Executive Summary One of the largest service providers in the United States tested Certes Networks Layer 4 payload encryption over
Allow Public and Private Address Access to Servers at a Service Provider Client Site. What information will you find in this document?
How To Allow Public and Private Address Access to Servers at a Service Provider Client Site Introduction This document contains configuration examples and guidelines for a situation that uses firewall
Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.
Solutions Guide Secure Remote Access Allied Telesis provides comprehensive solutions for secure remote access. Introduction The world is generating electronic data at an astonishing rate, and that data
Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
Configuring IP Load Sharing in AOS Quick Configuration Guide
Configuring IP Load Sharing in AOS Quick Configuration Guide ADTRAN Operating System (AOS) includes IP Load Sharing for balancing outbound IP traffic across multiple interfaces. This feature can be used
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
Solutions Guide. Ethernet-based Network Virtualization for the Enterprise
Solutions Guide Ethernet-based Network Virtualization for the Enterprise Introduction The concept of Tunnelling Layer 2 and Layer 3 connections across a shared Layer 2 network used to be the preserve of
Configuring NetFlow Secure Event Logging (NSEL)
75 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter
IP videoconferencing solution with ProCurve switches and Tandberg terminals
An HP ProCurve Networking Application Note IP videoconferencing solution with ProCurve switches and Tandberg terminals Contents 1. Introduction... 3 2. Architecture... 3 3. Videoconferencing traffic and
Troubleshooting the Firewall Services Module
25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
Network Security. Ensuring Information Availability. Security
Ensuring Information Availability Security - Ensuring Information Availability Introduction The advent of the Internet and the huge array of connected devices has led to an insatiable demand for access
Configuring Server Load Balancing
CHAPTER 6 This chapter describes how to configure server load balancing (SLB) on the Cisco Application Control Engine (ACE) module. This chapter contains the following sections: Information About Server
Cisco ASA and NetFlow Using ASA NetFlow with LiveAction Flow Software
LiveAction Application Note Cisco ASA and NetFlow Using ASA NetFlow with LiveAction Flow Software January 2013 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. ASA NetFlow Security
Enabling Remote Access to the ACE
CHAPTER 2 This chapter describes how to configure remote access to the Cisco Application Control Engine (ACE) module by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols.
Application Note. Configuring WAN Quality of Service for ShoreTel. Quality of Service Overview. Quality of Service Mechanisms. WAN QoS for ShoreTel 5
Application Note ST-0130 April 28, 2006 Configuring WAN Quality of Service for ShoreTel This application note discusses configuration techniques and settings that can be used to achieve highquality voice
Configuring Control Plane Policing
CHAPTER 53 This chapter describes how to configure control plane policing (CoPP) with Cisco IOS Release 12.2SX. Note For complete syntax and usage information for the commands used in this chapter, see
SolarWinds Technical Reference
SolarWinds Technical Reference Configuring Devices for Flow Collection Introduction... 3 Cisco... 3 Cisco Catalyst 3560/3750... 4 Cisco Catalyst 4500... 7 Cisco Catalyst 6500... 9 Cisco Nexus 7000/7010...
Product VioCall Express Connect. VioCall Express Connect VoIP Solution for SMB/SME Market
Product VioCall Express Connect VioCall Express Connect VoIP Solution for SMB/SME Market Products VioCall Express Connect VioCall Express Connect VoIP Solution for SMB/SME Market Allied Telesyn s new Voice
Configuring QoS and Per Port Per VLAN QoS
27 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on a Catalyst 45 series switch. It also describes
Case Study Goldsmiths. Chip and PIN technology jewel in the crown for Goldsmiths thanks to Allied Telesis and NewLife Data Communications
Case Study Goldsmiths Chip and PIN technology jewel in the crown for Goldsmiths thanks to Allied Telesis and NewLife Data Communications Case Study Goldsmiths Retailer of fine jewellery saves 25,000 whilst
Improving Quality of Service
Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic
Configuring MPLS QoS
CHAPTER 45 This chapter describes how to configure Multiprotocol Label Switching (MPLS) quality of service (QoS) in Cisco IOS Release 12.2SX. For complete syntax and usage information for the commands
Cisco Quality of Service and DDOS
Cisco Quality of Service and DDOS Engineering Issues for Adaptive Defense Network MITRE 7/25/2001 Contents 1. INTRODUCTION...1 2. TESTBED SETUP...1 3. QUALITY OF SERVICE (QOS) TESTS...3 3.1. FIRST IN,
Introducing Basic MPLS Concepts
Module 1-1 Introducing Basic MPLS Concepts 2004 Cisco Systems, Inc. All rights reserved. 1-1 Drawbacks of Traditional IP Routing Routing protocols are used to distribute Layer 3 routing information. Forwarding
Configuring Auto-QoS
Finding Feature Information, page 1 Prerequisites for Auto-QoS, page 1 Restrictions for Auto-QoS, page 2 Information About, page 3 How to Configure Auto-QoS, page 5 Monitoring Auto-QoS, page 9 Configuration
SolarWinds Technical Reference
SolarWinds Technical Reference Configuring Devices for Flow Collection Introduction... 3 Cisco... 3 Cisco Catalyst 3560/3750... 4 Cisco Catalyst 4500... 7 Cisco Catalyst 6500... 9 Cisco Nexus 7000/7010...
Network Security Solutions Implementing Network Access Control (NAC)
Network Security Solutions Implementing Network Access Control (NAC) Tested Solution: Protecting a network with Sophos NAC Advanced and Switches Sophos NAC Advanced is a sophisticated Network Access Control
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Allied Telesis provide virtual customer networks
Solutions Network Virtualization Allied Telesis provide virtual customer networks over shared Ethernet infrastructure Solutions Network Virtualization Today s building management companies can derive revenue
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
Voice Over IP. MultiFlow 5048. IP Phone # 3071 Subnet # 10.100.24.0 Subnet Mask 255.255.255.0 IP address 10.100.24.171. Telephone.
Anritsu Network Solutions Voice Over IP Application Note MultiFlow 5048 CALL Manager Serv # 10.100.27 255.255.2 IP address 10.100.27.4 OC-48 Link 255 255 25 IP add Introduction Voice communications over
IP Addressing A Simplified Tutorial
Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to
Call Flows for Simple IP Users
This chapter provides various call flows for simple IP users. Finding Feature Information, page 1 Simple IP Unclassified MAC Authentication (MAC TAL and Web Login) Call Flows, page 1 Finding Feature Information
Quality of Service (QoS) on Netgear switches
Quality of Service (QoS) on Netgear switches Section 1 Principles and Practice of QoS on IP networks Introduction to QoS Why? In a typical modern IT environment, a wide variety of devices are connected
How To Block On A Network With A Group Control On A Router On A Linux Box On A Pc Or Ip Access Group On A Pnet 2 On A 2G Router On An Ip Access-Group On A Ip Ip-Control On A Net
Using Access-groups to Block/Allow Traffic in AOS When setting up an AOS unit, it is important to control which traffic is allowed in and out. In many cases, the built-in AOS firewall is the most efficient
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
Policy Based Forwarding
Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus
NQA Technology White Paper
NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics
IP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for HP ProCurve Networking Switches connected to an Avaya Telephony Infrastructure in a Multi-Site VoIP and Data Network solution using Avaya
How To Configure some basic firewall and VPN scenarios
How To Configure some basic firewall and VPN scenarios Introduction This document provides examples that illustrate common configurations for security routers. You may want to make changes or enhancements
IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
Chapter 13 Internet Protocol (IP)
Chapter 13 Internet Protocol (IP) Introduction... 13-5 IP Packets... 13-5 Addressing... 13-7 Subnets... 13-8 Assigning an IP Address... 13-9 Multihoming... 13-11 Local Interfaces... 13-11 Address Resolution
QoS (Quality of Service)
QoS (Quality of Service) QoS function helps you to control your network traffic for each application from LAN (Ethernet and/or Wireless) to WAN (Internet). It facilitates you to control the different quality
ASA/PIX: Load balancing between two ISP - options
ASA/PIX: Load balancing between two ISP - options Is it possible to load balance between two ISP links? on page 1 Does the ASA support PBR (Policy Based Routing)? on page 1 What other options do we have?
IOS Zone Based Firewall Step-by-Step Basic Configuration
IOS Zone Based Firewall Step-by-Step Basic Configuration Introduction The Cisco IOS Zone Based Firewall is one of the most advanced form of Stateful firewall used in the Cisco IOS devices. The zone based
Configuring NetFlow Secure Event Logging (NSEL)
73 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter
Traffic Mirroring Commands on the Cisco IOS XR Software
Traffic Mirroring Commands on the Cisco IOS XR Software This module describes the commands used to configure and monitor traffic mirroring. acl, page 2 clear monitor-session counters, page 4 destination
Configuring Network Address Translation (NAT)
8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Chapter 5 Configuring QoS
Chapter 5 Configuring QoS Configuring the Basic and Advanced QoS Settings The navigation pane at the top of the web browser interface contains a QoS tab that enables you to manage your FS700TS Smart Switch
Software Defined Networking (SDN) - Open Flow
Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,
AutoQoS for Medianet
Appendix A AutoQoS for Medianet As of August 2010, an updated version of AutoQoS was released for the Catalyst 2960- G/S, 3560-G/E/X, and 3750-G/E/X family of switches (with IOS Release 12.2(55)SE). This
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network
How To Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network Introduction This document describes how to create a secure LAN, using two servers and an 802.1xcompatible
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
How To. Configure E1 links. Introduction. What information will you find in this document?
How To Configure E1 links Introduction E1 is the European digital transmission format standard, traditionally used for inter-pbx traffic, where a large number of calls warrant a leased line between two
What information will you find in this document?
AlliedWare TM OS How To Configure Some Basic Firewall and VPN Scenarios Introduction This document provides examples that illustrate common configurations for security routers. You may want to make changes
Three Key Design Considerations of IP Video Surveillance Systems
Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All
Configuring Quality of Service
CHAPTER 37 QoS functionality on Supervisor Engine 6-E, Supervisor Engine 6L-E, Catalyst 49M, and Catalyst 4948E are equivalent. This chapter describes how to configure quality of service (QoS) by using
