How To Lower Data Rate On A Network On A 2Ghz Network On An Ipnet 2 (Net 2) On A Pnet 2 On A Router On A Gbnet 2.5 (Net 1) On An Uniden Network On



Similar documents
Lab QoS Classification and Policing Using CAR

Lab 5.5 Configuring Logging

Configuring Static and Dynamic NAT Simultaneously

Chapter 4 Rate Limiting

CCIE R&S Lab Workbook Volume I Version 5.0

Chapter 2 Lab 2-2, Configuring EtherChannel Instructor Version

Deploying IPSec VPN in the Enterprise

Lab Configure Cisco IOS Firewall CBAC on a Cisco Router

Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1.

Chapter 2 Lab 2-2, EIGRP Load Balancing

Laboratorio 3 Comunicación sincrónica Vía Satélite

GLBP Gateway Load Balancing Protocol

Troubleshooting IP Routing

Cisco Quality of Service and DDOS

Cisco Configuring Commonly Used IP ACLs

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and

Configuring Denial of Service Protection

Sample Configuration Using the ip nat outside source static

Lab Configure Cisco IOS Firewall CBAC

Configuring QoS in a Wireless Environment

Lab Characterizing Network Applications

Troubleshooting Tools

Lab 8: Confi guring QoS

Using IPM to Measure Network Performance

Lab Use Network Inspector to Observe STP Behavior

Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME. Scenario

IP videoconferencing solution with ProCurve switches and Tandberg terminals

Configuring QoS in a Wireless Environment

CCNA Access List Sim

Lab 3.3 Configuring QoS with SDM

QoS (Quality of Service)

Configuring Flexible NetFlow

Lab 3.5.1: Basic VLAN Configuration (Instructor Version)

CertificationKits.com EIGRP Sample CCNA Lab. EIGRP Routing. The purpose of this lab is to explore the functionality of the EIGRP routing protocol.

Lab Analyzing Network Traffic

Laboratorio 4. Comunicación sincrónica Vía Satélite

CCNP ROUTE 6.0 Student Lab Manual

- QoS Classification and Marking -

Lab Exercise Configure the PIX Firewall and a Cisco Router

IBM. Tivoli. Netcool Performance Manager. Cisco Class-Based QoS Technology Pack. User Guide. Document Revision R2E1

Effect of Windows XP Firewall on Network Simulation and Testing

Sample Configuration Using the ip nat outside source list C

Lab: Basic Router Configuration

Requirements of Voice in an IP Internetwork

LAB THREE STATIC ROUTING

QoS: Color-Aware Policer

Cisco - Catalyst 2950 Series Switches Quality of Service (QoS) FAQ

Lab 5-5 Configuring the Cisco IOS DHCP Server

Lab Developing ACLs to Implement Firewall Rule Sets

- QoS and Queuing - Queuing Overview

Lab Diagramming External Traffic Flows

Cisco IOS Flexible NetFlow Technology

Lab 7-1 Configuring Switches for IP Telephony Support

Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering

Lab Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips

Quality of Service Commands

Lab 6.1 Configuring a Cisco IOS Firewall Using SDM

Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting

Improving Quality of Service

Basic Router and Switch Instructions (Cisco Devices)

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Chapter 3 Using Maintenance & Troubleshooting Tools & Applications Objectives

Quality of Service (QoS) on Netgear switches

Configure ISDN Backup and VPN Connection

Lab Introduction to the Modular QoS Command-Line Interface

Lab Configure IOS Firewall IDS

About Firewall Protection

LAB Configuring NAT. Objective. Background/Preparation

This topic lists the key mechanisms use to implement QoS in an IP network.

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1

Lab Load Balancing Across Multiple Paths

Cisco DNS-AS Troubleshooting

Frame Mode MPLS Implementation

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes

Clearing the Way for VoIP

Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham

Objectives. Router as a Computer. Router components and their functions. Router components and their functions

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Troubleshooting the Firewall Services Module

IP Accounting C H A P T E R

Homework 3 TCP/IP Network Monitoring and Management

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Analysis of IP Network for different Quality of Service

Chapter 1 Implement EIGRP operations Chapter 2 Implement multiarea OSPF operations Chapter 4 Implement Cisco IOS routing features...

Configuring Control Plane Policing

Configuring Quality of Service

How To Configure InterVLAN Routing on Layer 3 Switches

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Authentication with 802.1x and EAP Across Congested WAN Links

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

CCNA Discovery Working at a Small to Medium Business or ISP Student Packet Tracer Lab Manual

Challenges and Solutions in VoIP

Basic Software Configuration Using the Cisco IOS Command-Line Interface

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

VoIP Lab: Cisco CallManager Express, Temporary Work Instructions

Lab Advanced Telnet Operations

Configure Policy-based Routing

IPv6 Diagnostic and Troubleshooting

How To Configure A Cisco Router With A Cio Router

Transcription:

Lab 8.1.10.3 QoS Classification and Policing Using CAR Objective Scenario Step 1 This lab uses Committed Access Rate (CAR) to classify and police traffic. Although the classification and policing actions in this lab are configured on one router, this is not a requirement for CAR. CAR is commonly used to classify traffic at a distribution router and then police the traffic on congested core routers. Managing the bandwidth of the WAN link is difficult because the marketing departments in Singapore and San Jose frequently use peer-to-peer networking to exchange large graphics. When CAR is used to classify traffic, the DSCP value of the traffic can be lowered when excessive data rates occur. An analysis of current traffic patterns indicates that it is reasonable to allow up to 32 kbps of traffic between any two peers across the WAN link. All traffic up to the 32-kbps limit will be permitted with a best-effort DSCP value of 8. If the peers attempt to exchange data across the WAN link at rates exceeding 32 kbps, traffic will still be permitted to enter the network. However, the excessive traffic will be given a DSCP value of 0, which will rank it lower than best-effort status. On the WAN link, allow a maximum of 16 kbps of less than best-effort traffic with a DSCP value of 0. Any best-effort traffic that exceeds this bandwidth should be dropped. Build and configure the network according to the diagram. Before beginning a lab, the configurations on all the routers should be cleared and then reloaded or power cycled to reset their default 1-5 CCNP 3: Multilayer Switching v 4.0 - Lab 8.1.10.3 Copyright 2005, Cisco Systems, Inc.

configurations. Delete the vlan.dat and startup configuration files on the switches before reloading them. Configure EIGRP with an AS of 100 as the routing protocol. The configuration of CAR will occur on the routers so the access-layer switches can be left in their factory-default configuration. Router(config)#hostname Singapore Singapore(config)#interface fastethernet 0/0 Singapore(config-if)#ip address 192.168.1.1 255.255.255.0 Singapore(config-if)#no shutdown Singapore(config-if)#interface serial 0/0 Singapore(config-if)#ip address 192.168.2.1 255.255.255.0 Singapore(config-if)#clock rate 128000 Singapore(config-if)#no shutdown Singapore(config-if)#router eigrp 100 Singapore(config-router)#network 192.168.1.0 Singapore(config-router)#network 192.168.2.0 Router(config)#hostname SanJose1 SanJose1(config)#interface fastethernet 0/0 SanJose1(config-if)#ip address 192.168.3.1 255.255.255.0 SanJose1(config-if)#no shutdown SanJose1(config-if)#interface serial 0/0 SanJose1(config-if)#ip address 192.168.2.2 255.255.255.0 SanJose1(config-if)#clock rate 128000 SanJose1(config-if)#no shutdown SanJose1(config-if)#router eigrp 100 SanJose1(config-router)#network 192.168.3.0 SanJose1(config-router)#network 192.168.2.0 Step 2 Step 3 On each router, use an access list to define the peers that will be subject to CAR. In this lab, each LAN network must be permitted access to the other. Singapore(config)#access-list 100 permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255 SanJose1(config)#access-list 100 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255 Use the rate-limit command to classify the traffic on each router at the Fa0/0 interface. A partial syntax for the rate-limit command is as follows: Router(config-if)#rate-limit {input output} [dscp dscp value][accessgroup [rate-limit] acl-index] bps burst-normal burst-max conform-action action exceed-action action Mark conforming traffic of up to 32 kbps with a DSCP value of 8 and non-conforming traffic in excess of 32 kbps with a DSCP value of 0. The traffic will then be forwarded. Use question-marks (?) extensively in the following commands to become familiar with the different QoS options available. Singapore(config)#interface fastethernet 0/0 Singapore(config-if)# rate-limit input access-group 100 32000 3200 3200 conform-action set-dscp-transmit 8 exceed-action set-dscp-transmit 0 SanJose1(config)#interface fastethernet 0/0 2-5 CCNP 3: Multilayer Switching v 4.0 - Lab 8.1.10.3 Copyright 2005, Cisco Systems, Inc.

SanJose1(config-if)#rate-limit input access-group 100 32000 3200 3200 conform-action set-dscp-transmit 8 exceed-action set-dscp-transmit 0 These commands will only mark the traffic using the DSCP. Both conforming and non-conforming traffic will be transmitted. Singapore#show interfaces rate-limit last packet: 11998472ms ago, current burst: 0 bytes last cleared 00:02:27 ago, conformed 0 bps, exceeded 0 bps Step 4 last packet: 12253992ms ago, current burst: 0 bytes last cleared 00:00:40 ago, conformed 0 bps, exceeded 0 bps On the outbound WAN interfaces, police the traffic according to the requirements of keeping less than best-effort traffic with a DSCP value of 0 to a maximum of 16 kbps. Police the traffic by dropping it if it is non conformant. SanJose1(config)#interface serial 0/0 SanJose1(config-if)# rate-limit output dscp 0 16000 1600 2000 conform-action transmit exceed-action drop Singapore(config)#interface serial 0/0 Singapore(config-if)#rate-limit output dscp 0 16000 1600 2000 conformaction transmit exceed-action drop Singapore#show interfaces rate-limit last packet: 4202168ms ago, current burst: 0 bytes last cleared 00:38:39 ago, conformed 0 bps, exceeded 0 bps params: 16000 bps, 1600 limit, 2000 extended limit conformed 0 packets, 0 bytes; action: transmit exceeded 0 packets, 0 bytes; action: drop last packet: 4202960ms ago, current burst: 0 bytes last cleared 00:13:29 ago, conformed 0 bps, exceeded 0 bps Singapore# 3-5 CCNP 3: Multilayer Switching v 4.0 - Lab 8.1.10.3 Copyright 2005, Cisco Systems, Inc.

Step 5 last packet: 4304948ms ago, current burst: 0 bytes last cleared 00:34:27 ago, conformed 0 bps, exceeded 0 bps params: 16000 bps, 1600 limit, 2000 extended limit conformed 0 packets, 0 bytes; action: transmit exceeded 0 packets, 0 bytes; action: drop last packet: 4305768ms ago, current burst: 0 bytes last cleared 00:15:34 ago, conformed 0 bps, exceeded 0 bps Use an extended ping between LAN interfaces to test the traffic rate limiting policies. It may be helpful to experiment with ICMP packets that are different sizes. ping Protocol [ip]: Target IP address: 192.168.1.1 Repeat count [5]: 20 Datagram size [100]: 1500 Timeout in seconds [2]: Extended commands [n]: y Source address or interface: 192.168.3.1 Type of service [0]: Set DF bit in IP header? [no]: Validate reply data? [no]: Data pattern [0xABCD]: Loose, Strict, Record, Timestamp, Verbose[none]: Sweep range of sizes [n]: Type escape sequence to abort. Sending 20, 1500-byte ICMP Echos to 192.168.1.1, timeout is 2 seconds: Packet sent with a source address of 192.168.3.1!!.!!.!!.!!.!!.!!.!! Success rate is 70 percent (14/20), round-trip min/avg/max = 188/188/192 ms Step 6 The actions of CAR can be monitored by using the show interfaces rate-limit command to display the counters. Note that some of the 1500-byte packets exceeded the policed bandwidth on the WAN link and were dropped. last packet: 4850120ms ago, current burst: 0 bytes last cleared 00:00:44 ago, conformed 0 bps, exceeded 0 bps 4-5 CCNP 3: Multilayer Switching v 4.0 - Lab 8.1.10.3 Copyright 2005, Cisco Systems, Inc.

params: 16000 bps, 1600 limit, 2000 extended limit conformed 14 packets, 21056 bytes; action: transmit exceeded 6 packets, 9024 bytes; action: drop last packet: 7304ms ago, current burst: 1120 bytes last cleared 00:00:46 ago, conformed 3000 bps, exceeded 1000 bps Congratulations, CAR has been configured to classify and police traffic. 5-5 CCNP 3: Multilayer Switching v 4.0 - Lab 8.1.10.3 Copyright 2005, Cisco Systems, Inc.