Lab 8.9.3 QoS Classification and Policing Using CAR



Similar documents
How To Lower Data Rate On A Network On A 2Ghz Network On An Ipnet 2 (Net 2) On A Pnet 2 On A Router On A Gbnet 2.5 (Net 1) On An Uniden Network On

Configuring Static and Dynamic NAT Simultaneously

Task 20.1: Configure ASBR1 Serial 0/2 to prevent DoS attacks to ASBR1 from SP1.

Lab Configure Cisco IOS Firewall CBAC on a Cisco Router

Lab 8: Confi guring QoS

CCIE R&S Lab Workbook Volume I Version 5.0

Sample Configuration Using the ip nat outside source static

Lab 7-1 Configuring Switches for IP Telephony Support

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others

Configuring Denial of Service Protection

Chapter 4 Rate Limiting

Lab 5.5 Configuring Logging

Lab 6.1 Configuring a Cisco IOS Firewall Using SDM

Chapter 2 Lab 2-2, EIGRP Load Balancing

Sample Configuration Using the ip nat outside source list C

Lab Exercise Configure the PIX Firewall and a Cisco Router

Lab Developing ACLs to Implement Firewall Rule Sets

Lab 3.3 Configuring QoS with SDM

CCNA Access List Sim

Using a Sierra Wireless AirLink Raven X or Raven-E with a Cisco Router Application Note

This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and

CertificationKits.com EIGRP Sample CCNA Lab. EIGRP Routing. The purpose of this lab is to explore the functionality of the EIGRP routing protocol.

Chapter 2 Lab 2-2, Configuring EtherChannel Instructor Version

Lab Advanced Telnet Operations

- QoS Classification and Marking -

Felix Rohrer. PT Activity 7.5.3: Troubleshooting Wireless WRT300N. Topology Diagram

Lab Introduction to the Modular QoS Command-Line Interface

Lab Configure Cisco IOS Firewall CBAC

Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access

Configure ISDN Backup and VPN Connection

Lab 3.5.1: Basic VLAN Configuration (Instructor Version)

Cisco Quality of Service and DDOS

LAN-Cell to Cisco Tunneling

Lab Load Balancing Across Multiple Paths

Lab Characterizing Network Applications

Lab 5-5 Configuring the Cisco IOS DHCP Server

Cisco Configuring Commonly Used IP ACLs

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

IP videoconferencing solution with ProCurve switches and Tandberg terminals

Lab Load Balancing Across Multiple Paths Instructor Version 2500

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham

Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support

Lab Creating a Network Map using CDP Instructor Version 2500

GLBP Gateway Load Balancing Protocol

Virtual Fragmentation Reassembly

How To Configure A Cisco Router With A Cio Router

Session Title: Exploring Packet Tracer v5.3 IP Telephony & CME. Scenario

Configuring QoS in a Wireless Environment

Lab Analyzing Network Traffic

Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering

Troubleshooting IP Routing

Successful IP Video Conferencing White Paper

Configuring QoS in a Wireless Environment

Basic Software Configuration Using the Cisco IOS Command-Line Interface

IBM. Tivoli. Netcool Performance Manager. Cisco Class-Based QoS Technology Pack. User Guide. Document Revision R2E1

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

QoS (Quality of Service)

Objectives. Router as a Computer. Router components and their functions. Router components and their functions

Improving Quality of Service

Lab: Basic Router Configuration

Lab Diagramming External Traffic Flows

- QoS and Queuing - Queuing Overview

PC-over-IP Protocol Virtual Desktop Network Design Checklist. TER Issue 2

AutoQoS for Medianet

Deployment Guidelines for QoS Configuration in DSL Environment

This techno knowledge paper can help you if: You need to setup a WAN connection between a Patton Router and a NetGuardian.

Deploying IPSec VPN in the Enterprise

Central America Workshop - Guatemala City Guatemala 30 January - 1 February 07. IPv6 Security

QoS: Color-Aware Policer

Frame Mode MPLS Implementation

Lab Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips

CCNP ROUTE 6.0 Student Lab Manual

Configuring Control Plane Policing

Effect of Windows XP Firewall on Network Simulation and Testing

Configuring the Cisco Secure PIX Firewall with a Single Intern

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Configure Cisco IOS Firewall to use stateful packet inspection for IPv6. Configure Cisco IOS Firewall to use packet filtering for IPv6.

Optimizing Converged Cisco Networks (ONT)

This topic lists the key mechanisms use to implement QoS in an IP network.

Troubleshooting the Firewall Services Module

Authentication with 802.1x and EAP Across Congested WAN Links

Device Interface IP Address Subnet Mask Default Gateway

Cisco - Catalyst 2950 Series Switches Quality of Service (QoS) FAQ

Firewall Stateful Inspection of ICMP

DS3 Performance Scaling on ISRs

Cisco CCNA Optional Semester 4 Labs Wide Area Networking LAB 1 T1 TSU WAN LINK OVERVIEW - Instructor Guide (Estimated time: 30 minutes)

How To Configure InterVLAN Routing on Layer 3 Switches

Configuring QoS and Per Port Per VLAN QoS

How To Configure Voip Qos For A Network Connection

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1

Approach to build MPLS VPN using QoS capabilities

IST 220 Honors Project. Subnets with Variable Length Subnet Masks

Common Application Guide

Lab Configure IOS Firewall IDS

Clearing the Way for VoIP

Central America Workshop - Guatemala City Guatemala 30 January - 1 February 07. IPv6 Router s Configuration

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting

Transcription:

Lab 8.9.3 QoS Classification and Policing Using CAR Objective Scenario Step 1 This lab uses Committed Access Rate (CAR) to classify and police traffic. Although the classification and policing actions in this lab are configured on one router, this is not a requirement for CAR. CAR is commonly used to classify traffic at a distribution router and then police the traffic on congested core routers. Managing the bandwidth of the WAN link is difficult because the marketing departments in Singapore and San Jose frequently use peer-to-peer networking to exchange large graphics. When CAR is used to classify traffic, the DSCP value of the traffic can be lowered when excessive data rates occur. An analysis of current traffic patterns indicates that it is reasonable to allow up to 32 kbps of traffic between any two peers across the WAN link. All traffic up to the 32-kbps limit will be permitted with a best-effort DSCP value of 8. If the peers attempt to exchange data across the WAN link at rates exceeding 32 kbps, traffic will still be permitted to enter the network. However, the excessive traffic will be given a DSCP value of 0, which will rank it lower than best-effort status. On the WAN link, allow a maximum of 16 kbps of less than best-effort traffic with a DSCP value of 0. Any best-effort traffic that exceeds this bandwidth should be dropped. Build and configure the network according to the diagram. Configure EIGRP with an AS of 100 as the routing protocol. The configuration of CAR will occur on the routers so the access-layer switches can be left in their factory-default configuration. 1-5 CCNP 3: Multilayer Switching v 3.0 - Lab 8.9.3 Copyright 2003, Cisco Systems, Inc.

Step 2 On each router, use an access list to define the peers that will be subject to CAR. Step 3 Singapore(config)#access-list 100 permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255 SanJose1(config)#access-list 100 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255 Use the rate-limit command to classify the traffic on each router at the Fa0/0 interface. Router(config-if)#rate-limit {input output} [dscp dscp value][accessgroup [rate-limit] acl-index] bps burst-normal burst-max conform-action action exceed-action action Mark conforming traffic of up to 32 kbps with a DSCP value of 8 and non-conforming traffic in excess of 32 kbps with a DSCP value of 0. The traffic will then be forwarded. Use question-marks (?) extensively in the following commands to become familiar with the different QoS options available. Singapore(config)#interface fastethernet 0/0 Singapore(config-if)#rate-limit input access-group 100 32000 3200 3200 conform-action set-dscp-transmit 8 exceed-action set-dscp-transmit 0 SanJose1(config)#interface fastethernet 0/0 SanJose1(config-if)# rate-limit input access-group 100 32000 3200 3200 conform-action set-dscp-transmit 8 exceed-action set-dscp-transmit 0 Step 4 These commands will only mark the traffic using the DSCP. Both conforming and non-conforming traffic will be transmitted. On the outbound WAN interfaces, police the traffic according to the requirements of keeping less than best-effort traffic with a DSCP value of 0 to a maximum of 16 kbps. Police the traffic by dropping it if it is non conformant. SanJose1(config)#interface serial 0/0 SanJose1(config-if)# rate-limit output dscp 0 16000 1600 2000 conform-action transmit exceed-action drop Singapore(config)#interface serial 0/0 Singapore(config-if)#rate-limit output dscp 0 16000 1600 2000 conformaction transmit exceed-action drop Step 5 Ping between the peers across the WAN link to test the configuration. It may be helpful to experiment with ICMP packets that are different sizes. The following output was generated from a router used in place of the Singapore PC. Similar results should be obtained when using a PC. 2-5 CCNP 3: Multilayer Switching v 3.0 - Lab 8.9.3 Copyright 2003, Cisco Systems, Inc.

Singapore-host#ping Protocol [ip]: Target IP address: 192.168.3.2 Repeat count [5]: 1000 Datagram size [100]: 1500 Timeout in seconds [2]: Extended commands [n]: Sweep range of sizes [n]: Type escape sequence to abort. Sending 1000, 1500-byte ICMP Echos to 192.168.3.2, timeout is 2 seconds:... Step 6 Note that some of the 1500-byte packets exceeded the policed bandwidth on the WAN link and were dropped The actions of CAR can be monitored by using the show interfaces rate-limit command. Singapore#show interfaces rate-limit FastEthernet0/0 Input matches: access-group 100 params: 32000 bps, 3200 limit, 3200 extended limit conformed 398 packets, 602572 bytes; action: set-dscp-transmit 8 exceeded 198 packets, 299772 bytes; action: set-dscp-transmit 0 last packet: 44ms ago, current burst: 2140 bytes last cleared 00:12:15 ago, conformed 6000 bps, exceeded 3000 bps Singapore# Serial0/0 Output matches: dscp 0 params: 16000 bps, 1600 limit, 2000 extended limit conformed 244 packets, 324976 bytes; action: transmit exceeded 84 packets, 126336 bytes; action: drop last packet: 2876ms ago, current burst: 688 bytes last cleared 00:12:02 ago, conformed 3000 bps, exceeded 1000 bps Note that packets are being classified according to their DSCP value on the Fast Ethernet interface. The packets are policed on the Serial interface and dropped if necessary. Congratulations, CAR has been configured to classify and police traffic. 3-5 CCNP 3: Multilayer Switching v 3.0 - Lab 8.9.3 Copyright 2003, Cisco Systems, Inc.

Configuration Singapore hostname Singapore interface Serial0/0 ip address 192.168.2.1 255.255.255.0 rate-limit output dscp 0 16000 1600 2000 conform-action transmit exceed-action drop interface FastEthernet0/0 ip address 192.168.1.1 255.255.255.0 rate-limit input access-group 100 32000 3200 3200 conform-action set-dscptransmit 8 exceed-action set-dscp-transmit 0 duplex auto router eigrp 100 network 192.168.1.0 network 192.168.2.0 auto-summary access-list 100 permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255 line con 0 line aux 0 line vty 0 4 login end 4-5 CCNP 3: Multilayer Switching v 3.0 - Lab 8.9.3 Copyright 2003, Cisco Systems, Inc.

Configuration SanJose1 hostname SanJose1 interface FastEthernet0/0 ip address 192.168.3.1 255.255.255.0 rate-limit input access-group 100 32000 3200 3200 conform-action set-dscptransmit 8 exceed-action set-dscp-transmit 0 interface Serial0/0 ip address 192.168.2.2 255.255.255.0 rate-limit output dscp 0 16000 2000 2000 conform-action transmit exceed-action drop clockrate 128000 router eigrp 100 network 192.168.2.0 network 192.168.3.0 auto-summary access-list 100 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255 line con 0 line aux 0 line vty 0 4 login end 5-5 CCNP 3: Multilayer Switching v 3.0 - Lab 8.9.3 Copyright 2003, Cisco Systems, Inc.