cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
346
Views
12
Helpful
8
Replies

Qos on 6509

iaglindro
Level 1
Level 1

I need to control traffic through 6509. please provide assistance. thanks.

8 Replies 8

bribrown
Level 5
Level 5

I am not sure if you are using IOS or CatOS so here are some links on QOS for both.

http://www.cisco.com/warp/customer/473/152.html

http://www.cisco.com/warp/customer/473/138.html

http://www.cisco.com/warp/customer/473/60.html

http://www.cisco.com/warp/customer/473/73.html

If these do not provide the answers you need please add some more information.

I'm using CatOS. but based on these docs, on a certain port, i can control ingress traffic (LAN to WAN) but how about egress traffic (WAN to LAN)? does it mean that if i configure the policy for ingress traffic, i already configured the policy for egress traffic (in other words, does the policy controls 2-way traffic)?

I need to control two way traffic.

the docs are very helpful. hope you can reply to my inquiry soon.

PFC QOS is entirely dependant on several things. What type port is your traffic coming in on and what type is it leaving on. A lot of WAN modules (OSM's for example) do not support QOS on egress. Can you provide more information on what you are trying to do and on what HW you are egressing on to get more information.

I hope this helps,

Don

Type of Module (incoming): WS-X6408A-GBIC

Type of Module (Outgoing): WS-X6408A-GBIC

Data Flow:

User ---> FE (3548) GE ---> GE (6509) GE ---> Internet

Or if ever egress is not available on the modules/ports above. please help me find a way to configure control traffic (both ways) for this user. thanks again in advance.

I do not believe that egress policing is supported on those cards. Just

egress classification, which will not help you get your shaping done.

In many cases this can be achieved by utilizing inbound policing.

Example Scenario on how to do this:

No more than 1Mbps is to sent out vlan 200 (which is the uplink to the core)

from vlans 201, 202, but no restriction should be in place for traffic between the vlans.

set qos enable

set qos policer aggregate out_police rate 1000 burst 10 drop

clear qos acl all

#vlan_201

set qos acl ip vlan_201 trust-ipprec ip 77.1.2.0 0.0.0.255 77.1.3.0 0.0.0.255

set qos acl ip vlan_201 trust-ipprec aggregate out_police ip 77.1.2.0 0.0.0.255 any

#vlan_202

set qos acl ip vlan_202 trust-ipprec ip 77.1.3.0 0.0.0.255 77.1.2.0 0.0.0.255

set qos acl ip vlan_202 trust-ipprec aggregate out_police ip 77.1.3.0 0.0.0.255 any

commit qos acl all

set qos acl map vlan_201 201

set qos acl map vlan_202 202

Hope this helps you,

Don

i'll test this setup. but i'll have no configurations for vlan 200? i'll get to you as soon as i've tested it. thanks.

VLAN 200 was just an example.. Since you did not supply VLAN information I just came up with an example of how you'd do it with ingress... So, VLAN 200 was made up for the example I provided. Change as needed.

Don

hi!

excuse for my ignorance but how do i get to #201?

--->#vlan_201

set qos acl ip vlan_201 trust-ipprec ip 77.1.2.0 0.0.0.255 77.1.3.0 0.0.0.255

set qos acl ip vlan_201 trust-ipprec aggregate out_police ip 77.1.2.0 0.0.0.255 any

this is the configuration so far i have done:

#qos

set qos policer aggregate test rate 32 burst 1 drop

clear qos acl all

#testing

set qos acl ip testing trust-ipprec aggregate test ip 98.1.79.244 0.0.0.3 any

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: