Cisco NM-8B-U User Guide - Page 87

Understanding the Default QoS Configuration, Configuring Classification Using Port Trust States

Page 87 highlights

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks Understanding the Default QoS Configuration • The default port CoS value is 0. • The default port trust state is untrusted. • No policy maps are configured. • No policers are configured. • The default CoS-to-DSCP map is shown in Table 13 on page 96. • The default DSCP-to-CoS map is shown in Table 14 on page 97. Configuration Guidelines Before beginning the QoS configuration, you should be aware of this information: • If you have EtherChannel ports configured on your switch, you must configure QoS classification, policing, mapping, and queueing on the individual physical ports that comprise the EtherChannel. You must decide whether the QoS configuration should match on all ports in the EtherChannel. • It is not possible to match IP fragments against configured IP extended ACLs to enforce QoS. IP fragments are transmitted as best-effort. IP fragments are denoted by fields in the IP header. • Control traffic (such as spanning-tree Bridge Protocol Data Units (BPDUs) and routing update packets) received by the switch are subject to all ingress QoS processing. • Only one ACL per class map and only one match command per class map are supported. The ACL can have multiple access control entries, which are commands that match fields against the contents of the packet. • Policy maps with ACL classification in the egress direction are not supported and cannot be attached to an interface by using the service-policy input policy-map-name interface configuration command. • In a policy map, the class named class-default is not supported. The switch does not filter traffic based on the policy map defined by the class class-default policy-map configuration command. For more information on guidelines for configuring ACLs, see the "Classification Based on QoS ACLs" section on page 32. Configuring Classification Using Port Trust States This section describes how to classify incoming traffic by using port trust states: • Configuring the Trust State on Ports and SVIs within the QoS Domain, page 87 • Configuring the CoS Value for an Interface, page 89 Configuring the Trust State on Ports and SVIs within the QoS Domain Packets entering a QoS domain are classified at the edge of the QoS domain. When the packets are classified at the edge, the switch port within the QoS domain can be configured to one of the trusted states because there is no need to classify the packets at every switch within the QoS domain. Figure 20 shows a sample network topology. Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ 87

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series
Configuration Tasks
87
Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ
Understanding the Default QoS Configuration
The default port CoS value is 0.
The default port trust state is untrusted.
No policy maps are configured.
No policers are configured.
The default CoS-to-DSCP map is shown in
Table 13 on page 96
.
The default DSCP-to-CoS map is shown in
Table 14 on page 97
.
Configuration Guidelines
Before beginning the QoS configuration, you should be aware of this information:
If you have EtherChannel ports configured on your switch, you must configure QoS classification,
policing, mapping, and queueing on the individual physical ports that comprise the EtherChannel.
You must decide whether the QoS configuration should match on all ports in the EtherChannel.
It is not possible to match IP fragments against configured IP extended ACLs to enforce QoS. IP
fragments are transmitted as best-effort. IP fragments are denoted by fields in the IP header.
Control traffic (such as spanning-tree Bridge Protocol Data Units (BPDUs) and routing update
packets) received by the switch are subject to all ingress QoS processing.
Only one ACL per class map and only one
match
command per class map are supported. The ACL
can have multiple access control entries, which are commands that match fields against the contents
of the packet.
Policy maps with ACL classification in the egress direction are not supported and cannot be attached
to an interface by using the
service-policy
input
policy-map-name
interface configuration
command.
In a policy map, the class named class-default is not supported. The switch does not filter traffic
based on the policy map defined by the
class class-default
policy-map configuration
command.
For more information on guidelines for configuring ACLs, see the
“Classification Based on QoS ACLs”
section on page 32
.
Configuring Classification Using Port Trust States
This section describes how to classify incoming traffic by using port trust states:
Configuring the Trust State on Ports and SVIs within the QoS Domain, page 87
Configuring the CoS Value for an Interface, page 89
Configuring the Trust State on Ports and SVIs within the QoS Domain
Packets entering a QoS domain are classified at the edge of the QoS domain. When the packets are
classified at the edge, the switch port within the QoS domain can be configured to one of the trusted
states because there is no need to classify the packets at every switch within the QoS domain.
Figure 20
shows a sample network topology.