02-12-2015 11:41 AM - edited 03-05-2019 12:47 AM
Dear All
Here is a question. In enterprise network, there are some VoIP devices. Can I say performing Qos should always be at bottleneck devices if the traffic wants to go to internet ? Thank you.
Solved! Go to Solution.
02-13-2015 01:00 PM
Disclaimer
The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
Liability Disclaimer
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
Posting
No, not exactly. Once traffic has cross into/over the trust boundary, devices can just use packet's ToS markings.
The boundary is where traffic might be analyzed for correct QoS marking.
This might help: http://networklessons.com/quality-of-service/how-to-configure-qos-trust-boundary-on-cisco-switches/
02-12-2015 01:01 PM
Disclaimer
The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
Liability Disclaimer
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
Posting
Well, since the Internet, itself, doesn't generally support QoS, is there a point to worrying about bottlenecks going toward it? Maybe, maybe not.
More generally, if any bottleneck is adverse to traffic, you might want QoS to manage the congestion.
Also, BTW, most network interfaces are bottlenecks. Again, the issue is, is a bottleneck adverse to your traffic service needs, and if so, might QoS mitigate?
02-12-2015 08:09 PM
Right, thank you. We should set trusted boundary. why do we have to set up the trusted boundary ?
02-13-2015 02:35 AM
Disclaimer
The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
Liability Disclaimer
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
Posting
Consider you provide a LLQ class for traffic like VoIP. Further consider that most of your network doesn't analyze the traffic beyond looking at its DSCP marking. So, for example, VoIP phones mark their bearer traffic with DSCP EF.
Next consider, a server admin decides they want to prioritize their tape backups and so they too mark their backup traffic with DSCP EF. If you can see the potential problem, then you might see the need for trust boundaries.
Basically a trust boundary is where traffic on the "outside" isn't trusted while traffic on the "inside" is trusted. Traffic entering an edge port would often be outside your trust boundary, traffic between to network devices that only you control would often be trusted.
Were you might have different trust boundaries is where there different subsets of network devices controlled by different parties. Each might have their own trust boundary.
Other then not trusting edge ports or entry ports (e.g. traffic from the Internet), you'll likely only need one trust boundary.
02-13-2015 10:15 AM
Thank you for your explanation.
If a traffic entering trust boundary and become trust traffic, the traffic does not need re-trust treatment when it pass another advice ? in another word, device on the boundary is only device to make the traffic as trust traffic ?
02-13-2015 01:00 PM
Disclaimer
The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
Liability Disclaimer
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
Posting
No, not exactly. Once traffic has cross into/over the trust boundary, devices can just use packet's ToS markings.
The boundary is where traffic might be analyzed for correct QoS marking.
This might help: http://networklessons.com/quality-of-service/how-to-configure-qos-trust-boundary-on-cisco-switches/
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide