04-05-2013 11:20 AM - edited 03-04-2019 07:30 PM
Hello group,
We are in the beginning of a major network upgrade. We currently run network services on a NetVPN (ATT) network and are migrating to AVPN. As we move forward, we're going to be building in Class of Service based on available configurations. We currently use QoS to mange traffic on our routers. (I'm a bit new with some of this stuff, so pardon me if I mangle terms.) I am doing some research, but when you don't know, what you don't know..... So, I'm wondering if we'll need to 'blow away' our current configuration to accomodate the new CoS? Here's a code snippet of our current configuration:
Class map and policy map:
!
class-map match-any Business_Ingress
match access-group 130
class-map match-any Business_Data
match ip dscp af21
match access-group 130
class-map match-any ATM_Traffic
match access-group 140
class-map match-any Voice
match dscp ef
match access-group name Voice-Traffic
class-map match-any Replication
match access-group 150
class-map match-any Voice_Ingress
match access-group name Voice-Traffic
!
!
policy-map Voice-Traffic
class Voice
priority percent 15
class Business_Data
bandwidth percent 64
class Replication
police 7000000
class ATM_Traffic
priority percent 5
class class-default
policy-map WAN_QOS
class class-default
shape average 10000000
service-policy Voice-Traffic
policy-map QOS_INGRESS_LAN
class Business_Ingress
set ip dscp af21
class Voice_Ingress
set ip dscp ef
!
!
!
ACCESS LISTS:
access-list 5 permit 0.0.0.0
access-list 6 permit 208.61.216.1
access-list 7 permit 10.15.1.0 0.0.0.255
access-list 10 permit 0.0.0.0
access-list 10 permit any
access-list 20 permit 10.20.102.22
access-list 100 permit ip 10.20.102.0 0.0.0.255 any
access-list 100 deny ip any 170.209.0.2 0.0.0.1
access-list 100 permit ip any any
access-list 120 deny ip host 10.20.102.22 any
access-list 120 permit ip host 10.20.102.89 any
access-list 120 deny ip any any
access-list 127 deny ip host 10.20.102.51 host 205.152.226.254
access-list 127 deny ip host 10.20.102.51 host 205.152.0.5
access-list 127 permit ip host 10.20.102.51 any
access-list 127 deny ip host 10.20.102.52 host 205.152.226.254
access-list 127 deny ip host 10.20.102.52 host 205.152.0.5
access-list 127 permit ip host 10.20.102.52 any
access-list 127 deny ip any any
access-list 130 deny ip 10.20.100.0 0.0.0.255 any
access-list 130 deny ip host 10.20.102.8 any
access-list 130 deny ip host 10.20.102.154 any
access-list 130 deny ip host 10.20.102.23 any
access-list 130 permit ip 10.20.0.0 0.0.255.255 10.20.0.0 0.0.255.255
access-list 140 permit ip any host 10.20.105.254
access-list 140 permit ip any host 10.20.110.254
access-list 140 permit ip any host 10.20.112.254
access-list 140 permit ip any host 10.20.114.254
access-list 140 permit ip any host 10.20.117.2
access-list 140 permit ip any host 10.20.118.254
access-list 140 permit ip any host 10.20.122.254
access-list 140 permit ip any host 10.20.124.254
access-list 140 permit ip any host 10.20.128.254
access-list 140 permit ip any host 10.20.126.254
access-list 140 permit ip any host 10.20.134.254
access-list 140 permit ip any host 10.20.132.254
access-list 140 permit ip any host 10.20.140.254
access-list 140 permit ip any host 10.20.142.254
access-list 150 permit ip 10.20.100.0 0.0.0.255 any
access-list 150 permit ip host 10.20.102.8 any
access-list 150 permit ip host 10.20.102.23 any
access-list 150 permit ip host 10.20.102.154 any
If someone could direct me to some information for further reading, I'd appreciate it.
Chris
04-06-2013 09:56 PM
what is you IOS version..
you may refer this document....
http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfmcli2.html
http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfcbmrk.html#wp1005766
Regards
Thanveer
"Everybody is genius. But if you judge a fish by its ability to climb a tree, it will live its whole life believing that it is a stupid."
04-07-2013 08:39 AM
If you are talking about outbound QOS pointed toward the wan, the first thing you need to do is understand what the wan provider will accept. You can come up with a very finely detailed 13 cos breakdown of all your traffic, but if the wan provider is only going to accept 5 classes, it doesn't really matter. Find out what Avpn will accept and tune your markings to those.
The next thing I would personally recommend is to keep it simple. Start with voice, then add mission critical business, then maybe video, then everything else. Start with a simple policy, mark the outbound to what the provider will accept, set priority queue for voice, insure your mission critical has a large enough reservation and you'll likely have 90% of your problem solved.
Sent from Cisco Technical Support iPad App
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: