05-02-2009 03:16 PM - edited 03-04-2019 04:36 AM
hey all,
I need to give traffic bound to specific URLs priority on the network... www.cisco.com for example. What would be the best way to configure this? I'm running on 7206VXRs. Thanks.
05-03-2009 01:02 AM
How is your http traffic treated at present?
Assuming you are using CBQ classbased already, your http traffic might be treated as default and marked with DSCP 0. what needs to happen is that you either:
1- Create a new class map to classify http to Cisco.com and then give a better DSCP.
2-take an existing classmap which already has a better treatment and modify it to include cisco.com.
This will only be valid in your network, once packets hit the internet they will be modified by other providers.
Can you paste ur existing QOS config so we can make some suggestions on how you can modify it.
HTH
Sam
05-03-2009 02:05 AM
Wayne,
You can use NBAR to accomplish this requirement. However we need to know what exactly you are going to do. Let's say I want to drop traffic that starts with "www.cisco.com". Not sure why we have this requirement. (grin)
!
class-map match-all CISCO
match protocol http host "www.cisco.com*"
!
!
policy-map CANNOT_GO_CISCO
class CISCO
drop
!
int s0/0/0
service-policy output CANNOT_GO_CISCO
!
I cannot now go to "www.cisco.com" or "www.cisco.con/go/fn" or something like that.
You may use this example for your QOS plan(other methods)
HTH,
Toshi
05-03-2009 06:14 AM
That example would block traffic to that site, but I'd like to give that traffic priority over all other http traffic. Instead of dropping the packets in the policy-map, would setting the precedence to a high priority have the opposite effect?
It's only logical (to me) that I would then have to have all the other http traffic under some sort of qos as well, otherwise setting this policy for the one website does nothing...
05-03-2009 06:30 AM
Wayne,
Like I mentioned. It's just an example. You have to re-apply it with your QOS policies. Yes, You can mark it with ip precedence at the inbound interface then re-use it at the outbound interface with QOS methods you want.
HTH,
Toshi
05-03-2009 07:13 AM
as previously mentioned it would have been helpful to see what you already have.
here is an example I am using in production:
---omitted-----
Class internet-in
set dscp default
police 29 mbps 1000 kbyte conform-action transmit exceed-action drop
----omitted--------
basically I police traffic to 29Mb, allow a burst and mark with DSCP 0. in your case, you will need to add another class for XY.com and mark it with DSCP8 for example. how to classify XY http traffic is either by NBAR as suggested by other posters or use an ACL (which might cover more than one website). I prefer not to use NBAR personally.
Class XY_SITE
set dscp 8
police 5 mbps 1000 kbyte conform-action transmit exceed-action drop
Once again, this will only be guaranteed in your domain. once packets leave your cloud, Internet providers would likely change your http packets DSCP.
HTH
Sam
05-03-2009 07:16 AM
Thanks guys. This was very helpful, as it gives me multiple options.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide