11-22-2010 05:35 AM
Hi,
I am really new to the Nexus 5000 and it's 2148 fex modules. I have no SAN interfaces (FCoE) installed only ethernet interfaces. I understand that qos is enabled default and the trust state of every port is "trust cos".
I only want to trust servers QoS settings and forward them unmodified to my upstream Cat.6509 in the correct queue.
So I guess no extra configuration is needed on dot1q ports if servers are able to mark cos bits. Am I correct?
But what about access ports attached to physical servers on 2148 fex modules. On IOS I would configure "mls qos trust dscp" on this ports, but Í think that is not possible on NX-OS.
What confguration items could make this possible?
Can you provide me with an example config?
Best regards, Peter
11-22-2010 10:30 AM
By default the N5K trusts qos on all ethernet interfaces provided you have set the COS on the servers
Have a look at this link for sample config
HTH
Narayan
11-22-2010 05:45 PM
COS only exist if the port is configured with 802.1q. For normal access port DSCP will be used.
By default, Nexus will trust the traffic. All you want is trusting the marking from the server, you don't have to do anything unless you want to do some egress queueing and scheduling.
Regards,
jerry
11-23-2010 01:39 AM
Thanks Jerry.
So what you say is the following:
So no extra configuration is needed (as long as the Server will do the correct marking) and the traffic is forwarded based on the uplink 1P6Q0T queuing policy.
Am I right Jerry?
Attached is a show version output as well as an output of "show interface capabilities" and "show queuing interface". It looks to me that 1P6Q0T is not enabled by default on this uplink port. Is this a software issue???
Best regards, Peter
11-23-2010 07:29 AM
You are right about the trust.
For the egress policy, you have to configure that to fit your need. It is not default.
Regards,
jerry
11-25-2010 06:29 AM
Hi Jeye, This is from the N5K qos config guide. (1) By default, all Ethernet interfaces are trusted interfaces. A packet tagged with an 802.1p CoS value is classified into a system class using the value in the packet. (2) Any packet that is not tagged with an 802.1p CoS value is classified into the default drop system class. If the untagged packet is sent over a trunk, it is tagged with the default untagged CoS value, which is zero. From point (2), it seems that access port will not have 802.1p CoS and will be put into default drop system class rather than trusting the DSCP. I will test it out in my lab tomorrow to verify. THanks Eng Wee
11-25-2010 06:37 PM
Let me clarify the default drop class and trusting DSCP. By default, on access port, since it is not a trunk, no COS value will be received (everything in the port will be consider as COS 0 for ingress queueing). However, if application/end host's IP header has sat the DSCP value, that value will not be changed. The N5K is trusting the value marked by the end host unless there is a service policy at the ingress to remark it to different value.
The bottom line is COS and DSCP are in different headers. Unless you configured a policy to change the DSCP value, everything will be preserved.
Regards,
jerry
11-27-2010 08:27 PM
Hi Jeye, Thanks for the clarification. Rgds Eng Wee
11-28-2010 11:49 PM
Hi guys,
I am still looking for a sample configuration. I just don't know if I can edit the default system policy maps and just add some qos-groups or if I have to define new policy maps etc. There must be some documentation?
So the incoming interfaces are trusted by default for cos and dscp.
Can you provide me with a sample configuration for the egress queueing so that voice (5/EF) will be put in a priority queue and signalling (3/AF31) as well as Video (4/AF41) will be put into the right queue?
Regards, Peter
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: