Attached mainly for A-series and B without policy, with policy look for that 
part in the manual.
Hope this helps

Con

From: Lamine b [mailto:[email protected]]
Sent: Friday, October 29, 2010 8:12 AM
To: Enterasys Customer Mailing List
Subject: [enterasys] Config QoS on A-Series B-Series C-Series

Hi,

Could anyone help me in configuring QoS on A-Series B-Series C-Series.

Does Enterasys allow configuring policy-map, marking for a specific trafic 
(access-list or route-map)?

Any document or exemple could help, I didn't find any exmples or documents in 
the Website of Enterasys except 
secure.enterasys.com/support/manuals/hardware/QoS.pdf which didn't help.

Thanks in advance.

Regards,
Lamine



  *   --To unsubscribe from enterasys, send email to 
[email protected]<mailto:[email protected]> with the body: unsubscribe enterasys 
[email protected]

---
To unsubscribe from enterasys, send email to [email protected] with the body: 
unsubscribe enterasys [email protected]
--- Begin Message ---

The following is a Primus(R) eServer solution:

ID: ent22294
Domain: primusprod
Solution Class: tac

Goal       Configure DiffServ

Goal       Sample configuration

Fact       SecureStack B3

Fact       SecureStack B2

Fact       SecureStack A2

Fact       DiffServ

Fact       Policy

Symptom    'set diffserv'

Cause      The SecureStack A2 supports DiffServ (the 'set diffserv' command 
set), but not Policy (the 'set policy' command set).
The SecureStack B2 & B3 support DiffServ by default, as long as Policy 
licensing 
(ent21550<http://knowledgebase.enterasys.com/iview/iview/ui/eserver.asp?id=ent21550>)
 has not been applied.

This solution explains the subset of what may be accomplished using DiffServ 
functionality rather than the more full-featured Policy (including DSCP 
manipulation) functionality, and also provides detailed configuration guidance.

Fix        Differentiated Services configuration permits the user to classify 
incoming traffic (VLAN-tagged or not), and then either drop it or forward it. 
Forwarded traffic may optionally have a Rate Limiter (within the range of 1 
Kbps through line speed) applied, and/or the traffic may optionally be "marked" 
with a value written to the first 3 (Precedence) bits of the TOS byte or to the 
first 6 (DSCP) bits of the TOS byte.

It is possible to assign an 802.1p Priority or an 802.1Q VLAN using Policy, but 
not using DiffServ.

For Layer 2 (switching) purposes, DiffServ can be effective for dropping or 
rate limiting traffic.
For Layer 3 (routing) purposes, DiffServ can be effective for setting the 
routing precedence to be used during periods of network congestion.

Note: If DiffServ is used to mark the DSCP value of a frame based on a keyword 
of "ef" or a value of 46 (with either of these yielding L3 Express Forwarding), 
as a side-function the outgoing L2 frame will be placed into the highest 
priority hardware queue (Queue 5) for transmission.

It is advisable that you review the background information contained in 
ent21886<http://knowledgebase.enterasys.com/iview/iview/ui/eserver.asp?id=ent21886>
 before proceeding with the remainder of this document.

DiffServ configuration commands
 set diffserv

   adminmode                Configure the DiffServ Admin mode.
     enable                   Enable the DiffServ Admin mode.
     disable                  Disable the DiffServ Admin mode.

   class                    Configure a DiffServ Class to trigger a DiffServ 
Policy.
     create                   Create a DiffServ collection of classification 
rules.
       all                    All match conditions must be met, to trigger the 
Policy.
         <classname>          * New Class name, up to 31 alphanumeric characters
     delete                   Delete a DiffServ collection of classification 
rules.
       <classname>            * Existing Class to be deleted
     match                    Add a classification rule to a DiffServ Class.
       dstip                  Match to this Destination IP Address value.
         <classname>          * Existing Class to which this rule should be 
added
           <ipaddr>           * IP Address (example: 10.20.30.40)
             <ipmask>         * IP subnet bitmask (example: 255.255.255.0)
       dstl4port              Match to this Destination Layer 4 Port value.
         keyword              Match based on a Destination Layer 4 Port Keyword.
           <classname>        * Existing Class to which this rule should be 
added
             <portkey>        * One of -> domain / echo / ftp / ftpdata / http /
                                          smtp / snmp / telnet / tftp / www
         number               Match based on a Destination Layer 4 Port Number 
value.
           <L4portnumber>     * L4 port number within the range 0-65535
       dstmac                 Match to this Destination MAC Address value.
         <classname>          * Existing Class to which this rule should be 
added
           <macaddr>          * MAC Address (example: 00-00-01-02-03-ab)
             <macmask>        * MAC address bitmask (example: ff-ff-ff-00-00-00)
       every                  Match to all unagged packets regardless of 
attributes.
         <classname>          * Existing Class to which this rule should be 
added
       ipdscp                 Match to this DSCP value.
         <classname>          * Existing Class to which this rule should be 
added
           <dscpval>          * One of -> DSCP value within the range 0-63 -or-
                                keyword af12 / af21 / af22 / af31 / af32 / af33 
/ be
                                  cs0 / cs1 / cs2 / cs3 / cs4 / cs5 / cs6 / cs7 
/ ef
       ipprecedence           Match to this IP Precendence (first 3 bits of 
TOS) value.
         <classname>          * Existing Class to which this rule should be 
added
           <precval>          * IP Precedence value within the range 0-7
       iptos                  Match to this IP TOS (all 8 bits of TOS) value.
         <classname>          * Existing Class to which this rule should be 
added
           <tosbits>          * TOS bits value within the range 00-ff
             <tosmask>        * TOS bitmask value within the range 00-ff
       protocol               Match to this IP Protocol.
         keyword              Match based on a IP Protocol Keyword.
           <classname>        * Existing Class to which this rule should be 
added
             <protocolkey>    * One of -> icmp / igmp / ip / tcp / udp
         number               Match based on an IP Protocol value.
           <classname>        * Existing Class to which this rule should be 
added
             <protocolnbr>    * IP Protocol value within the range 0-255
       refclass               Add or remove the match rules referenced by this 
Class.
         add                  Add a set of match conditions.
           <classname>        * Existing Class to which the rules should be 
added
             <refclassname>   * Existing Class to be used as the rule source
         remove               Remove a set of match conditions.
           <classname>        * Existing Class from which the rules should be 
removed
             <refclassname>   * Existing Class to be used as the rule template
       srcip                  Match to this Source IP Address value.
         <classname>          * Existing Class to which this rule should be 
added
           <ipaddr>           * IP Address (example: 10.20.30.40)
             <ipmask>         * IP subnet bitmask (example: 255.255.255.0)
       srcl4port              Match to this Source Layer 4 Port.
         keyword              Match based on a Source Layer 4 Port Keyword.
           <classname>        * Existing Class to which this rule should be 
added
             <portkey>        * One of -> domain / echo / ftp / ftpdata / http /
                                          smtp / snmp / telnet / tftp / www
         number               Match based on a Destination Layer 4 Port Number 
value.
           <L4portnumber>     * L4 port number within the range 0-65535
       srcmac                 Match to this Source MAC Address value.
         <classname>          * Existing Class to which this rule should be 
added
           <macaddr>          * MAC Address (example: 00-00-01-02-03-ab)
             <macmask>        * MAC address bitmask (example: ff-ff-ff-00-00-00)
       vlan                   Match to this assigned VLAN ID value.
         <classname>          * Existing Class to which this rule should be 
added
           <vlanid>           * VLAN ID within the range 1-4093

   rename                   Rename a DiffServ Class.
     <oldclassname>           * Existing Class name to be renamed
       <newclassname>         * New Class name, up to 31 alphanumeric characters

   policy                   Configure a DiffServ Policy to perform an action.
     class                    Add or remove a member Class to/from a Policy.
       add                    Add a class instance to a Policy.
         <policyname>         * Existing Policy to which this Class should be 
added
           <classname>        * Existing Class to be added to the Policy
       remove                 Remove a class instance from the Policy.
        <policyname>          * Existing Policy from which this Class should be 
removed
           <classname>        * Existing Class to be removed from the Policy
     create                   Create a DiffServ Policy.
       <policyname>           * New Policy name, up to 31 alphanumeric 
characters
         in                   Only Ingress policies are supported.
     delete                   Delete a DiffServ Policy.
       <policyname>           * Existing Policy to be deleted
     mark                     Configure a Marking action in the absence of 
Policing.
       ipdscp                 Rewrite this IP DSCP (TOS bits 0x'11111100') 
value.
         <policyname>         * Existing Policy to utilize the Mark action
           <classname>        * Existing embedded Class to trigger the Mark 
action
             <dscpval>        * One of -> DSCP value within the range 0-63 -or-
                                keyword af12 / af21 / af22 / af31 / af32 / af33 
/ be
                                  cs0 / cs1 / cs2 / cs3 / cs4 / cs5 / cs6 / cs7 
/ ef
       ipprecedence           Rewrite this IP Precedence (TOS bits 
0x'11100000') value.
         <policyname>         * Existing Policy to utilize the Mark action
           <classname>        * Existing embedded Class to trigger the Mark 
action
             <precval>        * IP precedence value within the range 0-7
     police                   Configure a Policing Action or Style.
       action                 Configure a Policing Action.
         conform              Specify an action taken on rule-conforming 
traffic.
           drop               Conforming traffic should be dropped.
             <policyname>     * Existing Policy to utilize the Drop action
               <classname>    * Existing embedded Class to trigger the Drop 
action
           send               Conforming traffic should be forwarded.
             <policyname>     * Existing Policy to utilize the Forward action
               <classname>    * Existing embedded Class to trigger the Forward 
action
           markdscp           Rewrite this IP DSCP (TOS bits 0x'11111100') 
value.
             <policyname>     * Existing Policy to utilize the Mark action
               <classname>    * Existing embedded Class to trigger the Mark 
action
                 <dscpval>    * One of -> DSCP value within the range 0-63 -or-
                                keyword af12 / af21 / af22 / af31 / af32 / af33 
/ be
                                  cs0 / cs1 / cs2 / cs3 / cs4 / cs5 / cs6 / cs7 
/ ef
           markprec           Rewrite this IP Precedence (TOS bits 
0x'11100000') value.
             <policyname>     * Existing Policy to utilize the Mark action
               <classname>    * Existing embedded Class to trigger the Mark 
action
                 <precval>    * IP precedence value within the range 0-7
         nonconform           Specify an action taken on rule-nonconforming 
traffic.
           drop               Conforming traffic should be dropped.
             <policyname>     * Existing Policy to utilize the Drop action
               <classname>    * Existing embedded Class to trigger the Drop 
action
           send               Conforming traffic should be forwarded.
             <policyname>     * Existing Policy to utilize the Forward action
               <classname>    * Existing embedded Class to trigger the Forward 
action
           markdscp           Rewrite this IP DSCP (TOS bits 0x'11111100') 
value.
             <policyname>     * Existing Policy to utilize the Mark action
               <classname>    * Existing embedded Class to trigger the Mark 
action
                 <dscpval>    * One of -> DSCP value within the range 0-63 -or-
                                keyword af12 / af21 / af22 / af31 / af32 / af33 
/ be
                                  cs0 / cs1 / cs2 / cs3 / cs4 / cs5 / cs6 / cs7 
/ ef
           markprec           Rewrite this IP Precedence (TOS bits 
0x'11100000') value.
             <policyname>     * Existing Policy to utilize the Mark action
               <classname>    * Existing embedded Class to trigger the Mark 
action
                 <precval>    * IP precedence value within the range 0-7
       style                  Configure a Policing Style for limiting forwarded 
traffic.
         simple               Only simple policing is supported.
           <policyname>       * Existing Policy to utilize the Rate Limiting 
action
             <classname>      * Existing embedded Class to trigger the Rate 
Limiting
               <ratelimit>    * Rate limit within the range 1-4294967295 Kbits/s
                 <burstsize>  * Maximum burst size within the range 1-128 KBytes
     rename                   Rename a DiffServ Policy.
       <oldpolicyname>        * Existing Policy name to be renamed
         <newpolicyname>      * New Policy name, up to 31 alphanumeric 
characters

   service                  Configure a DiffServ Service to tie a Policy to a 
Port.
     add                      Add a Policy to a Port.
       in                     Only Ingress policies are supported.
         <port-string>        * Port(s) which should receive this Policy (ex. 
ge.1.1-2)
           <policyname>       * Existing Policy to be added to the port(s)
     remove                   Remove a Policy from a Port.
       in                     Only Ingress policies are supported.
         <port-string>        * Port(s) which should lose this policy (ex. 
ge.1.1-2)
           <policyname>       * Existing Policy to be removed from the port(s)
To display diffserv configuration results, here are some useful commands:
 show diffserv class detailed <classname>
 show diffserv policy detailed <policyname>
 show diffserv service info detailed <port-string> in
To delete DiffServ configurations, remove in order: service commands, policy 
commands, and class commands; then globally disable DiffServ to restore the 
default condition:
 set diffserv service remove in <port-string> <policyname>
 set diffserv policy delete <policyname>
 set diffserv class delete <classname>
 set diffserv adminmode disable
 show config diffserv
DiffServ configuration examples

When using the diffserv command set; one would generally enable DiffServ, 
create a Class, create one or more classification rules within the Class, 
create a Policy, add one or more Classes to it, add Policing 
(Conforming/Non-conforming, Drop/Forward, Rate Limit, Precedence/DSCP Rewrite) 
actions or just Marking (Precedence/DSCP Rewrite) actions to the Policy, and 
then assign the Policy to one or more ports.

This example creates two separate policies:

1.      'policyef' rate-limits ingressed traffic on port fe.1.1 to a maximum of 
100Mb/s, and on the same traffic also rewrites the six DSCP bits to a decimal 
value of 46 for Express Forwarding on layer 3.
2.      'policyaf31' rate-limits ingressed traffic on port fe.1.2 to a maximum 
of 100Mb/s, and on the same traffic also rewrites the six DSCP bits to a 
decimal value of 26 for Flash forwarding on layer 3.

 #diffserv
 set diffserv adminmode enable
 set diffserv class create all classevery
 set diffserv class match every classevery
 set diffserv policy create policyef in
 set diffserv policy class add policyef classevery
 set diffserv policy police style simple policyef classevery 100000 128
 set diffserv policy police action conform markdscp policyef classevery ef
 set diffserv policy create policyaf31 in
 set diffserv policy class add policyaf31 classevery
 set diffserv policy police style simple policyaf31 classevery 100000 128
 set diffserv policy police action conform markdscp policyaf31 classevery af31
 set diffserv service add in fe.1.1 policyef
 set diffserv service add in fe.1.2 policyaf31
This example creates one policy which identifies VOIP traffic (DSCP value 46 or 
32) on ports ge.1.1 through ge.1.10, and drops all other traffic.
 #diffserv
 set diffserv adminmode enable
 set diffserv class create all classVOIP
 set diffserv class match ipdscp classVOIP ef
 set diffserv class match ipdscp classVOIP cs4
 set diffserv policy create policyQOS in
 set diffserv policy class add policyQOS classVOIP
 set diffserv policy police style simple policyQOS classVOIP 1000000 128
 set diffserv policy police action nonconform drop policyQOS classVOIP
 set diffserv service add in ge.1.1-10 policyQOS
See also: 
ent22293<http://knowledgebase.enterasys.com/iview/iview/ui/eserver.asp?id=ent22293>.


--- End Message ---

Reply via email to