CCNP Ont Notes
CCNP Ont Notes
CCNP Ont Notes
4 Apr 2008
Phones
Gatekeepers - Provide call routing (name-address resolution) and C all Admission C ontrol
(C AC , permission granting for call setup)
Call agents - Responsible for call routing, address translation, call setup, etc. in a centralized
call control model
Analog interfaces:
Foreign Exchange Office (FXO) - Faces upstream PSTN; acts like an analog phone
1. Call setup - C all routing, C AC , parameter negotiation (IP addresses, UDP ports, codec)
C all control:
Distributed - H.323 and Session Initiation Protocol (SIP); all functionality is performed by
the end nodes
Centralized - Media Gateway Control Protocol (MGCP); end points rely on centralized call
agent(s) for call routing, C AC , etc.
4. Compression (optional)
The Nyquist theorem states that an analog signal must be sampled at at least twice its highest
frequency to be accurately reconstructed by the receiving end; a 4KHz voice signal is sampled at 8KHz.
Mean Opinion Score (MOS) - humans judge quality relative to an in-person conversation
on a scale of 1 to 5.
C odecs:
G.726 - Adaptive Differential PCM (ADPCM); three possible implementations (r32, r24, r16)
use 32Kbps, 24Kbps, and 16Kbps respectively by sending only 4, 3, or 2 bits per sample
G.722 - Wideband speech encoding; input signal is split into two sub-bands, each encoded
with a modified version of ADPC M; 64Kbps, 56Kbps, or 48Kbps
G.728 - Low Delay Code Exited Linear Prediction (LDCELP); expresses wave shapes of five
samples with 10-bit values; 16Kbps
G.729 - Conjugative Structure Algebraic Code Exited Linear Prediction (CS-ACELP); like
G.728 but with ten samples; 8Kbps
Digital Signal Processors (DSPs) are processors dedicated to processing voice, and are found in
pluggable Packet Voice DSP Modules (PVDMs).
DSP services:
Voice termination
C onferencing
Bandwidth Utilization
Overhead: IP (20 bytes) + UDP (8 bytes) + RTP (12 bytes) = 40 bytes
Overhead can be greatly reduced by using Compressed RTP (cRTP), which requires only 2 bytes (4
bytes with checksum).
Because of the processor overhead involved, cRTP should only be used on slow links.
4. Add the lower layer protocol headers to calculate the total frame size (RTP/UDP/IP or cRTP +
IPsec, etc)
5. C alculate the packet rate (inverse of packetization period) in packets per second
Voice Activity Detection (VAD) detects silence on the line and momentarily stops generating data to
conserve bandwidth.
Survivable Remote Site Telephony (SRST) provides bare VOIP services to branch phones should the
connection to a central C allManager be lost
Available bandwidth
End-to-end delay
Packet loss
Implementing QoS
VOIP
Mission-critical
Interactive applications
Best-effort
"Scavenger" (unimportant)
Best-Effort
Resource Reservation Protocol (RSVP) is used to reserve a minimum amount of bandwidth along an
end-to-end path.
QoS Implementation
Legacy C LI
Modular Q oS C LI (MQ C )
2. QoS policies are linked to traffic classes with the policy-map command
show class-map and show policy-map can be used to verify MQC configurations.
AutoQ oS
Perceived bandwidth must be configured accurately on interfaces with the bandwidth statement.
First generation AutoQoS is configured with auto qos voip on an interface, only automating QoS
configuration for VOIP traffic.
Modern (Enterprise) AutoQoS is configured with auto discovery qos to enable NBAR traffic analysis
and auto qos for policy construction.
SDM Q oS W izard
The SDM Wizard is a GUI frontend for QoS configuration using three built-in classes (VOIP, business-
critical, and best-effort).
Ethernet 802.1Q /p
1-bit Discard Eligibility (DE) and Cell Loss Priority (CLP) flags determine whether the frame/cell is a
candidate for being dropped in the event of congestion.
MPLS EXP
The MPLS EXP field is 3 bits wide, compatible with the IP Precedence/DSC P field.
IP DSCP
The original IP specification (RFC 791) used only a 3-bit precedence value in the 8-bit Type of Service
(ToS) field.
Modern IP QoS examines the ToS field as a 6-bit Differentiated Services Code Point (DSCP); the
remaining two bits are used for Explicit Congestion Notification (ECN).
A per-hop behavior (PHB) is the QoS action taken at one node in a path.
PHB types:
Class selector - 3 least significant DSC P bits are set to 0; equivalent to IP precedence/ToS
A ssured Forwarding (A F) - 3 most significant bits set to 001, 010, 011, or 100; AF1
through AF4 used for guaranteed bandwidth
Expedited Forwarding (EF) - 5 most significant bits set to 10111 (decimal 46); best
unreserved class of service, used to provide minimal delay
Each of the four AF classes are broken into three groups: low (010), medium (100), and high (110) drop
preference.
Lower AF drop preference provides better quality of service within each AF class.
Trust Boundaries
Trust boundaries are formed to determine where QoS markings should be evaluated (trusted). This
prevents a user from inadvertently or maliciously marking his own traffic as more favorable.
The trust boundary can be established at an end system (such as an IP phone), access switch, or
distribution switch.
Traffic classification
NBAR limitations:
Requires C EF
NBAR identifies upper-layer protocols using expandable Packet Description Language Modules
(PLDMs).
C onfiguring NBAR
Add a PDLM:
Use in QoS:
Verification:
Each physical interface has hardware and software queuing mechanisms; software queues are only
used when the hardware queue is congested.
Tail-drop occurs when all queues are full and a packet is dropped.
Hardware queue sizes can be configured with tx-ring-limit and verified with show controllers
<interface>.
Simple Queuing
First-In-First-O ut (FIFO )
Packets are transmitted in the order they are received with no preference (no QoS).
All packets in a higher priority queue will be processed before any packets in a lower priority queue.
Lower priority queues can be starved if higher priority queues consume all available bandwidth.
All queues are equal priority; one packet is taken from each queue per cycle.
Round robin does not provide for traffic prioritization, and queues with larger packets will consume more
bandwidth than queues with smaller packets.
WFQ queues are created per flow and are not configurable.
Each flow is assigned to a dynamic FIFO queue by source/destination IP address, protocol number, ToS
value, or source/destination port number.
The maximum number of dynamic queues is configurable between 16 - 4096 (256 by default).
Packets are dropped from aggressive flows more frequently than from less aggressive flows.
The hold queue is the sum of all memory available to the WFQ system; all packets are aggressively
dropped while the hold queue is full.
Each queue has a Congestive Discard Threshold (CDT) which allows for early dropping of packets
before the queue is completely full.
Queue information can be viewed with show interface or show queue <interface>.
The default queue named class-default is always present and will match all traffic not matched by
other queues.
Bandwidth can be allocated in Kbps, percentage, or remaining percentage. All classes within a policy
map must use the same unit of measure (Kbps or percentage).
The default maximum reserved bandwidth is 75%; this can be modified with max-reserved-bandwidth
(applied to the interface).
Fair queuing (instead of FIFO) can be enabled for the default class with fair-queue followed by the
maximum number of dynamic queues.
The queue size for each class can be adjusted with queue-limit.
C onfiguration example:
The priority queue is policed to a certain bandwidth to prevent starvation of other queues.
Priority queues are created under a class with priority <bandwidth> or priority percent
<percentage>.
C onfiguration example:
TCP global synchronization occurs when tail dropping of packets forces flows to cycle between small
and large windows.
TCP starvation occurs when stateless protocols like UDP fill available queue space before the throttled
TC P flows.
The rate of drop increases as the queues nears its maximum size.
C onfiguration parameters:
Mark Probability Denominator (MPD) - An integer specifying the base probability of drop
WRED is RED with the added capability of favoring prioritized traffic, based on the IP precedence or
DSC P.
Each precedence/DSC P value can be configured with a unique MPD and minimum and maximum
thresholds.
C onfiguration example:
policy-map Foo
class Precedence_Based_WRED
bandwidth 100
random-detect
class DSCP_Based_WRED
bandwidth 100
random-detect dscp-based
Policing
Traffic which exceeds the policed threshold can be dropped or remarked to a lower QoS.
Purposes:
Enforcing subrate access; limiting available bandwidth to less than that of the physical
interface
Shaping
Purposes:
Shaping can be configured to respond to network conditions and signals, such as frame relay Backward
Explicit Congestion Notifications (BECNs).
Layer 2 payload compression is implemented on a link-by-link basis, and compresses the entire layer 2
payload.
C ompression introduces a processing delay, but reduces serialization delay and increases available
bandwidth.
Header C ompression
Header compression can be used with TC P or RTP. Only headers are compressed, not payload.
Large frames are fragmented and interleaved with smaller, high-priority frames to reduce jitter.
QoS preclassification is needed when other aspects (such as source and destination address or port)
must be evaluated for the application of a QoS policy.
Preclassification creates a copy of the original (inner) packet header for the egress interface to
reference when QoS is performed on the encapsulated (outer) packet header.
A service policy applied to a physical interface affects all tunnels originating from that interface.
interface Serial0
ip address 10.0.0.1 255.255.255.252
service-policy WAN
!
interface Tunnel0
ip address 192.168.0.1 255.255.255.252
tunnel source serial0
tunnel destination 10.0.0.2
crypto map VPN
qos pre-classify
!
crypto map VPN 10 ipsec-isakmp
...
qos pre-classify
C onfiguring C oPP:
class-map Telnet
match access-group 100
!
policy-map Telnet_Access
class Telnet
police 8000 conform transmit exceed drop
!
control-plane
service-policy input Telnet_Access
!
access-list 100 permit tcp any any eq telnet
AutoQoS Enterprise:
Two deployment stages: traffic discovery via NBAR, and policy implementation
Discovery results (even unfinished) can be viewed with show auto discovery qos.
After the discovery phase has completed, AutoQoS is enabled per interface:
The voip keyword forces legacy AutoQoS (VOIP only).
Verification:
show auto qos - Displays the auto-generated AutoQoS class and policy maps
show policy-map interface - Displays applied policy map and QoS parameters for each
interface
The default C oS-to-DSC P mappings can be modified with mls qos map.
Verification:
show mls qos interface <interface> - Displays QoS parameters for an interface
show mls qos maps - Displays the C oS-to-DSC P mappings used by AutoQoS
Even with auto discovery, AutoQoS may not fit some scenarios
Platinum - Voice
Gold - Video
Bronze - Background
802.11e priorities can be mapped to WMM access categories for backward compatibility:
WMM 802.11e
Platinum 6 and 7
Gold 4 and 5
Silver 0 and 3
Bronze 1 and 2
802.11e and WMM use Enhanced DCF (EDCF) to provide proportional back-off window sizes for each
class.
Split-MAC Architecture
The split-MAC architecture separates MAC services to real-time and non-real-time functions.
Beacon generation
Probe transmission/response
Power management
802.11e/WMM QoS
Encryption/decryption
Packet buffering
Non-real-time functions are handled by a centralized Wireless LAN Controller (WLC):
C lient association/disassociation
802.1x EAP
Key management
Lightweight Access Point Protocol (LWAPP) provides tunneling between LAPs and a WLC .
802.11e/WMM QoS values are translated to DSC P values on the LWAPP packet header to ensure
end-to-end QoS.
Wireless Security
Wired Equivalent Privacy (WEP) was the first implementation of wireless encryption, and has several
drawbacks:
Dynamic keys
Wi-Fi Protected Access (WPA) was developed by the Wi-Fi Alliance Group as an interim non-proprietary
solution to replace WEP.
IEEE 802.11i (also known as WPA2) was released after WPA, but required a hardware upgrade to
implement the stronger AES encryption.
IEEE 802.1x
802.1x provides port-based network access control.
802.1x is used in conjunction with Extensible Authentication Protocol (EAP) to secure wireless LANs.
C isco LEAP
EAP-FAST
Phase 1 - C lient establishes a secure tunnel with the AAA server using PAC
EAP-TLS
PEAP
Protected EAP (PEAP) only requires the authentication server to have a certificate.
C lient authentication can be performed using Generic Token Card (GTC) (called PEAP-GTC ) or
Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) version 2 (PEAP-MSC HAPv2).
C isco LEAP EAP-FAST EAP-TLS PEAP-GTC PEAP-MSC HAPv2
Active Directory auth Yes Yes Yes Yes Yes
LDAP auth No Yes Yes Yes No
OTP auth No No Yes Yes No
Novell NDS auth No No Yes Yes No
Requires server cert No No Yes Yes Yes
Requires client cert No No Yes No No
Windows single sign-on? Yes Yes Yes No Yes
Fast secure roaming? Yes Yes No No No
WPA/WPA2 Yes Yes Yes Yes Yes
WPA
WPA performs authentication using either 802.1x/EAP or with preshared keys.
First-generation WPA uses Temporal Key Integrity Protocol (TKIP), which is based on the same RC 4
encryption used by WEP, and Message Integrity Code (MIC).
IEEE 802.11i (also known as WPA2) was released shortly after WPA.
WPA2 uses C C MP to implement AES encryption; old WPA hardware typically cannot support the
stronger AES encryption, requiring a hardware upgrade.
Client devices
WLC s include the 4400 and 2000 models, as well as the C atalyst 6500 Wireless Services Module (WSM)
and ISR and C atalyst 3750 integration.
WLAN Implementation
Wireless LANs can be implemented with either autonomous or lightweight access points:
A Wireless LAN Solution Engine (WLSE) and Wireless Domain Services (WDS) server can be used to
provide centralized management of autonomous APs.
Management Solutions
W LSE
Two versions:
WCS
Three versions:
WCS Base