Filter&Qo S
Filter&Qo S
Filter&Qo S
The software described in this document is furnished under a license agreement and may
be used only in accordance with the terms of that license.
Trademarks
Nortel, the Nortel logo, the Globemark, Unified Networks, PASSPORT and BayStack are
trademarks of Nortel Networks.
Table of Contents
1. OVERVIEW: R-MODULE FILTER SPECIFICATIONS ................................................... 4
1.1 ACCESS CONTROL TEMPLATES (ACT) ................................................................................ 5
1.2 ACCESS CONTROL ENTRY (ACE) ........................................................................................ 7
1.3 ACCESS CONTROL LISTS (ACL) ........................................................................................ 10
2. CONFIGURING ACLS.......................................................................................................... 11
2.1 ACT – ACCESS CONTROL TEMPLATES .............................................................................. 11
2.2 ACL .................................................................................................................................. 13
2.3 ACE – ACCESS CONTROL ENTRY ...................................................................................... 16
3. R-MODULE QUEUING......................................................................................................... 20
3.1 OVERVIEW......................................................................................................................... 20
3.2 DEFAULT PACKET QOS TO EGRESS QUEUE MAPPING ....................................................... 21
3.3 DEFAULT INGRESS P-BIT TO INTERNAL QOS LEVEL AND EGRESS QUEUE MAPPING .......... 22
3.4 GIGABIT ETHERNET DEFAULT INGRESS DSCP TO EGRESS QUEUE MAPPING .................... 22
3.5 EGRESS TRAFFIC SHAPING ................................................................................................ 23
3.6 QUEUE SET CONFIGURATION COMMANDS ........................................................................ 26
4. INGRESS TRAFFIC POLICING ......................................................................................... 32
4.1 POLICING CONFIGURATION ............................................................................................... 33
5. QOS CONCEPTS.................................................................................................................... 35
5.1 CHANGING THE DIFFSERV PORT TYPE .............................................................................. 35
5.2 L2 AND L3 TRUSTED AND UNTRUSTED PORTS .................................................................. 35
5.3 QOS FOR R-MODE MODULES ............................................................................................ 45
5.4 CHANGING THE DEFAULT PORT OR VLAN QOS LEVELS .................................................. 46
5.5 ADDING A MAC QOS LEVEL............................................................................................. 47
6. CONFIGURATION EXAMPLES ......................................................................................... 48
6.1 CONFIGURATION EXAMPLE 1: MARKING AND DROPPING TRAFFIC ................................... 48
6.2 CONFIGURATION EXAMPLE 2: FILTER RANGES AND POLICING.......................................... 58
6.3 CONFIGURATION EXAMPLE 3: SETTING EGRESS QUEUE WEIGHT AND SHAPING RATE ..... 62
6.4 CONFIGURATION EXAMPLE – CHANGING EGRESS PORT SHAPER ...................................... 66
6.5 CONFIGURATION EXAMPLE – DENY ARP/MAC SPOOFING ATTACK IN A LAYER 2
ENVIRONMENT ............................................................................................................................... 67
6.6 CONFIGURATION EXAMPLE – DOS ATTACKS .................................................................... 72
7. APPENDIX A – CONFIGURATION FILES ....................................................................... 81
7.1 FROM EXAMPLE 6.1........................................................................................................... 81
7.2 FROM EXAMPLE 6.2........................................................................................................... 81
7.3 FROM EXAMPLE 6.3........................................................................................................... 82
7.4 FROM EXAMPLE 6.4........................................................................................................... 82
7.5 FROM EXAMPLE 6.6........................................................................................................... 82
8. APPENDIX B – PRE-DEFINED ACT LIST ........................................................................ 84
9. APPENDIX C – QOS DETAILS ........................................................................................... 85
9.1 ETHERNET 802.1Q TAG IN ETHERNET HEADER ................................................................. 85
9.2 DIFFSERV: QOS AT LAYER 3 ............................................................................................. 86
9.3 ERS 8600 DSCP TOS/IP MAPPING ................................................................................... 86
10. APPENDIX D – HARDWARE OVERVIEW....................................................................... 87
List of Figures
Figure 1: ACT, ACL, and ACE Relationship...........................................................................4
Figure 2: Egress Traffic Shaping ..........................................................................................23
Figure 3: Ingress Policing (L2-L7) ........................................................................................32
Figure 4: DiffServ Network Model.........................................................................................35
Figure 5: Diffserv Access Mode – 802.1p Override..............................................................38
Figure 6: DiffServ Core Mode – 802.1p Override Enabled ..................................................39
Figure 7: DiffServ Core Ports – 802.1p Override Disable ....................................................40
Figure 8: DiffServ Access Mode – 802.1p Override Disabled..............................................41
Figure 9: DiffServ Disabled...................................................................................................42
Figure 10: Access Control Lists............................................................................................43
Figure 11: Access Control Lists Continued ..........................................................................44
Figure 12: Example 1 Diagram.............................................................................................48
Figure 13: Filter Ranges and Policing ..................................................................................58
Figure 14: Deny ARP/MAC Spoofing Attack ........................................................................67
Figure 15: 802.1Q Ethernet Header .....................................................................................85
Figure 16: DiffServ Code Point.............................................................................................86
List of Tables
Table 1: ACT Attributes........................................................................................................6
Table 2: Global ACL Actions ...............................................................................................8
Table 3: Ethernet Interface Type Default Internal QoS Mapping ...................................21
Table 4: Default p-bit Interface Internal QoS Level and Egress Queue Mapping ........22
Table 5: L2 and L3 Trusted Port Actions .........................................................................36
Table 6: L2 and L3 Untrusted Port Actions......................................................................37
Table 7: L2 Trusted and L3 Untrusted Port Actions .......................................................37
Table 8: L2 Untrusted and L3 Trusted Port Actions .......................................................37
Table 9: QoS Features Supported ....................................................................................45
Table 10: PP8600 DSCP ToS/IP Mapping .........................................................................86
VLAN Port
ACT-1 ACT-2
ACE-N ACE-N
ACE-3 ACE-3
ACE-2 ACE-2
ACE-1 ACE-1
ACE has list
of ports and MLTs
ACLs are supported for both ingress and egress and can be applied to a port or a
VLAN. Hence, four types of ACLs are supported, two for ingress port or VLAN and
two for egress port or VLAN. Up to 2000 ACEs can be configured per port for
ingress and egress (1000 VLAN and 1000 port).
An ACL is made up of a list of filter rules called Access Control Entry’s (ACEs) that
define a pattern found in a packet with a desired behavior for these packets. An
ACE supports various operations such as range, equal, greater, less, not, wildcard
or pattern match. As a packet comes through an interface configured with an ACL,
the matching ACEs are scanned for that packet and the corresponding actions for
those ACEs are applied according to their precedence.
Field Description
header
udpSrcportBegin Beginning of the source port field in the UDP
header
udpDstportBegin Beginning of the destination port field in the
UDP header
etherEnd End of ethernet header
ipHdrEnd End of ip header (after ip options and padding)
icmpMsgBegin Beginning of the ICMP header (type field in the
icmp msg header)
tcpEnd End of tcp header
updEnd End of udp header
Offset Set the offset in bits to the beginning offset of the user-defined field
with the selected header option as a base. Valid values here are
from 0-76800.
Length Sets the number of bits to extract from the beginning of the offset.
Valid values here are from 1-56.
Example 2:
ACE 1 - mode deny, actions mirror
ACE 2 - mode permit, actions - police
Example 3:
ACE 1 - mode permit, actions - police
ACE 2 - mode deny, actions - mirror
ACE 3 - mode permit, actions - police, mirror
ACE 4 - mode permit, actions remark-dscp
Example 4:
ACE 1 - mode permit, actions - police
ACE 2 - mode deny, actions - mirror
ACE 3 - mode permit, actions - mirror, stop-on-match
ACE 4 - mode permit, actions remark-dscp
Example 2:
Port ACL:
ACE 1: mode permit, action - police
Vlan ACL :
ACE 1 : mode permit, action – police
ACE 2 : mode permit, action remark-dscp
We apply the actions of port ACL and actions of ACE 2 of VLAN ACL.
Example 3 :
Port ACL:
ACE 1: mode permit, action - police
Vlan ACL :
ACE 1 : mode permit, action - police, remark-dscp
2. Configuring ACLs
To configure an ACL, you need to configure the following items in the following
order:
1. Create an ACT or use one of the pre-defined ACT’s
2. Create an ACL using an ACT from Step 1 above.
3. Add the appropriate ACE’s to the ACL created in Step 2 above.
Field Description
IpAttrs Specifies one or more of the following IP attributes:
• none
• scrip
• dstip
• ipFragFlag
• ipOptions
• ipProtoType
• dscp
ProtocolAttrs Specifies one or more of the following protocol
attributes:
• none
• tcpSrcPort
• udpSrcPort
• tcpDstPort
• udpDstport
• tcpFlags
• icmpMsgFlags
Example:
CLI:
For example, assume we wish to add a new ACT to select src and dst MAC,
EtherType, VLAN and VLAN priority.
• Passport-8610:5# config filter act 10 create
• Passport-8610:5# config filter act 10 ethernet srcMac, dstMac,
etherType, vlan, vlanTagPrio
• Passport-8610:5# config filter act 10 apply
Device Manager:
Via Security>Advanced L2-L7 Filter>ACL>ACT>Insert
2.2 ACL
The next step is to create an ACL. This can be accomplished by entering the
following command:
CLI:
• Passport-8610:5# config filter acl <acl-id 1-4096> ?
Sub-Context: ace port set vlan
Current Context:
create <type> act <value> [name <value>]
delete
disable
enable
info
name <value>
• Passport-8610:5# config filter acl <acl-id 1-4096> create ?
create an access control list
Required parameters:
<type> = {inVlan|outVlan|inPort|outPort}
act <value> = access control template ID {1..4096}
Optional parameters:
name <value> = access control list descriptive name {string length
0..32}
Command syntax:
create <type> act <value> [name <value>]
Device Manager:
Via Security>Advanced L2-L7 Filter>ACL>ACL>Insert
Where:
Field Description
AclId Specifies a unique identifier for the ACL entry in the range from
1-4096.
ActId Specifies a unique identifier for the ACT entry in the range from
1-4096.
Type Specifies whether the ACL is VLAN or port-based. Valid
options here are:
• inVlan
• outVlan
• inPort
• outPort
Note: The inVlan and outVlan ACL types drop packets if the
VLAN is added after ACE creation. For VLAN-based filters, you
should ensure that the ACE configuration is set to all of the R
module slots, irrespective of the VLAN's port membership on a
slot.
Name Specifies a descriptive, user-defined name for the ACL entry.
VlanList Identifies an array used to indicate all the VLANs associated
with the ACL entry. Currently, only 4000 VLANs are supported
in the ERS 8000 Series v4.0 software.
PortList Specifies the ports to be added to the ACL entry.
DefaultAction Specifies the action to be taken when none of the ACEs in the
ACL match. Valid options are deny and permit, with permit as
the default.
GlobalAction Indicates action is applied to all ACEs that match in an ACL.
Valid options here are:
• none
• mirror
• count
• mirror-count
State Enables or disables all of the ACEs in the ACL. The default
value is enable
AceListSize Specifies the number of ACEs in a particular ACL.
Example:
CLI:
Continuing from the example in Section 2.1, enter the following to add an ACL
using the ACT from Section 2.1 assuming we wish to filter on ingress ports 8/29
and 8/30:
• Passport-8610:5# config filter acl 10 create inPort act 10
• Passport-8610:5# config filter acl 10 port add 8/29-8/30
Device Manager:
Via Security>Advanced L2-L7 Filter>ACL>ACL>Insert
• Passport-8610:5# config filter acl <acl-id 1-4096> ace <ace-id 1-1000> arp
?
Sub-Context:
Current Context:
NOTE: Up to three ACT patterns can be applied to an ACL. If more than three
ACT patterns are required, you can combine a VLAN and a Port ACL to have
up to six patterns.
remark-dscp <value> = new phb and dscp for matching packets {0..256} or
{0x0..0x100} or {disable|phbcs0|phbcs1|phbaf11|phbaf12|
phbaf13|phbcs2|phbaf21|phbaf22|phbaf23|phbcs3|phbaf31|
phbaf32|phbaf33|phbcs4|phbaf41|phbaf42|phbaf43|phbcs5|
phbef|phbcs6|phbcs7}
Command syntax:
action <mode> [mlt-index <value>]
[remark-dscp <value>] [remark-dot1p <value>]
[police <value>] [redirect-next-hop <value>]
[unreachable <value>] [egress-queue <value>]
[stop-on-match <flag>] [egress-queue-nnsc <value>]
Where:
Field Description
AclId Specifies a unique identifier for the ACL entry in the range from
1-4096.
ActId Specifies a unique identifier for the ACT entry in the range from
1-4096.
ACE Advanced
Ace-op Specifies the operators for the ACE pattern used when an ACT
pattern is configured. The custom-filter<1-3>-name selects the
ACT pattern name configured.
Field Description
ACE IP, ACL
Dscp Specifies phb name or dscp value {0..256} or {disable|phbcs0|
phbcs1|phbaf11|phbaf12|phbaf13|phbcs2|phbaf21|phbaf22|
phbaf23|phbcs3|phbaf31| phbaf32|phbaf33|phbcs4|phbaf41|
phbaf42|phbaf43|phbcs5|phbcs6|phbef|phbcs7}
3. R-Module Queuing
3.1 Overview
R-modules, by default, have two reserved and pre-configured egress queue
templates based on Nortel Networks Service Classes (NNSC) – please see
http://www.nortelnetworks.com/products/02/bstk/switches/bps/collateral/56058.25_
022403.pdf. In the 4.0 release, one template has 8 queues while the other has up
to 64 queues. In addition to this, a user can add individual egress queue templates
to any port. Overall, the following explains the queue options pertaining to the type
of I/O module used:
• I/O modules with 1 egress port per LANE can utilize all 640 elementary
queues. In the 4.0 software release, 64 out 640 queues per 10GE port are
used. This would apply to the 8683XLR (3-port 10GE) and 8683XZR (3-
port 10GE).
• I/O modules with more than 1 port, but no more than 10 ports per lane can
utilize up to 64 elementary queues per port. This would apply to the
8630GBR (30-port GE) I/O module.
• I/O modules with more than 10 ports per lane support 8 elementary queues
per port. This would apply to the 8648GTR (48-port 10/100/1000) I/O
module.
Each queue within the egress queue is further broken down to one of three queue
styles.
• High Priority Group
o Queues in this group have the highest precedence over other
queues in other groups and are serviced first
o Strict priority is used
o Queues belonging to this group are numbered from queue index
63 and decrements
o Any packet in queue 63 will be serviced first followed by queue 62
in this order
o On trusted ports, incoming packets with 802.1p = 6 or DSCP
CS5/EF are placed in queue 62 by default
o A maximum rate can be configured on a high priority queue to
avoid bandwidth monopoly
• Balanced Queuing Group (Weighted Round Robin)
o Balanced queues are serviced second after traffic from the high
priority queues are serviced
o Queues belonging to the balanced group are serviced by a
weighted round robin scheduler
o Each balanced queue has a minimum rate and maximum rate
where the minimum rate provide a guarantee bandwidth while the
maximum rate provide a maximum rate if no data is serviced on
other queues
o The sum of all minimum rates configured on all queues cannot
exceed 100% - line rate of the port
o Minimum rates are not applicable to High Priority Groups or Low
Priority Groups
QoS to Egress Queue Mapping, regarding the default queue size in pages per
egress queue. The default setting can be changed by using the commands shown
in section 3.5.2.
3.5.4 Statistics
Two hardware counters are maintained per every elementary egress queue. These
two counters are total pages and dropped pages where each page represents 512
bytes per page. Hence, for example, a 64 byte packet will consume a 512 byte
memory page.
It should be noted that statistics precision makes it difficult to compare actual
queue output as the statistics does count bytes. If we consider packet sizes fewer
than 512 bytes, each packet will be displayed as one page. However, for packets
greater than 512 bytes, the actual number of pages will be greater than the number
of frames. Taking in consideration the backplane overhead, 512 byte packets will
actually take two pages where each cell holds 144 or 148 bytes of data depending
on whether packer header extension is present.
The statistics can be viewed by using the commands below:
• Passport-8610:5# show qos stats egress-queue-set ?
Sub-Context:
Current Context:
all [verbose]
egress-queue-set <id> [verbose]
port <ports> [verbose]
Example
• Passport-8610:5# show qos stats egress-queue-set egress-queue-set
2
==================================================================
R-Module QOS Shapers Stats Table
==================================================================
Port Qid Total pages Dropped pages Utilization
(512 bytes per page) (512 bytes per page) %
------------------------------------------------------------------
8/1 0 0 0 0
8/1 1 0 0 0
8/1 2 0 0 0
8/1 3 0 0 0
8/1 4 0 0 0
8/1 55 0 0 0
8/1 62 0 0 0
8/1 63 0 0 0
8/2 0 0 0 0
8/2 1 0 0 0
8/2 2 0 0 0
8/2 3 0 0 0
8/2 4 0 0 0
8/2 55 0 0 0
8/2 62 0 0 0
8/2 63 0 0 0
etc.
3.5.5 WRED
In release 4.0, WRED is not supported. WRED will be added in release 4.1.
apply
create qmax <value> [balanced-queues <value>] [hipri-
queues <value>] [lopri-queues <value>] [name <value>]
delete
info
name <value>
NOTE: To take advantage of using a new queue set, ACL’s must be used. The
ACL must be configured with an ACE where upon a filter match; you must select
the queue number.
3.6.1.1 Adding a new Queue Set Configuration Example
For example, let’s assume we wish to create a new queue template, queue-set 3,
with the following number of queues and no shaping:
• Hi priority queues: 1
o Max-rate = 5%
• Low priority queues: 1
o Min-rate = 0%, Max-rate = 100%
• Balance queue: 8
o Queue’s 0, 1, and 2: Min-rate = 10%, Max-rate = 100%
o Queue 3: Min-rate = 20%, Max-rate = 100%
o Queue’s 4 and 5: Min-rate = 15%, Max-rate = 100%
o Queue’s 6, 7 and 5: Min-rate = 15%, Max-rate = 100%
o Queue 55: Max-rate = 100%
o Queue 63: Max-rate = 5%
Finally, to add port members to the queue set, enter the following command:
• Passport-8610:5# config qos egress-queue-set 3 port add <ports>
Device Manager:
To add a new queue set, follow the instructions below.
Via QoS>Egress Queue Set>Insert
After this queue set has been configured, queue numbers 0 to 8 will automatically
be assigned to the balanced queues, queue numbers 63 will be assigned to the
high queues, and queue number 55 to the low queues.
To change the individual queue setting, follow the instructions below.
Via QoS>Egress Queue Set>Select Queue Set 3>Queue
==========================================================================
R-Module QOS Shapers Table
==========================================================================
TemplateID Name Total Qs BalQs Hi-priQs lo-priQs Ports
--------------------------------------------------------------------------
1 NNSC8 8 5 2 1
2 NNSC64 8 5 2 1 8/1-8/28
3 set-3 10 8 1 1 8/29-8/30
==========================================================================
R-Module QOS Shapers Table
==========================================================================
TemplateID Name Total Qs BalQs Hi-priQs lo-priQs Ports
--------------------------------------------------------------------------
3 set-3 10 8 1 1 8/29-8/30
==========================================================================
R-Module QOS Shapers Table
==========================================================================
TemplateID Name Total Qs BalQs Hi-priQs lo-priQs Ports
--------------------------------------------------------------------------
3 set-3 10 8 1 1 8/29-8/30
==========================================================================
R-Module QOS Shapers Table
==========================================================================
Qid Q-name Q-style min-rate max-rate max-q-length
--------------------------------------------------------------------------
0 Queue-0 Bal 10 100 163
1 Queue-1 Bal 10 100 320
2 Queue-2 Bal 10 100 320
3 Queue-3 Bal 20 100 320
4 Queue-4 Bal 15 100 320
5 Queue-5 Bal 15 100 320
6 Queue-6 Bal 5 100 320
7 Queue-7 Bal 5 100 320
55 Queue-55 low-pri 0 100 320
63 Queue-63 high-pri 0 5 163
20
2 10
E CI
PI
AF CI
2
AF CI
2
B
Discard
Forwarded
dropped
Figure 3: Ingress Policing (L2-L7)
The ERS 8600 R-modules supports up to 450 policers (50 reserved internally)
available per LANE (per 10 GE port or 10 x 1 GE ports; please see Appendix D for
hardware details). Hence, on a ERS 8683XLR, 8683XZR, or 8630GBR up to 1200
(1350 total) policers are supported per I/O module.
The following options are supported:
• CIR: Service rate
• PIR: Peak information rate
• 3 internal colors to remark packets to
o Red (discard right away)
o Yellow (discard if congestion)
o Green (forward)
• Drop precedence in case of internal congestion
Ingress policing is supported on Port ACLs or VLAN ACLs. Port ACLs apply to
individual port based policers which are members of individual LANEs. VLAN ACLs
apply Global policers which are members of all LANEs.
Device Manager:
Via QoS>Policy>Policy>Insert
5. QoS Concepts
5.1 Changing the DiffServ Port Type
The ERS 8000 Series Switch implements a DiffServ architecture as defined in RFC
2474 and RFC 2475. The DSCP and the IEEE 802.1p marking found in VLANs are
both used to mark the packet to its appropriate PHB and QoS level, providing layer
2 and layer 3 QoS functionality.
PP8600
Core
Network
Host A Host B
DiffServ DiffServ
core port core port
DiffServ DiffServ
access port access port
IP bridged or routed Ignore packet DSCP and 802.1p Remark DSCP based on QoS to
values. Assign QoS level based DSCP egress map.
on MAC/Port/ VLAN setting.
Send to the appropriate egress
queue.
Non-IP Ignore packet DSCP and 802.1p Remark 802.1p based on QoS to
values. Assign QoS level based 802.1p egress map.
on MAC/Port/ VLAN setting.
Send to the appropriate egress
queue.
Tagged Examine packet 802.1p value, Keep original 802.1p and DSCP
assign QoS level based on values.
ingress 802.1p to QoS mapping.
Send to the appropriate egress
queue.
Untagged Assign QoS level based on Mark 802.1p based on QoS to
MAC/Port/VLAN setting. Send 802.1p egress map. Keep
to the appropriate egress original DSCP value.
queue.
IP bridged or routed Examine packet DSCP value, Keep original DSCP value. Mark
assign QoS level based on 802.1p based on QoS to 802.1p
ingress DSCP to QoS mapping. egress map.
Send to the appropriate egress
queue.
Non-IP Assign QoS level based on Mark 802.1p based on QoS to
MAC/Port/VLAN setting. Send 802.1p egress map.
to the appropriate egress
queue.
p-bit untrusted
DSCP untrusted
DiffServ enabled
DiffServ Access port
802.1p-override true
no
yes
MAC QoS
level defined?
no
yes **Mark
IP?
DSCP
Done
p-bit untrusted
DSCP trusted
enable-diffserv = true
access-diffserv = false
802.1p-override enable
(DiffServ core port)
no
yes
IP?
no
Done
no
no
IP?
yes
yes yes no
Done
p-bit trusted
DSCP untrusted
enable-diffserv = true
access-diffserv = true
802.1p-override disable
(DiffServ access port)
no
yes
Ingress Packet
Tagged?
no
Done
DiffServ disable
no
p-bit
yes
override
enable?
no Use ingressmap to
assign internal
yes QoS by honoring
Packet
incoming 802.1p bits
Tagged?
for both routing and
no bridging traffic
> Port QoS level
no
If egress port is tagged, use egress QoS to p-bit mapping table to remark p-bit
yes
Action no
Police?
yes
No
No
Admit Packet
Remark no
DSCP?
yes
Remark No
Remark DSCP
802.1p?
yes
No Remap No
Remark
Remark 802.1p Egress Normal QoS
802.1p?
Queue?
Yes Yes
Remark 802.1p
No
r-mode <true|false>
m-mode <true|false>
enhanced-operational-mode <true|false>
vlan-optimization-mode <true|false>
info
• Passport-8610:5# config sys set flags r-mode true
• Passport-8610:5# save config
• Passport-8610:5# boot -y
6. Configuration Examples
6.1 Configuration Example 1: Marking and Dropping
Traffic
Server 1
VLAN 200
10.1.1.2
PP8600
Server 2
10.1.1.3
Hosts
3. Select Protocol Attributes of TCP source port, TCP destination port, and
UDP destination port
• Passport-8610:5# config filter act 1 protocol
tcpSrcPort,tcpDstPort,udpDstPort
4. Enable ACT 1
• Passport-8610:5# config filter act 1 apply
B. Create ACL 1:
1. Create ACL 1 with type of ingress VLAN:
• Passport-8610:5# config filter acl 1 create inVlan act 1
2. Add ingress VLAN of 200 to ACL 1:
4/24 0 0
4/25 6640253 424976192
4/26 0 0
4/27 0 0
4/28 0 0
4 4/19 50324 3220736
4/22 0 0
4/24 0 0
4/25 219688530
14060065920
4/26 0 0
4/27 225213301
14413651264
4/28 0 0
Displayed 28 of 28 entries
3. Finally, via the main ACT window, under the Apply icon, select true. This
step must be complete prior to configuring the ACL.
C. Create ACL 1:
Via the ACL main window, click on the ACL tab and click on Insert. Unless you
wish to change the ACL id, leave the default setting which should default to 1 if
this is the first ACL configured. Next, configure the following
• ActId: Select (1) ACT-1
• Type: inVlan
• Name: ACL-1 (if using the default name)
View Commands:
To view the default QoS Ingress mapping, use the following command:
• Passport-8610:5# show qos ingressmap ?
Sub-Context:
Current Context:
1p [<ieee1p>]
ds [<dscp>]
To view the default QoS Egress mapping, use the following command:
• Passport-8610:5# show qos egressmap ?
Sub-Context:
Current Context:
1p [<level>]
ds [<level>]
To view the default internal QoS to Egress Queue mapping, use the following
command:
• Passport-8610:5# show qos config eqmap <slot number>
To view the QoS level and shaper table, enter the following command:
• Passport-8610:5# show qos config egress-queue-set egress-queue-set
<1..386> queues
Where queue 1 is the default queue set for the 10/100/1000 I/O module and queue
2 is the default queue set for the GigE and 10 GigE I/O modules. For example, to
view the GigE default queue set, enter the following command:
• Passport-8610:5# show qos config egress-queue-set egress-queue-set 2
queues
PP8600
7/29
VLAN 2
7/30
NOTE: The Lane Members in this example is 7:3 as the ERS 8630 module for
this configuration example is located in slot 7 using port members 7/29 and
7/30. Please see Section 4 for more details.
B. Create a new ACT to filter on UDP dst-port and TCP dst-port:
1. Create a new ACT with ID = 1
• Passport-8610:5# config filter act 1 create
3. Enable ACT 1
• Passport-8610:5# config filter act 1 apply
C. Create ACL 1:
1. Create ACL 1 with type of ingress VLAN:
• Passport-8610:5# config filter acl 1 create inVlan act 1
2. Add ingress VLAN of 2 to ACL 1:
• Passport-8610:5# config filter acl 1 vlan add 2
NOTE: The Lane Members in this example is 7:3 as the ERS 8630 module
for this configuration example is located in slot 7 using port members 7/29
and 7/30. Please see Section 4 for more details.
B. Create ACT 1
Create a new ACT to filter on UDP src-port and TCP src-port.
1. Go to Security, click on Advanced L2-L7 Filter, and select ACL. When
prompted with the ‘NOTE: Filter configuration of R-modules only’ dialog
box, click on OK.
2. Via the ACT tab, click on Insert. You can add an ACT number and name if
you wish for just leave the default settings. The default name in this case
should be ACT-1 – this name will be used in step B when configuring the
ACL. Next, check of the following items:
• ProtocolAttrs: tcpSrcPort and udpSrcPort
• Click on Insert when completed
3. Finally, via the main ACT window, under the Apply icon, select true. This
step must be complete prior to configuring the ACL.
C. Create ACL 1:
Via the ACL main window, click on the ACL tab and click on Insert. Unless you
wish to change the ACL id, leave the default setting which should default to 1 if
this is the first ACL configured. Next, configure the following:
• ActId: Select (1) ACT-1
• Type: inVlan
• Name: ACL-1 (if using the default name)
• VlanList: select (2) VLAN-2
• DefaultAction: permit
• GlobalAction: none
• State: enable
• Click on Insert when completed
• Oper: eq
• Port: 20-21
• Click on Insert when completed
3. Enable all ACE’s
Via the ACE Common tab, make sure all ACE’s are enabled via the
AdminState tab.
===========================================================================
R-Module QOS Shapers Table
===========================================================================
Qid Q-name Q-style min-rate max-rate max-q-length
---------------------------------------------------------------------------
0 Platinum Bal 10 100 163
1 Gold Bal 10 100 163
2 Silver Bal 5 100 327
3 Bronze Bal 15 100 327
4 Standard(Default) Bal 5 100 980
55 Custom low-pri 0 100 980
62 Premium high-pri 0 50 163
63 Critical/Network high-pri 0 5 163
The min-rate shown also represents the queue weight associated for each CoS
upon congestion.
For this example, we wish to change the default settings for all Gigabit Ethernet
ports for Platinum, Gold, Silver, Bronze CoS. Overall; we wish to accomplish the
following:
• Assign Queue weight for Platinum to 40%
• Assign Queue weight for Gold to 25%
• Assign Queue weight for Silver to 15%
• Assign Queue weight for Bronze to 5%
NOTE: In order to accomplish this, we will also have to re-assign the Premium
maximum queue weight to 10 and change the minimum weight for Standard to 0.
The minimum weight of all balanced queue plus the maximum weight of the
Premium and Critical/Network queues must not exceed 100.
In order to accomplish this task, enter the following commands:
1. First, re-assign Qid 62 max-rate to 10.
• Passport-8610:5# config qos egress-queue-set 2 queue 62 set max-
rate 10
2. Next, re-assign the balanced queues starting with the lowest min-rate first in
order to not exceed the 100 limit.
• Passport-8610:5# config qos egress-queue-set 2 queue 4 set min-rate
0
• Passport-8610:5# config qos egress-queue-set 2 queue 3 set min-rate
5
• Passport-8610:5# config qos egress-queue-set 2 queue 2 set min-rate
15
• Passport-8610:5# config qos egress-queue-set 2 queue 1 set min-rate
25
• Passport-8610:5# config qos egress-queue-set 2 queue 0 set min-rate
40
After we have configured queue set 2, it should look like the following:
===========================================================================
R-Module QOS Shapers Table
===========================================================================
Qid Q-name Q-style min-rate max-rate max-q-length
---------------------------------------------------------------------------
0 Platinum Bal 40 100 163
1 Gold Bal 25 100 163
2 Silver Bal 15 100 327
3 Bronze Bal 5 100 327
4 Standard(Default) Bal 0 100 980
55 Custom low-pri 0 100 980
62 Premium high-pri 0 10 163
63 Critical/Network high-pri 0 5 163
Using the above configuration will also allow each balanced queue to forward traffic
up to the maximum rate if there is no congestion. Let’s assume that we also wish to
shape the traffic to the same value as the minimum queue weight.
1. To view the Ingress DSCP and 802.1p Mapping. In this case, we will only show
the mappings for Platinum (AF41, 0x22 or 34), Gold (AF31, 0x1A or 26), Silver
(AF21, 0x12 or 18), and Bronze (AF11, 0xA or 10).
0 1
1 0
2 2
3 3
4 4
5 5
6 6
7 7
2. Next, to view the QoS Level to Egress Queue Mapping, enter the following
command assuming we have an ERS 8630 Gigabit Ethernet Module in Slot 7.
3. Finally, to view the Egress Queue Mapping to CoS level, enter the
following command:
1p <ieee1p> <level>
ds <dscp> <level>
info
VLAN 2
Bridged Ports Routed Port
(Default Gateway)
7/26
| 7/30
7/29
10.1.25.0 /24 .1
PP8600-A PP8600-B
• Mode: deny
• Flags: Count
• Click on Insert to complete ACE 2 configuration
3. Select Protocol Attributes of TCP source port, TCP destination port, UDP
destination port, and TCP flags
• Passport-8610:5# config filter act 1 protocol
tcpSrcPort,tcpDstPort,udpDstPort,tcpFlags
4. Add ACT pattern location for SQLslam. For this example, we will start at
the beginning of the IP TOS field. The pattern we wish to filter on begins
216 bits (27 bytes, data field) from the beginning of the IP TOS field where
the pattern length is 48 bits (6 bytes). We will name the pattern SQLslam.
This name will be applied to an ACE with the actual pattern latter on.
• Passport-8610:5# config filter act 1 pattern SQLslam add ip-tos-
begin 216 48
5. Add ACT pattern location for Nachia. For this example, we will start at the
beginning of the IP TOS field. The pattern we wish to filter on begins 224
bits (28 bytes) from the beginning of the IP TOS field where the pattern
length is 24 bits (3 bytes). This name will be applied to an ACE with the
actual pattern latter on.
• Passport-8610:5# config filter act 1 pattern Nachia add ip-tos-begin
224 24
6. Enable ACT 1
• Passport-8610:5# config filter act 1 apply
B. Create ACL 4
1. Create ACL 4 with type of ingress VLAN:
• Passport-8610:5# config filter acl 4 create inVlan act 1
2. Add VLAN 2 to ACL 1:
• Passport-8610:5# config filter acl 4 add 2
C. Add ACE’s to ACL 4
1. Add ACE 1 with action of deny stop-on-match for SQLslam and enable
statistics. We will add the offset pattern of 040101010101 using ACT
pattern named SQLslam configured in Step A, bullet 4 above. Note that we
are adding the offset pattern to advanced custom filter 1. A maximum of up
to three offset patterns are allowed per ACL.
• Passport-8610:5# config filter acl 4 ace 1 create name "ACE-
SQLslam"
• Passport-8610:5# config filter acl 4 ace 1 action deny stop-on-
match true
• Passport-8610:5# config filter acl 4 ace 1 debug count enable
• Passport-8610:5# config filter acl 4 ace 1 ip ip-protocol-type eq
udp
• Passport-8610:5# config filter acl 4 ace 1 protocol udp-dst-port eq
1434
• Passport-8610:5# config filter acl 4 ace 1 advanced custom-filter1
SQLslam eq 040101010101
• Passport-8610:5# config filter acl 4 ace 1 enable
2. Add ACE 2 with action of deny stop-on-match for Nachia and enable
statistics. We will add the offset pattern of aaaaaa using ACT pattern
the beginning of the IP TOS field where the pattern length is 24 bits (3
bytes). This name will be applied to an ACE with the actual pattern
latter on.
• Name: Nachia
• Base: ipTosBegin
• Offset: 224
• Length: 24
• Click on Insert when finished
• Via the Pattern window, click on Close to go back to the main ACT
window
5. Enable ACT-1
Via the main ACT window, under the Apply tab for ACT-1, select true
then click on Apply.
B. Create ACL 4
Create a new ACL using ACL ID 4 with type of inVlan using ACT ID 1
1. Go to Security, select Advanced L2-L7 Filter and then click on ACL.
2. Via the ACL tab, click on Insert. Next enter the following:
• AclId: 4
• ActId: 1
• Type: inVlan
• VlanList: 2
• Click on Insert when finished.
C. Add ACE’s to ACL 4
1. Add ACE 1 with action of deny stop-on-match for SQLslam and enable
statistics. We will add the offset pattern of 040101010101 using ACT
pattern named SQLslam configured in Step A, bullet 3 above. Note that we
are adding the offset pattern to Pattern 1. A maximum of up to three offset
patterns are allowed per ACL.
Start by clicking on AclId 4 and then clicking on ACE via the ACL tab in the
ACL window. Next, click on Insert. The default AceId should be 1. Next,
enter the following:
• Name: ACE-SQLslam
• Mode: deny
• StopOnMatch: enable
• Flags: count
• Click on Insert when completed
Setup IP Protocol type of UDP
Via the ACE Common tab, highlight AceId 4, click on IP and Protocol tab.
Click on Insert and enter the following:
• Oper: eq
• List: udp
• Click on Insert when completed and then close
Setup UDP destination port equals 1434
Via the ACE Common tab, highlight AceId 4, click on Proto and UDP
Destination Port tab. Click on Insert and enter the following:
• Oper: eq
• Port: 1434
• Click on Insert and then close when completed
Setup offset pattern equals 040101010101
Via the ACE Common tab, highlight AceId 4, click on Adv, and select
Pattern 1. Click on Insert and enter the following:
• Name: SQLslam
• Oper: eq
• Value: 040101010101
• Click on Insert and then close when completed
NOTE: The ACE name configured is the ACT pattern name configured
above.
2. Add ACE 2 with action of deny stop-on-match for Nachia and enable
statistics. We will add the offset pattern of aaaaaa using ACT pattern
named Nachia configured in Step A, bullet 4 above. Note that we are
adding the offset pattern to Pattern 2. A maximum of up to three offset
patterns are allowed per ACL.
Via the ACE Common window, click on Insert. The default AceId should be
2. Next, enter the following:
• Name: ACE-Nachia
• Mode: deny
• StopOnMatch: enable
• Flags: count
• Click on Insert when completed
Setup IP Protocol type of ICMP
Via the ACE Common tab, highlight AceId 4 AceId 2, click on IP and
Protocol tab. Click on Insert and enter the following:
• Oper: eq
• List: icmp
• Click on Insert when completed
Setup offset pattern 2 equals aaaaaa
Via the ACE Common tab, highlight AceId 4 AceId 2, click on Adv, and
select Pattern 2. Click on Insert and enter the following:
• Name: Nachia
• Oper: eq
• Value: aaaaaa
• Click on Insert when completed
NOTE: The ACE name configured is the ACT pattern name configured
above.
3. Add ACE 3 with action of deny stop-on-match for Xmas and enable
statistics. We will filter on protocol type of TCP with TCP Flag set with
Synchronize, Push, and Urgent.
Via the ACE Common window, click on Insert. The default AceId should be
3. Next, enter the following:
• Name: ACE-Xmas
• Mode: deny
• StopOnMatch: enable
• Flags: count
• Click on Insert when completed
Setup IP Protocol type of TCP
Via the ACE Common tab, highlight AceId 4 AceId 3, click on IP and
Protocol tab. Click on Insert and enter the following:
• Oper: eq
• List: tcp
• Click on Insert when completed
Setup TCP Flags to select Push and URG
Via the ACE Common tab, highlight AceId 4 AceId 3, click on Proto, and
select TCP Flags. Click on Insert and enter the following:
• Oper: matchAll
• List: push,urg
• Click on Insert when completed
4. Add ACE 4 with action of deny stop-on-match for TCP SynFinScan
and enable statistics. Here we will filter on protocol type of TCP with
TCP Flag set with Synchronize and Finish.
Via the ACE Common window, click on Insert. The default AceId
should be 4. Next, enter the following:
• Name: ACE-SynFinScan
• Mode: deny
• StopOnMatch: enable
• Flags: count
• Click on Insert when completed
Setup IP Protocol type of TCP
Via the ACE Common tab, highlight AceId 4 AceId 4, click on IP and
Protocol tab. Click on Insert and enter the following:
• Oper: eq
• List: tcp
• Click on Insert when completed
Setup TCP Flags to select Push and URG
Via the ACE Common tab, highlight AceId 4 AceId 4, click on Proto,
and select TCP Flags. Click on Insert and enter the following:
• Oper: matchAll
• List: fin,syn
• Click on Insert when completed
5. Add ACE 5 with action of deny stop-on-match for TCP FtpPort and
enable statistics. Here we will filter on protocol type of TCP with TCP
Flag set with Synchronize, TCP src port equals 20, and TCP dst port
equal to or less than 1024.
Via the ACE Common window, click on Insert. The default AceId
should be 5. Next, enter the following:
• Name: ACE-FtpPort
• Mode: deny
• StopOnMatch: enable
• Flags: count
• Click on Insert when completed
Setup IP Protocol type of TCP
Via the ACE Common tab, highlight AceId 4 AceId 5, click on IP and
Protocol tab. Click on Insert and enter the following:
• Oper: eq
• List: tcp
• Click on Insert when completed
Setup TCP source and destination ports
Via the ACE Common tab, highlight AceId 4 AceId 5, click on Proto,
and select TCP Source Port. Click on Insert and enter the following:
• Oper: eq
• List: 20
• Click on Insert when completed
Con’t via the Proto tab, select TCP Destination Port. Click on Insert
and enter the following:
• Oper: eq
• List: 1024
• Click on Insert when completed
Setup TCP Flags to select SYN
Con’t via the Proto tab, and select TCP Flags. Click on Insert and enter
the following:
• Oper: matchAll
• List: syn
• Click on Insert when completed
6. Add ACE 6 with action of deny stop-on-match for TCP DnsPort and
enable statistics. Here we will filter on protocol type of TCP with TCP
Flag set with Synchronize, TCP src port equals 53, and TCP dst port
equal to or less than 1024.
Via the ACE Common window, click on Insert. The default AceId
should be 6. Next, enter the following:
• Name: ACE-DnsPort
• Mode: deny
• StopOnMatch: enable
• Flags: count
• Click on Insert when completed
Setup IP Protocol type of TCP
Via the ACE Common tab, highlight AceId 4 AceId 6, click on IP and
Protocol tab. Click on Insert and enter the following:
• Oper: eq
• List: tcp
• Click on Insert when completed
Setup TCP source and destination ports
Via the ACE Common tab, highlight AceId 4 AceId 6, click on Proto,
and select TCP Source Port. Click on Insert and enter the following:
• Oper: eq
• List: 53
• Click on Insert when completed
Con’t via the Proto tab, select TCP Destination Port. Click on Insert
and enter the following:
• Oper: eq
• List: 1024
• Click on Insert when completed
Setup TCP Flags to select SYN
Con’t via the Proto tab, and select TCP Flags. Click on Insert and enter
the following:
• Oper: matchAll
• List: syn
• Click on Insert when completed
7. Enable all ACE’s
Via the ACE Common tab, make sure all ACE’s are enabled via the
AdminState tab.
qos policy 1 create peak-rate 2000 svc-rate 1000 lanes 7/3 name "POLICY-1"
#
# VLAN CONFIGURATION
#
#
# R-MODULE FILTER CONFIGURATION
#
================================================================================
ACT Table (Part I)
================================================================================
Id ActName Ethernet Ip Protocol Arp
--------------------------------------------------------------------------------
4082 IP Media filters ACT none dscp tcpSrcPort none
udpSrcPort
tcpDstPort
udpDstPort
4084 Mac Src/Dst & ARP ACT srcMac none none operation
dstMac
IP Header
6 Bytes 6 Bytes 4 Bytes 2 Bytes 64-1500 Bytes
0 1 2 3 4 5 6 7
Codepoint Space USE
DSCP CU XXXXX0 Defined Code Points
XXXX11 Experimental or Local use
Future Defined Code Points
1 0 1 1 1 0 CU XXXX01
• DSCP Marking
— Differentiated Services Codepoint, six bits of the DS field are used to select the PHB
that packet experiences at each node ⇒ 64 possible code points
Drop Precedence Class 1 Class 2 Class 3 Class 4
Low 001010 010010 011010 100010
Medium 001100 010100 011100 100100
High 001110 010110 011110 100110
Syste Syste
Switch Fabric m Switch Fabric m
Slot Slot
FSWI TAPMU FSWI TAPMU
10GIG
10GIG 10GIG
10GIG
Feedback 10GIG 10GIG
Output
Queuing
CO
CLUE Processor
Lookup
Table
F2E F2I F2E F2I F2E F2I
RSP RS RS RS RS RS
RS RS RS RS RS RS
Full Duplex
10 GIG LANE IOM
PIM
INTERFACE INTERFACE INTERFACE
PORT(S) PORT(S) PORT(S)
10x1GIG , 1x10GIG 10x1GIG , 1x10GIG 10x1GIG , 1x10GIG
Contact Us:
For product support and sales information, visit the Nortel Networks website at:
http://www.nortel.com