|
Table Of Contents
Basic Configuration:
Configuring Global and Interface AttributesConfiguring Quality of Service
Configuring Marking and Classification
Configuring DSCP-to-CoS Mapping
Configuring CoS-to-Queue Mapping
Configuring Network Enhancements
Configuring Hardware Rate Limiters
Configuring Non-Solution-Specific Features
Implementing the Solution
This chapter presents the following major topics:
• Basic Configuration: Configuring Global and Interface Attributes
• Configuring Quality of Service
• Configuring Network Enhancements
• Configuring Hardware Rate Limiters
• Configuring Non-Solution-Specific Features
Network Topology
Figure 3-1 illustrates the network topology that was tested. (See Hub and IP Architecture.)
Figure 3-1 Network Topology
Basic Configuration:
Configuring Global and Interface AttributesThe following tasks are presented:
Configuring Routing
End-to-end network connectivity is accomplished by using multiple dynamic protocols and processes. OSPF is used to advertise the transport links, interswitch links, and loopbacks, while internal BGP (iBGP) is used to advertise subnets for the edge devices.
Note See IP Architecture.
OSPF is configured into two domains, one for the RAN and one for the hub. The RAN OSPF process enables connectivity and shortest path through the network; the hub OSPF process enables connectivity within the hub. The two domains simplify the routing tables on the RAN and hub routers, because a hub does not have routes for the interhub links of the other hubs. Routing table stability is also improved, because network changes in a hub are not advertised out of the hub.
The iBGP uses route reflectors and route reflector clients to advertise the subnets for the edge devices throughout the network. The SR and HR routers advertise their hub OSPF and directly connected subnets up to the AR routers, which aggregate all the received routes and advertise the aggregate back to the SR and HR routers.
To configure routing, perform the following tasks:
• Configuring the RAN OSPF Process
• Configuring the Hub OSPF Process
• Configuring the iBGP Process
Configuring the RAN OSPF Process
The RAN OSPF routing configurations on SR, AR, and HR routers are similar. To configure HR2a, do the following.
Step 1 Create the OSPF process and configure a router ID.
router ospf 100
router-id 99.99.0.5
Step 2 The following default commands are added to the process configuration automatically. The first sends Syslog messages when adjacent neighbors' states change. The second is the maximum number of equal-cost paths that can be used.
log-adjacency-changes detail
maximum-paths 6
Step 3 Configure which subnets and interfaces will advertise in this process. All loopback interfaces (99.99.xxx.xxx) and all 10-GE interswitch links in the RAN (192.168.2xx.xxx) are advertised to the neighboring routers.
passive-interface default
no passive-interface TenGigabitEthernet1/1
no passive-interface TenGigabitEthernet1/3
network 99.99.0.0 0.0.255.255 area 0
network 192.168.249.0 0.0.0.255 area 0
network 192.168.250.0 0.0.0.255 area 0
Step 4 Modify the SPF algorithm to converge more quickly.
timers throttle spf 400 400 4000
•The first value is the initial SPF schedule delay in milliseconds (1-600000 msec).
•The second value is the minimum hold time between two consecutive SPF calculations (1-600000 msec).
•The last value is the maximum wait time between two consecutive SPF calculations (1-600000 msec).
Step 5 To ensure that routes from this process are not used in routing decisions until the routing process converges, advertise the maximum metric until the iBGP converges or the default timer has expired (600 sec).
max-metric router-lsa on-startup wait-for-bgp
Configuring the Hub OSPF Process
In the testing of this solution, no devices in the hubs other than the HR routers participated in OSPF, so the configurations do not contain a configuration for this process. However, it is described here for completeness.
Step 1 The hub OSPF process includes Steps 1 through Step 5 of the RAN OSPF process (see Configuring the RAN OSPF Process), where the interfaces from Step 3 would include the point-to-point between the hub routers, subnets for the CMTSes, QAMs with routing capabilities, and so on. instead of the RAN interfaces. These networks would be configured in a second OSPF area (area 1), and any routes learned from this process would have a high metric, because it would not be the preferred route.
Configure the hub OSPF process, noting the variables in
<angle brackets>
.router ospf 200
router-id 99.99.1.5
log-adjacency-changes
maximum-paths 6
passive-interface default
no passive-interface GigabitEthernet2/48
network <hub point-to-point link> 0.0.0.3 area 1
network <IP address of attached routing device> <wildcard mask> area 1
timers throttle spf 400 400 4000
max-metric router-lsa on-startup wait-for-bgp
distance ospf external 175
Step 2 In global configuration mode, define a prefix list and route map to set the metric and next hop of the routes redistributed from the hub OSPF process into iBGP.
a. Define a prefix list.
ip prefix-list hub-ospf-to-bgp-pfx seq 100 permit <hub point-to-point link>/30 le 32
ip prefix-list hub-ospf-to-bgp-pfx seq 200 permit <IP address of attached routing device>/<subnet mask> le <bitmask>
b. Define a route map.
route-map hub-ospf-to-bgp permit 100
match ip address prefix-list hub-ospf-to-bgp-pfx
set metric 100
set ip next-hop <hub loopback1 primary address>
Note The above enables hub connectivity. However, the routes from the hub OSPF process must be redistributed into BGP to ensure the network connectivity of devices using routes defined in Step 2b, above. See Step 8 of Configuring the iBGP Process.
Configuring the iBGP Process
The iBGP routing configuration on the SR and HR routers is similar. To configure HR2a, do the following.
Step 1 Create the BGP process and configure a router ID.
router bgp 100
bgp router-id 99.99.0.5
Step 2 The following default commands are added to the process configuration automatically. The first allows the router to advertise a network route without waiting for OSPF. The second disables auto summary, so subnet prefixes are not summarized when they are advertised.
no synchronization
no auto-summary
Step 3 Enable the logging of BGP neighbor changes.
bgp log-neighbor-changes
Step 4 Configure the router to display BGP communities in the AA:NN format to conform with RFC 1997. This command only affects the format in which BGP communities are displayed; it does not affect the community or community exchange.
ip bgp-community new-format
Note For more information, see "RFC 1997—BGP Communities Attributes," at the following URL:
http://www.faqs.org/rfcs/rfc1997.htmlStep 5 Define a peer group (here arbitrarily named "rr-server") for the route reflectors AR1 and AR2. Neighbors configured for this group share all of the following information.
neighbor rr-server peer-group
neighbor rr-server remote-as 100
neighbor rr-server update-source Loopback0
neighbor rr-server version 4
neighbor rr-server send-community
Step 6 Define AR1 and AR2 as neighbors and associate them with the peer group defined in Step 5.
neighbor 99.99.0.2 peer-group rr-server
neighbor 99.99.0.2 description AR1
neighbor 99.99.0.3 peer-group rr-server
neighbor 99.99.0.3 description AR2
Step 7 Configure the BGP process to redistribute the directly connected subnets according to a defined route map. (The route map is defined in Step 9b, below.)
redistribute connected route-map rmap_Connected-to-BGP
Step 8 Configure the BGP process to redistribute the hub OSPF process defined in Step 1 of Configuring the Hub OSPF Process.
redistribute ospf 200 route-map hub-ospf-to-bgp
Step 9 Define a prefix list and route map to set the metric and next hop of the directly connected subnets redistributed into iBGP.
a. Define the prefix list.
ip prefix-list pl_Connected-to-BGP seq 5 permit 192.168.160.0/24 le 32
b. Define the route map.
route-map rmap_Connected-to-BGP permit 100
match ip address prefix-list pl_Connected-to-BGP
set metric 100
set ip next-hop 99.99.0.5
The BGP configuration on the AR routers is similar. To configure AR1, do the following.
Step 1 Create the BGP process and configure a router ID.
router bgp 100
bgp router-id 99.99.0.2
Step 2 The following default commands are added to the process configuration automatically:
•The first allows the router to advertise a network route without waiting for OSPF.
•The second disables auto summary, so subnet prefixes are not summarized when they are advertised.
no synchronization
no auto-summary
Step 3 Enable the logging of BGP neighbor changes.
bgp log-neighbor-changes
Step 4 Configure the router to display BGP communities in the AA:NN format to conform with RFC-1997. This command only affects the format in which BGP communities are displayed; it does not affect the community or community exchange.
ip bgp-community new-format
Step 5 Define a peer group for the route reflector clients SR1a and the HRs. Neighbors configured for this group share all of the following information.
neighbor rr-client peer-group
neighbor rr-client remote-as 100
neighbor rr-client update-source Loopback0
neighbor rr-client version 4
neighbor rr-client route-reflector-client
neighbor rr-client send-community
Step 6 Define SR1a and the HRs as neighbors and associate them with the peer group defined in Step 5, above.
neighbor 99.99.0.1 peer-group rr-client
neighbor 99.99.0.1 description SR1a
neighbor 99.99.0.4 peer-group rr-client
neighbor 99.99.0.4 description HR1a
neighbor 99.99.0.5 peer-group rr-client
neighbor 99.99.0.5 description HR2a
neighbor 99.99.0.6 peer-group rr-client
neighbor 99.99.0.6 description HR2b
neighbor 99.99.0.7 peer-group rr-client
neighbor 99.99.0.7 description HR3a
Step 7 Define a peer group (here arbitrarily called "ibgp") for the two route reflectors AR1 and AR2. Neighbors configured for this group share all of the following information.
neighbor ibgp peer-group
neighbor ibgp remote-as 100
neighbor ibgp update-source Loopback0
neighbor ibgp version 4
neighbor ibgp send-community
Step 8 Define AR1 as a neighbor and associate it with the peer group defined in Step 7, above.
neighbor 99.99.0.3 peer-group ibgp
neighbor 99.99.0.3 description AR2
Step 9 Define the networks to be advertised.
network 192.168.10.0 route-map rmap_Network-Management
network 192.168.60.0 route-map rmap_Ad-Insertion
network 192.168.71.0 route-map rmap_IPmc-DS-Source
network 192.168.72.0 route-map rmap_IPmc-DB-Source
network 192.168.80.0 route-map rmap_Voice
network 192.168.90.0 route-map rmap_Internet-Access
network 192.168.150.0 route-map rmap_Hub1
network 192.168.160.0 route-map rmap_Hub2
network 192.168.170.0 route-map rmap_Hub2
network 192.168.180.0 route-map rmap_Hub3
Step 10 Use route maps to set the metric for each route.
route-map rmap_Network-Management permit 100
set metric 100
route-map rmap_Ad-Insertion permit 100
set metric 100
route-map rmap_IPmc-DS-Source permit 100
set metric 100
route-map rmap_IPmc-DB-Source permit 100
set metric 100
route-map rmap_Voice permit 100
set metric 100
route-map rmap_Internet-Access permit 100
set metric 100
route-map rmap_Hub1 permit 100
set metric 100
route-map rmap_Hub2 permit 100
set metric 100
route-map rmap_Hub3 permit 100
set metric 100
Configuring Multicast
Video equipment currently supports IGMPv2 and is starting to support IGMPv3. Cisco has a transitional solution to help customers implement SSM with IGMPv2 instead of waiting for multicast clients to support IGMPv3. IGMPv2 Membership Reports are converted to IGMPv3 on the Cisco router, which uses static mappings or a DNS server to resolve the source address of the multicast group. The static mappings and DNS server implementations both have pros and cons, which the user needs to weigh before implementing either approach.
Note For an overview of how multicast is used in the solution, see Understanding and Optimizing Video Flows.
In this solution, static SSM mappings are used. This requires the user to map all multicast groups to the appropriate source addresses for SSM multicast to operate properly. The following SSM configuration is implemented on all switches in the network.
Note If the network is currently on an ASM model and the MSO wants to mic\grate to an SSM model, see Upgrading the Network: Migrating from ASM to SSM.
The following tasks are presented below:
Configuring SSM
To configure SSM, do the following.
Step 1 Enable multicast routing.
ip multicast routing
Step 2 Enable SSM mapping.
ip igmp ssm-map enable
Note Although the document "Source Specific Multicast (SSM) Mapping," referenced above, states that the ip igmp ssm-map enable command needs to be configured only on switches that are connected to IGMP clients, it was found that this led to inconsistent recovery times during solution network failure and recovery tests. A majority of the time, recovery was fast, but occasionally recovery times were poor. It was found that when this command was configured on the headend switch, recovery times were more consistent, although slightly slower than the best recovery times when SSM mapping was not configured on the headend switch.
Step 3 By default, DNS queries are used to resolve the source address of IGMPv2 Membership Reports. Because the solution uses static SSM mapping, disable the DNS method of resolution buy using the following command.
no ip igmp ssm-map query dns
Step 4 Define a nondefault multicast IP address range for SSM. (By default, the IP address range for SSM is 232.0.0.0/8, but it can be defined manually.) In this solution, the 239.0.0.0/8 range is used for SSM.
a. Create an access list with a permit statement that defines the range.
ip access-list standard acl_SSM-IPmc-range
permit 239.0.0.0 0.255.255.255
b. Define the SSM range of IP multicast [Protocol Independent Multicast (PIM)] addresses.
ip pim ssm range acl_SSM-IPmc-range
Tip To use the default SSM range, omit Step 4a and Step 4b above, and use the ip pim ssm default command.
Step 5 Define the static SSM mappings for the multicast groups in the network. To accomplish this, define access lists for each range of multicast groups and associate them with a source IP address.
ip access-list standard acl_SSM-map-DB
remark SSM mapping for DB blue/red
permit 239.16.0.0 0.0.0.255
ip access-list standard acl_SSM-map-DS
remark SSM mapping for DS blue/red
permit 239.20.0.0 0.0.255.255
ip access-list standard acl_SSM-map-DS-post-splice
remark SSM mapping for post splice DS blue/red
permit 239.28.0.0 0.0.255.255
ip igmp ssm-map static acl_SSM-map-DB 192.168.71.2
ip igmp ssm-map static acl_SSM-map-DS 192.168.72.2
ip igmp ssm-map static acl_SSM-map-DS-post-splice 192.168.160.2
Step 6 Verify the SSM configuration, using the following commands.
HR2a# show ip igmp ssm-mapping
SSM Mapping : Enabled
DNS Lookup : Disabled
Mcast domain : in-addr.arpa
Name servers : 255.255.255.255
HR2a# show ip igmp ssm-mapping 239.16.0.1
Group address: 239.16.0.1
Database : Static
Source list : 192.168.71.2
Note For the details and an extended discussion of SSM mapping, see "Source Specific Multicast (SSM) Mapping" at the following URL:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios123/123newft/123t/123t_2/gtssmma.htmConfiguring IGMP
The configuration of IGMP depends on the version of IGMP that is configured for the attached IGMP clients. The two options are discussed below.
• All Clients Support IGMPv2 Only
• All Clients Support and Are Configured for IGMPv3
Note See Upgrading the Network: Migrating from ASM to SSM.
All Clients Support IGMPv2 Only
If any clients support only IGMPv2, then you should configure the router interfaces connected to the IGMP client for IGMPv2, which is the default. (To restore the default, use the ip igmp version 2 command in global configuration mode.)
If the router receives an IGMPv2 Membership Report (MR) for a multicast group in the SSM range, the MR is accepted and converted to IGMPv3 if SSM static or DNS mapping is configured on the router. Otherwise, the IGMPv2 MR is ignored. If the router receives an IGMPv2 MR for a multicast group outside of the SSM range, then the MR is accepted and processed as Any Source Multicast (ASM). Consequently, if the router receives an IGMPv3 MR, the MR is ignored. The router later sends an IGMPv2 Membership Query, and the client should see this lower version and start using IGMPv2 MRs. The router then behaves as previously described.
All Clients Support and Are Configured for IGMPv3
If all of the clients support and are configured for IGMPv3, then you should configure the router interface for IGMPv3. To enable this, use the ip igmp version 3 command in global configuration mode.
In this case, if the router receives an IGMPv2 MR, the router ignores the MR. If the router receives an IGMPv3 MR for a multicast group in the SSM range, the MR is accepted and processed as IGMPv3. If the router receives an IGMPv3 MR for a multicast group outside the SSM range, the MR is accepted and processed as ASM.
Configuring Quality of Service
In this solution, Quality of Service (QoS) is based on Differentiated Services (DiffServ). (See QoS Fundamentals.) Traffic is marked at the ingress ports of the network, and each router in the network independently provides varying levels of quality by means of queueing and scheduling.
The traffic types in Table 2-5 have different QoS requirements. For example, VoIP traffic requires minimum loss and minimum jitter; video traffic requires no loss and low jitter; and, at the lower end, suspect traffic can suffer loss and high jitter.
The following tasks are presented below:
• Configuring Marking and Classification
• Configuring DSCP-to-CoS Mapping
• Configuring CoS-to-Queue Mapping
Configuring Marking and Classification
The first step in providing quality of service is to classify and mark traffic according to Table 2-5. Traffic is classified and marked at the edges, and the transports trust the DSCP value on incoming packets. To configure marking and classification, do the following.
Step 1 Enable QoS in global configuration mode.
mls qos
Step 2 Create an access list to identify each type of service in the network.
Caution The following examples are for illustration only. To avoid undesired access, use the most restrictive addresses and wildcard masks possible.
ip access-list extended acl_voice
remark Identify voice traffic
permit ip any 192.168.161.0 0.0.0.255
ip access-list extended acl_broadcast-video
remark Identify broadcast video traffic (multicast on 239.x.x.x)
permit ip any 239.0.0.0 0.255.255.255
ip access-list extended acl_ad-server
remark Identify ad server traffic
permit ip 192.168.60.0 0.0.0.255 any
ip access-list extended acl_video-signaling
remark Identify video signaling
permit ip any 192.168.61.0 0.0.0.255
ip access-list extended acl_net-mgmt
remark Identify net management traffic (TFTP, Syslog, NTP, etc)
permit ip 192.168.10.0 0.0.0.255 any
permit ip any 192.168.10.0 0.0.0.255
ip access-list extended acl_internet-access
remark Identify Internet access traffic
permit ip 192.168.90.0 0.0.0.255 any
ip access-list extended acl_permit-any
permit ip any any
Step 3 Create a class map for each of the access lists created in Step 2, above.
class-map match-all class_voice
match access-group name acl_voice
class-map match-all class_broadcast-video
match access-group name acl_broadcast-video
class-map match-all class_ad-server
match access-group name acl_ad-server
class-map match-all class_video-signaling
match access-group name acl_video-signaling
class-map match-all class_net-mgmt
match access-group name acl_net-mgmt
class-map match-all class_internet-access
match access-group name acl_internet-access
class-map match-all class_suspect
match access-group name acl_permit-any
Step 4 Create a policy map for each type of ingress port in the network. Each policy map should have classes for each service type expected on the port, and should end with a suspect class. The DSCP values of each server are set to the values shown in Table 2-5.
policy-map pmap_voice-port
class class_voice
trust dscp
class class_net-mgmt
set dscp cs2
class class_suspect
set dscp default
policy-map pmap_broadcast-video-port
class class_broadcast-video
set dscp af41
class class_video-signaling
set dscp cs3
class class_net-mgmt
set dscp cs2
class class_suspect
set dscp default
policy-map pmap_ad-server-port
class class_ad-server
set dscp af41
class class_video-signaling
set dscp cs3
class class_net-mgmt
set dscp cs2
class class_suspect
set dscp default
policy-map pmap_net-mgmt-port
class class_net-mgmt
set dscp cs2
class class_suspect
set dscp default
policy-map pmap_internet-access-port
class class_internet-access
set dscp 8
class class_net-mgmt
set dscp cs2
class class_suspect
set dscp default
Step 5 Apply the policy maps to the ingress ports. The following interface configurations are from SR1a.
interface GigabitEthernet2/1
description Syslog/TFTP/NTP on PC0a (Eth2) dual-homed to 1.1.1.0/24
ip address 192.168.10.1 255.255.255.252
<---snip--->
service-policy input pmap_net-mgmt-port
interface GigabitEthernet2/2
description Voice over IP
ip address 192.168.80.1 255.255.255.252
<---snip--->
service-policy input pmap_voice-port
interface GigabitEthernet2/3
description Internet Access
ip address 192.168.90.1 255.255.255.252
<---snip--->
service-policy input pmap_internet-access-port
interface GigabitEthernet2/4
description CherryPicker DM0a (Port 1) - DB
ip address 192.168.71.1 255.255.255.252
<---snip--->
service-policy input pmap_broadcast-video-port
interface GigabitEthernet2/5
description CherryPicker DM0b (Port 1) - DS
ip address 192.168.72.1 255.255.255.252
<---snip--->
service-policy input pmap_broadcast-video-port
interface GigabitEthernet2/6
description Ad Server Ad0a
ip address 192.168.60.1 255.255.255.252
<---snip--->
service-policy input pmap_ad-server-port
Step 6 Configure the noningress ports to trust the DSCP value set at the ingress ports. The following configuration is from the 10-GE transport link on SR1a.
interface TenGigabitEthernet1/1
description Transport between AR1 (TenGig1/1)
ip address 192.168.250.1 255.255.255.252
<---snip--->
mls qos trust dscp
Configuring DSCP-to-CoS Mapping
The DSCP values are used to carry the QoS value between the switches. Once the packet is in the switch, the Class of Service (CoS) value is used to queue the packet in the transmit queues. There are 64 possible DSCP values and only 8 CoS values, so multiple services need to be mapped to a single CoS value.
To configure DSCP-to-CoS mapping, do the following:
Step 1 View the default DSCP-to-CoS mapping by using the following command.
SR1a# show mls qos maps dscp-cos
Dscp-cos map: (dscp= d1d2)
d1 : d2 0 1 2 3 4 5 6 7 8 9
-------------------------------------
0 : 00 00 00 00 00 00 00 00 01 01
1 : 01 01 01 01 01 01 02 02 02 02
2 : 02 02 02 02 03 03 03 03 03 03
3 : 03 03 04 04 04 04 04 04 04 04
4 : 05 05 05 05 05 05 05 05 06 06
5 : 06 06 06 06 06 06 07 07 07 07
6 : 07 07 07 07
Step 2 Configure the DSCP-to-CoS mappings by using the following commands.
mls qos map dscp-cos 34 36 38 to 6
mls qos map dscp-cos 46 48 to 5
mls qos map dscp-cos 26 28 30 to 4
mls qos map dscp-cos 16 18 20 to 3
mls qos map dscp-cos 40 42 44 to 2
mls qos map dscp-cos 8 10 to 1
mls qos map dscp-cos 0 2 to 0
Note Several of the mappings are the same as the default mappings, so they will not show up in the running configuration once the above is configured, as shown below.
SR1a# show running-config | include mls qos map
mls qos map dscp-cos 16 18 20 to 3
mls qos map dscp-cos 26 28 30 to 4
mls qos map dscp-cos 34 36 38 to 6
mls qos map dscp-cos 40 42 44 to 2
mls qos map dscp-cos 48 to 5
Step 3 View the modified DSCP-to-CoS mapping by using the following command.
SR1a# show mls qos maps dscp-cos
Dscp-cos map: (dscp= d1d2)
d1 : d2 0 1 2 3 4 5 6 7 8 9
-------------------------------------
0 : 00 00 00 00 00 00 00 00 01 01
1 : 01 01 01 01 01 01 03 02 03 02
2 : 03 02 02 02 03 03 04 03 04 03
3 : 04 03 04 04 06 04 06 04 06 04
4 : 02 05 02 05 02 05 05 05 05 06
5 : 06 06 06 06 06 06 07 07 07 07
6 : 07 07 07 07
Configuring CoS-to-Queue Mapping
The Sup720 PFC performs the QoS classification and marking, but the line cards perform the queueing and congestion management. The following table shows the QoS characteristics of the line cards used in this solution. The 10-GE line cards are used in the transport and are most susceptible to congestion. The 1-GE line cards are used at the edges and are usually configured for a specific role, so the amount of traffic being transmitted out the switch interface should be provisioned appropriately. (Ingress queues are rarely congested and were not examined during testing.)
Table 3-1 lists the characteristics of the line cards used in solution testing.
To configure CoS-to-Queue mapping, do the following.
Step 1 Verify the default CoS-to-queue mapping, by using the following command.
SR1a# show queueing interface TenGigabitEthernet 1/1
Note To save space, the following output shows only the differences resulting from the mapping.
queue thresh cos-map
---------------------------------------
1 1 0
1 2 1
<---snip--->
2 1 2
2 2 3 4
<---snip--->
3 1 6 7
<---snip--->
8 1 5
<---snip--->
Step 2 Modify the CoS-to-queue mapping by using the following commands.
wrr-queue cos-map 1 3 2
wrr-queue cos-map 2 1 3
wrr-queue cos-map 2 2 4
This maps COS 2 to TxQueue1, threshold 2; COS 3 to TxQueue2, threshold 1; and COS 4 to TxQueue2, threshold 2.
Step 3 Verify the modified CoS-to-queue mapping by using the following command.
SR1a# show queueing interface TenGigabitEthernet 1/1
Note To save space, the following output shows only the differences resulting from the mapping.
queue thresh cos-map
---------------------
1 1 0
1 2 1
1 3 2
<---snip--->
2 1 3
2 2 4
<---snip--->
3 1 6 7
<---snip--->
8 1 5
<---snip--->
Note Although the CoS-to-queue and threshold mappings are modified, the transmit queue lengths, thresholds, and queue management are left at default values. The decision to use default values is based on the expected traffic profile, and may differ from network to network.
Figure 2-7 shows transmit queues graphically. Table 3-2 summarizes the results of the preceding mapping task on the traffic tested, as depicted in that figure. (The names of some traffic types vary.)
Configuring Network Enhancements
This section presents the following major topics:
• Configuring Hardware Rate Limiters
Configuring New Features
Three new features that enhance the solution are available with Cisco IOS Release 12.2(18)SXF and later:
• EtherChannel Min-Links Feature
• Multicast Replication Mode Feature
• Local Egress Replication Feature
The following sections provide a brief summary, with links to more information and command syntax.
EtherChannel Min-Links Feature
This feature on Link Aggregation Control Protocol (LACP) EtherChannels allows you to do the following:
•Configure the minimum number of member ports that must be in the link-up state and bundled in the EtherChannel for the port channel interface to transition to the link-up state.
•Prevent low-bandwidth LACP EtherChannels from becoming active.
•Cause LACP EtherChannels to become inactive if they have too few active member ports to supply your required minimum bandwidth.
Note For more information, as well as command syntax and examples, see Configuring the EtherChannel Min-Links Feature at the following URL:
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/122sx/swcg/channel.htm#wp1047602Multicast Replication Mode Feature
This feature (called "Multicast Enhancement - Replication Mode Detection" in the release notes and Feature Navigator) supports the egress keyword, to provide the functionality described below.
By default, a Supervisor Engine 720 automatically detects the replication mode based on the module types installed in the system. If all modules are capable of egress replication, the system uses egress-replication mode. If the supervisor engine detects modules that are not capable of egress replication, the replication mode automatically changes to ingress replication. You can override this action by entering the mls ip multicast replication-mode egress command, so that the system continues to work in egress-replication mode even if there are fabric-enabled modules installed that do not support egress replication (for example, OSMs). You can also configure the system to operate only in ingress-replication mode.
Note For more information, as well as command syntax and examples, see Configuring the Replication Mode at the following URL:
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/122sx/swcg/mcastv4.htm#wp1076728Local Egress Replication Feature
This feature (called "Multicast Enhancement—Egress Replication Performance Improvement" in the release notes and Feature Navigator) allows you to enable local egress replication unconditionally. You can prevent the redundant replication of multicast packets across the switch-fabric connection by entering a command that instructs the two replication engines on these modules to forward packets only to local interfaces; these interfaces are associated with the switch-fabric connection that the replication engine supports.
Note For more information, as well as command syntax and examples, see Enabling Local Egress Replication at the following URL:
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/122sx/swcg/mcastv4.htm#wp1093310
Configuring Hardware Rate Limiters
For background and examples, see Hardware Rate Limiters, and the configurations in "Sample Configurations."
For troubleshooting information, see Viewing HWRL Counters.
Configuring Non-Solution-Specific Features
The previous implementation sections included configuration recommendations for features that are specific to the video solution, but did not address other important features that are non-solution specific. Use the following resources to configure features not addressed in this document.
•Catalyst 6500 Series Cisco IOS Command Reference, 12.2SX
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/122sx/cmdref/index.htm
•Catalyst 6500 Series Cisco IOS Software Configuration Guide, 12.2SX
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/122sx/swcg/index.htm
•Best Practices for Catalyst 6500/6000 Series and Catalyst 4500/4000 Series Switches Running Cisco IOS Software
•IOS Command Lookup Tool
Posted: Tue Mar 28 07:45:34 PST 2006
All contents are Copyright © 1992--2006 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.