Qos Configuration Guide, 17.2.0

Total Page:16

File Type:pdf, Size:1020Kb

Qos Configuration Guide, 17.2.0 QoS Configuration Guide, 17.2.0 November 2017 Supporting AT&T Vyatta Network Operating System AT&T Vyatta 5600 vRouter QoS Configuration Guide, 17.2.0 Contents About This Guide.......................................................................................................................................................................................................................... 8 QoS......................................................................................................................................................................................................................................................... 9 Overview................................................................................................................................................................................................................................... 9 QoS architecture...................................................................................................................................................................................................... 9 Configuration limits............................................................................................................................................................................................. 10 Queue and traffic classes................................................................................................................................................................................ 10 Mapping......................................................................................................................................................................................................................... 11 Classification............................................................................................................................................................................................................. 12 Remark.......................................................................................................................................................................................................................... 13 Frame overhead...................................................................................................................................................................................................... 13 Monitoring................................................................................................................................................................................................................... 13 Per packet logging................................................................................................................................................................................................ 13 QoS on bonded link............................................................................................................................................................................................. 13 QoS policies.......................................................................................................................................................................................................................... 13 RED and WRED........................................................................................................................................................................................................ 14 Bandwidth................................................................................................................................................................................................................... 14 Round-robin............................................................................................................................................................................................................... 14 Traffic shaper........................................................................................................................................................................................................... 14 Traffic class................................................................................................................................................................................................................ 15 October 24, 2017 Page 2 © 2017 AT&T Intellectual Property. All rights reserved. AT&T and Globe logo are registered trademarks of AT&T Intellectual Property. AT&T Vyatta 5600 vRouter QoS Configuration Guide, 17.2.0 Default-traffic prioritization........................................................................................................................................................................... 15 QoS Configuration Examples............................................................................................................................................................................................. 16 Configuration examples.............................................................................................................................................................................................. 16 Creating a QoS Policy......................................................................................................................................................................................... 16 Configuring a class profile............................................................................................................................................................................... 17 Configuring traffic-class................................................................................................................................................................................... 18 Configuring RED..................................................................................................................................................................................................... 19 Configuring mapping.......................................................................................................................................................................................... 20 Configuring ACLs................................................................................................................................................................................................... 21 Configuring WRR.................................................................................................................................................................................................... 22 Configuring remarking...................................................................................................................................................................................... 23 QoS configuration example.......................................................................................................................................................................... 24 Monitoring QoS................................................................................................................................................................................................................. 25 Statistics...................................................................................................................................................................................................................... 25 Priority maps............................................................................................................................................................................................................ 26 Monitoring QoS statistics............................................................................................................................................................................... 26 QoS Commands.......................................................................................................................................................................................................................... 28 interfaces bonding <dpFbondx> policy qos <policy-name>............................................................................................................ 28 interfaces bonding <dpFbondx> vif <vif-id> policy qos <policy-name>.................................................................................. 28 interfaces dataplane interface-name policy qos policy-name........................................................................................................ 29 interfaces dataplane <interface-name> vif <vif-id> policy qos <policy-name>................................................................. 29 monitor queuing.............................................................................................................................................................................................................. 30 October 24, 2017 Page 3 © 2017 AT&T Intellectual Property. All rights reserved. AT&T and Globe logo are registered trademarks of AT&T Intellectual Property. AT&T Vyatta 5600 vRouter QoS Configuration Guide, 17.2.0 policy qos............................................................................................................................................................................................................................... 31 policy qos shaper bandwidth..................................................................................................................................................................................
Recommended publications
  • Fortinet and Vyatta Fortinet and Vyatta
    DEPLOYMENT GUIDE Fortinet and Vyatta Fortinet and Vyatta Overview . 3 Deployment Prerequisites . 3 Architecture Overview . 3 Figure 1: Topology.......................................... 3 Partner Configuration....................................... 4 Hardware Installation . 4 Figure 2: Vyatta Dashboard .................................. 4 Figure 3: Vyatta Virtualization ................................ 5 Fortinet Configuration . 5 Figure 4: Vyatta Virtualization Console Access .................. 5 Summary . 6 Access to Vyatta Demo . 6 How To Get Help........................................... 6 2 DEPLOYMENT GUIDE | Fortinet and Vyatta Overview The Brocade 5600 vRouter (formerly Vyatta 5600 vRouter) provides a solution Deployment Prerequisites for network functions virtualization (NFV). It offers easy scalability, a broad set of capabilities, and reliability. The Fortinet and Brocade Vyatta deployment requires the following: In addition, it utilizes Intel Data Plane Development Kit (DPDK) to deliver higher performance, and it can be installed on hypervisors and any x86-based system. 1. Vyatta OS Together, Fortinet and Brocade deliver an industry-leading security and network 2. Supermicro x86-Based Hardware solution. FortiGate virtual firewall products enable customers to deploy branch office 3. FortiGate KVM Firewall services. Customers can deploy virtual CPE (vCPE) combined with industry-leading FortiGate security. The Brocade Vyatta Network OS with Fortinet network security appliances and subscription services provides broad, integrated,
    [Show full text]
  • Poster: Introducing Massbrowser: a Censorship Circumvention System Run by the Masses
    Poster: Introducing MassBrowser: A Censorship Circumvention System Run by the Masses Milad Nasr∗, Anonymous∗, and Amir Houmansadr University of Massachusetts Amherst fmilad,[email protected] ∗Equal contribution Abstract—We will present a new censorship circumvention sys- side the censorship regions, which relay the Internet traffic tem, currently being developed in our group. The new system of the censored users. This includes systems like Tor, VPNs, is called MassBrowser, and combines several techniques from Psiphon, etc. Unfortunately, such circumvention systems are state-of-the-art censorship studies to design a hard-to-block, easily blocked by the censors by enumerating their limited practical censorship circumvention system. MassBrowser is a set of proxy server IP addresses [14]. (2) Costly to operate: one-hop proxy system where the proxies are volunteer Internet To resist proxy blocking by the censors, recent circumven- users in the free world. The power of MassBrowser comes from tion systems have started to deploy the proxies on shared-IP the large number of volunteer proxies who frequently change platforms such as CDNs, App Engines, and Cloud Storage, their IP addresses as the volunteer users move to different a technique broadly referred to as domain fronting [3]. networks. To get a large number of volunteer proxies, we This mechanism, however, is prohibitively expensive [11] provide the volunteers the control over how their computers to operate for large scales of users. (3) Poor QoS: Proxy- are used by the censored users. Particularly, the volunteer based circumvention systems like Tor and it’s variants suffer users can decide what websites they will proxy for censored from low quality of service (e.g., high latencies and low users, and how much bandwidth they will allocate.
    [Show full text]
  • Brocade Vyatta Network OS ALG Configuration Guide, 5.2R1
    CONFIGURATION GUIDE Brocade Vyatta Network OS ALG Configuration Guide, 5.2R1 Supporting Brocade 5600 vRouter, VNF Platform, and Distributed Services Platform 53-1004711-01 24 October 2016 © 2016, Brocade Communications Systems, Inc. All Rights Reserved. Brocade, the B-wing symbol, and MyBrocade are registered trademarks of Brocade Communications Systems, Inc., in the United States and in other countries. Other brands, product names, or service names mentioned of Brocade Communications Systems, Inc. are listed at www.brocade.com/en/legal/ brocade-Legal-intellectual-property/brocade-legal-trademarks.html. Other marks may belong to third parties. Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in this document may require an export license from the United States government. The authors and Brocade Communications Systems, Inc. assume no liability or responsibility to any person or entity with respect to the accuracy of this document or any loss, cost, liability, or damages arising from the information contained herein or the computer programs that accompany it. The product described by this document may contain open source software covered by the GNU General Public License or other open source license agreements. To find out which open source software is included in Brocade products, view the licensing terms applicable to the open source software, and obtain a copy of the programming source code, please visit http://www.brocade.com/support/oscd.
    [Show full text]
  • Managed Firewalls
    DEDICATED HOSTING PRODUCT OVERVIEW MANAGED FIREWALLS Securing your network from malicious activity. Rackspace delivers expertise and service for the world’s leading clouds and technologies. TRUST RACKSPACE And we can help secure your dedicated servers and your cloud, with firewalls from Cisco® and • A leader in the 2017 Gartner Magic Quadrant Juniper Networks — fully supported around the clock by certified Rackspace engineers. Your for Public Cloud Infrastructure Managed Service firewall is dedicated completely to your environment for the highest level of network security Providers, Worldwide and connectivity, and includes access to our Firewall Manager and our One-Hour Hardware • Hosting provider for more than half of the Replacement Guarantee. Fortune 100 • 16+ years of hosting experience WHY RACKSPACE FOR DEDICATED, FULLY MANAGED FIREWALLS? • Customers in 150+ countries You have valuable and confidential information stored on your dedicated and cloud servers. Dedicated firewalls from Cisco and Juniper Networks add an additional layer of security to your servers, helping to stop potentially malicious packets from ever reaching your network. “RACKSPACE’S SECURITY CONTROLS AND REPUTATION AS AN SSAE 16 CERTIFIED KEY BENEFITS PROVIDER HAS BEEN A Highest level of security: Help protect your data and stop potentially malicious packets TREMENDOUS FACTOR IN OUR from entering your network with an IPSec, and Common Criteria EAL4 evaluation status certified firewall. SUCCESS.” DAVID SCHIFFER :: FOUNDER AND PRESIDENT, Expertise: Rackspace security experts fully manage your firewalls 24x7x365. Consult with SAFE BANKING SYSTEMS CISSP-certified security engineers to assess and architect your firewalls to help you meet your security and compliance requirements. Visibility and control: Help protect your infrastructure with deep packet inspection of traffic based on traffic filtering rules you define.
    [Show full text]
  • Brocade Vyatta Network OS Data Sheet
    DATA SHEET Brocade Vyatta Network OS HIGHLIGHTS A Network Operating System for the Way Forward • Offers a proven, modern network The Brocade® Vyatta® Network OS lays the foundation for a flexible, easy- operating system that accelerates the adoption of next-generation to-use, and high-performance network services architecture capable of architectures meeting current and future network demands. The operating system was • Creates an open, programmable built from the ground up to deliver robust network functionality that can environment to enhance be deployed virtually or as an appliance, and in concert with solutions differentiation, service quality, and from a large ecosystem of vendors, to address various Software-Defined competitiveness Networking (SDN) and Network Functions Virtualization (NFV) use cases. • Supports a broad ecosystem for With the Brocade Vyatta Network OS, organizations can bridge the gap optimal customization and service between traditional and new architectures, as well as leverage existing monetization investments and maximize operational efficiencies. Moreover, they can • Simplifies and automates network compose and deploy unique, new services that will drive differentiation functions to improve time to service, increase operational efficiency, and and strengthen competitiveness. reduce costs • Delivers breakthrough performance flexibility, performance, and operational and scale to meet the needs of any A Proven, Modern Operating efficiency, helping organizations create deployment System The Brocade Vyatta Network OS new service offerings and value. Since • Provides flexible deployment options separates the control and data planes in 2012, the benefits of this operating to support a wide variety of use cases software to fit seamlessly within modern system have been proven by the Brocade SDN and NFV environments.
    [Show full text]
  • Deep Packet Inspection Bypass
    Deep Packet Inspection Bypass Thomas Kjøglum Master of Science in Communication Technology Submission date: February 2015 Supervisor: Stig Frode Mjølsnes, ITEM Norwegian University of Science and Technology Department of Telematics 1 Title: Deep Packet Inspection Bypass Student: Thomas Kjøglum Problem description: Authoritarian governments consistently request the network operators to censor internet communications. Deep packet inspection systems and tools are regularly in use for this purpose. Several techniques have been proposed to bypass these communication restrictions. One example is the Kickstarter project titled "Operator, a News Reader that Circumvents Internet Censorship" by Brandon Wiley. Wiley has designed a protocol "Dust" [1] that aims to defeat a number of filtering methods currently in active use to censor Internet communication. Some basic questions are: How is it possible to bypass deep packet inspection filters with high likelihood? On the other hand, could the approach of Dust and other filtering bypass techniques be useful for masquerading malicious code? The candidate will start out by investigating possible techniques for bypassing a open source packet inspection tool, such as SNORT. The candidate will support his experimentation by method of setting up and running hacker competitions (or trials) where the participants’ challenge will be to set up, configure and run efficient deep packet inspection systems directed against various types of "subversive communications" generated by the organizer of the competition. [1] WILEY, Brandon. Dust: A blocking-resistant internet transport protocol. Tech- nical report. http://blanu.net/Dust.pdf, 2011. Responsible professor: Stig Frode Mjølsnes, ITEM Supervisor: Stig Frode Mjølsnes, ITEM Abstract Internet censorship is a problem, where governments and authorities restricts access to what the public can read on the Internet.
    [Show full text]
  • Internet Telephony Digital August Issue 2006
    Where Can You Turn for a Total Solution? As a total solutions provider, NEC understands the complexities today’s converged networks can present to your business. With our proven experience, we know what it takes to help you avoid traveling in the wrong direction. NEC delivers the most choices of IP communications platforms to meet the unique needs of your business. Add to that a strong portfolio of applications and services, and before you know it, your business is traveling in the direction of improved customer experience, enhanced employee productivity, increased revenue generation and maximum return on investment. Why go in different directions when you can focus on a Total Solution? Turn to NEC! www.necunified.com/tmc © 2006 NEC Corporation NEC and the NEC logo are registered trademarks of NEC Corporation. By Greg Galitzine Group Publisher and Editor-In-Chief, Rich Tehrani ([email protected]) EDITORIAL Location, Location, Editorial Director, Greg Galitzine ([email protected]) Associate Editor, Erik Linask ([email protected]) Location TMC LABS Executive Technology Editor/CTO/VP, Tom Keating ([email protected]) Let’s take a trip back to the late 1990s, right ART about the time when every thing connected to Senior Art Director, Lisa D. Morris Art Director, Alan Urkawich telecom was seemingly awash in money, and EXECUTIVE OFFICERS there was WAP, and with WAP there was the Nadji Tehrani, Chairman and CEO Rich Tehrani, President early promise of location-based services. Dave Rodriguez, VP of Publications and Conferences Who remembers this WAP enabled application? You’re walking down the street and, as Kevin J.
    [Show full text]
  • Deep Packet Inspection and Internet Censorship: International Convergence on an ‘Integrated Technology of Control’1
    Deep Packet Inspection and Internet Censorship: International Convergence on an ‘Integrated Technology of Control’1 Ben Wagner, Ludwig-Maximilians-Universität München and Universiteit Leiden Introduction* The academic debate on deep packet inspection (DPI) centres on methods of network management and copyright protection and is directly linked to a wider debate on freedom of speech on the Internet. The debate is deeply rooted in an Anglo-Saxon perspective of the Internet and is frequently depicted as a titanic struggle for the right to fundamentally free and unfettered access to the Internet.2 This debate is to a great extent defined by commercial interests. These interests whether of copyright owners, Internet service providers, 1 (Bendrath 2009) * A first draft of this paper was presented at the 3rd Annual Giganet Symposium in December 2008 in Hyderabad, India. For their advice and support preparing this paper I would like to thank: Ralf Bendrath, Claus Wimmer, Geert Lovink, Manuel Kripp, Hermann Thoene, Paul Sterzel, David Herzog, Rainer Hülsse, Wolfgang Fänderl and Stefan Scholz. 2 (Frieden 2008, 633-676; Goodin 2008; Lehr et al. 2007; Mueller 2007, 18; Zittrain 2008) Deep Packet Inspection and Internet Censorship: International Convergence on an ‘Integrated Technology of Control’1, by Ben Wagner application developers or consumers, are all essentially economic. All of these groups have little commercial interest in restricting free speech as such. However some might well be prepared to accept a certain amount of ‘collateral damage’ to internet free speech in exchange for higher revenues. It can be argued that more transparent and open practices from network service providers are needed regarding filtering policy and the technology used.
    [Show full text]
  • The Essential Guide to Telecommunications, Sixth Edition
    PRAISE FOR THE ESSENTIAL GUIDE TO TELECOMMUNICATIONS, SIXTH EDITION “Dodd’s The Essential Guide to Telecommunications provides the history and context that make a fundamental underpinning of modern business more accessible to technologists and businesspeople alike. This new edition of her primer is an essential reference in the continuously evolving communica- tions landscape.” —Tom Hopcroft, President and CEO, Mass Technology Leadership Council “Annabel Dodd’s book is a clear guide and big-picture view of technologies and industries. It is an up-to-date guide for anyone who wants to be familiar with important innovations and key technologies. This is truly an industry bible for mobile, Internet, and networking services.” —Hiawatha Bray, Technology Reporter, The Boston Globe “Ms. Dodd’s aptly titled The Essential Guide to Telecommunications has been my bible for all things telecom since my days as an AT&T transmission network engineer nearly twenty years ago. Exhaus- tively and meticulously researched, concisely written for lay folks and techs/engineers alike, this book aids me in my current role as an IT Support Technician II when discussing new technology with our telecommunications department. Thank you to Ms. Dodd for keeping us all current!” —Todd Garbarini, IT Support Technician II Commvault Systems, Inc. “The Essential Guide to Telecommunications is probably one of the most useful and well-written books on our telecom bookshelf. Annabel Z. Dodd does a great job of capturing a snapshot of the current telecom industry. Even those with little or no technical training should be able to understand the text. This is the perfect book for salespeople who want to learn more about the products and services they are selling, or for those who just want to keep up to date on the latest in telecom technology.” —William Van Hefner, President, Vantek Communications, Inc.
    [Show full text]
  • ISA09 Paper Ralf Bendrath DPI
    Ralf Bendrath Global technology trends and national regulation: Explaining Variation in the Governance of Deep Packet Inspection Paper prepared for the International Studies Annual Convention New York City, 15-18 February 2009 first draft Updated versions will be available from the author upon request. author contact information Delft University of Technology Faculty of Technology, Policy, and Management Section ICT P.O. Box 5015 2600 GA Delft Netherlands [email protected] http://bendrath.blogspot.com Abstract Technological advances in routers and network monitoring equipment now allow internet service providers (ISPs) to monitor the content of data flows in real-time and make decisions accordingly about how to handle them. If rolled out widely, this technology known as deep packet inspection (DPI) would turn the internet into something completely new, departing from the “dumb pipe” principle which Lawrence Lessig has so nicely compared to a “daydreaming postal worker” who just moves packets around without caring about their content. The internet’s design, we can see here, is the outcome of political and technological decisions and trends. The paper examines the deployment of DPI by internet service providers in different countries, as well as their different motives. In a second step, it will offer a first explanation of the varying cases by examining the different factors promoting as well as constraining the use of DPI, and how they play out in different circumstances. The paper uses and combines theoretical approaches from different strands of research: Sociology of technology, especially the concept of disruptive technologies; and interaction-oriented policy research, namely the approach of actor-centric institutionalism.
    [Show full text]
  • Network Disaggregation at the Edge with the Open SD-Edge Platform
    Network Disaggregation at the Edge With the Open SD-Edge Platform November 11, 2020 Sponsored By: Information Classification: General Today’s Speakers Jennifer Clark, Robert Bays Principal Analyst – Assistant VP Heavy Reading ATT - Vyatta Srikanth Krishnamohan Elad Blatt Director of Product Marketing CSO IP Infusion Silicom Information Classification: General ©Page 2020 3 Omdia NFV in a Production Environment: Leading Use Cases Commercial NFV deployment expectation Information Classification: General Enterprises are Shifting to Managed Services Enterprises are shifting from DIY vCPE to managed services, supporting the same VFNs but with improved security, performance, reliability and cost Information Classification: General Edge deployment barriers • Today, operators are faced with three top challenges to deploying edge: – High costs – Unclear business case – Technical issues Information Classification: General Edge Investment: Everything is a Priority Information Classification: General Network Disaggregation at the Edge With the Open SD-Edge Platform Q&A Information Classification: General DANOS Vyatta Edition 2020-11-11.1 © 2020 AT&T Inc. What is DANOS Vyatta Edition? Gen 2 architecture >700 Subscription Multiple CSPs Vyatta sets vRouter Founded released customers Standardize on Vyatta speed record Domain 2.0 partner Acquires Vyatta Initial release Apr 2005 Oct 2007 Sep 2011 Jan 2013 Jun 2014 Dec 2014 July 2017 Nov 2019 First release 1M Downloads Gen 3 architecture Broadcom Tomahawk Gen 4 architecture EA Oct 2005 Jan 2011 Acquires
    [Show full text]
  • Insight MFR By
    Manufacturers, Publishers and Suppliers by Product Category 11/6/2017 10/100 Hubs & Switches ASCEND COMMUNICATIONS CIS SECURE COMPUTING INC DIGIUM GEAR HEAD 1 TRIPPLITE ASUS Cisco Press D‐LINK SYSTEMS GEFEN 1VISION SOFTWARE ATEN TECHNOLOGY CISCO SYSTEMS DUALCOMM TECHNOLOGY, INC. GEIST 3COM ATLAS SOUND CLEAR CUBE DYCONN GEOVISION INC. 4XEM CORP. ATLONA CLEARSOUNDS DYNEX PRODUCTS GIGAFAST 8E6 TECHNOLOGIES ATTO TECHNOLOGY CNET TECHNOLOGY EATON GIGAMON SYSTEMS LLC AAXEON TECHNOLOGIES LLC. AUDIOCODES, INC. CODE GREEN NETWORKS E‐CORPORATEGIFTS.COM, INC. GLOBAL MARKETING ACCELL AUDIOVOX CODI INC EDGECORE GOLDENRAM ACCELLION AVAYA COMMAND COMMUNICATIONS EDITSHARE LLC GREAT BAY SOFTWARE INC. ACER AMERICA AVENVIEW CORP COMMUNICATION DEVICES INC. EMC GRIFFIN TECHNOLOGY ACTI CORPORATION AVOCENT COMNET ENDACE USA H3C Technology ADAPTEC AVOCENT‐EMERSON COMPELLENT ENGENIUS HALL RESEARCH ADC KENTROX AVTECH CORPORATION COMPREHENSIVE CABLE ENTERASYS NETWORKS HAVIS SHIELD ADC TELECOMMUNICATIONS AXIOM MEMORY COMPU‐CALL, INC EPIPHAN SYSTEMS HAWKING TECHNOLOGY ADDERTECHNOLOGY AXIS COMMUNICATIONS COMPUTER LAB EQUINOX SYSTEMS HERITAGE TRAVELWARE ADD‐ON COMPUTER PERIPHERALS AZIO CORPORATION COMPUTERLINKS ETHERNET DIRECT HEWLETT PACKARD ENTERPRISE ADDON STORE B & B ELECTRONICS COMTROL ETHERWAN HIKVISION DIGITAL TECHNOLOGY CO. LT ADESSO BELDEN CONNECTGEAR EVANS CONSOLES HITACHI ADTRAN BELKIN COMPONENTS CONNECTPRO EVGA.COM HITACHI DATA SYSTEMS ADVANTECH AUTOMATION CORP. BIDUL & CO CONSTANT TECHNOLOGIES INC Exablaze HOO TOO INC AEROHIVE NETWORKS BLACK BOX COOL GEAR EXACQ TECHNOLOGIES INC HP AJA VIDEO SYSTEMS BLACKMAGIC DESIGN USA CP TECHNOLOGIES EXFO INC HP INC ALCATEL BLADE NETWORK TECHNOLOGIES CPS EXTREME NETWORKS HUAWEI ALCATEL LUCENT BLONDER TONGUE LABORATORIES CREATIVE LABS EXTRON HUAWEI SYMANTEC TECHNOLOGIES ALLIED TELESIS BLUE COAT SYSTEMS CRESTRON ELECTRONICS F5 NETWORKS IBM ALLOY COMPUTER PRODUCTS LLC BOSCH SECURITY CTC UNION TECHNOLOGIES CO FELLOWES ICOMTECH INC ALTINEX, INC.
    [Show full text]