
Policy Applications Configuring QoS
page 26-54 OmniSwitch 6800/6850/9000 Network Configuration Guide June 2006
In the following example, flows destined for IP address 40.2.70.200 are redirected to link aggregate 10:
-> policy condition L4LACOND destination IP 40.2.70.200
-> policy action REDIRECTLA redirect linkagg 10
-> policy rule L4LARULE condition L4LACOND action REDIRECTLA
Note that in both examples above, the rules are not active on the switch until the qos apply command is
entered on the command line.
ICMP Policy Example
Policies may be configured for ICMP on a global basis on the switch. ICMP policies may be used for
security (for example, to drop traffic from the ICMP blaster virus).
In the following example, a condition called icmpCondition is created with no other condition parame-
ters:
-> policy condition icmpCondition ip protocol 1
-> policy action icmpAction disposition deny
-> policy rule icmpRule condition icmpCondition action icmpAction
This policy (icmpRule) drops all ICMP traffic. To limit the dropped traffic to ICMP echo requests (pings)
and/or replies, use the policy condition icmptype to specify the appropriate condition. For example,
-> policy condition echo icmptype 8
-> policy condition reply icmptype 0
802.1p and ToS/DSCP Marking and Mapping
802.1p values may be mapped to different 802.lp values on an individual basis or by using a map group. In
addition, ToS or DSCP values may be mapped to 802.1p on a case-by-case basis or via a map group. (Note
that any other mapping combination is not supported.)
Marking is accomplished with the following commands:
policy action 802.1p
policy action tos
policy action dscp
Mapping is accomplished through the following commands:
policy map group
policy action map
Note the following:
• Priority for the flow is based on the policy action. The value specified for 802.1p, ToS, DSCP, or the
map group will determine how the flow is queued.
• The port on which the flow arrives (the ingress port) must be a trusted port. For more information about
trusted ports, see “Trusted and Untrusted Ports” on page 26-22.
In this example, a policy rule (marking) is set up to mark flows from 10.10.3.0 with an 802.1p value of 5:
-> policy condition my_condition source ip 10.10.3.0 mask 255.255.255.0
-> policy action my_action 802.1p 5
-> policy rule marking condition my_condition action my_action
Kommentare zu diesen Handbüchern