H3C Access Controllers Web-Based Configuration Guide(E3703P61 R2509P61 R3709P61 R2609P61 R3509P61)-6W103

HomeSupportConfigure & DeployUser ManualsH3C Access Controllers Web-Based Configuration Guide(E3703P61 R2509P61 R3709P61 R2609P61 R3509P61)-6W103
14-QoS Configuration
Title Size Download
14-QoS Configuration 1.26 MB

Contents

Configuring ACL and QoS· 1

ACL overview·· 1

QoS overview·· 1

Configuration guidelines· 2

Configuring an ACL· 3

Recommended ACL configuration procedures· 3

Adding a time range· 5

Adding an ACL· 6

Configuring a rule for an IPv4 basic ACL· 7

Configuring a rule for an IPv4 advanced ACL· 8

Configuring a rule for an Ethernet frame header ACL· 11

Configuring a rule for a WLAN-AP ACL· 13

Adding an IPv6 ACL· 14

Configuring a rule for an IPv6 basic ACL· 15

Configuring a rule for an IPv6 advanced ACL· 16

Configuring rate limit 19

Configuring the priority trust mode of a port 20

Priority mapping overview·· 20

Configuring priority mapping· 20

Configuring a QoS policy· 23

Class· 23

Traffic behavior 23

Policy· 23

QoS policy configuration procedure· 24

Adding a class· 24

Configuring traffic classification rules· 25

Adding a traffic behavior 28

Configuring actions for a traffic behavior 29

Adding a policy· 32

Configuring classifier-behavior associations for the policy· 32

Applying a policy to a port 33

Applying a QoS policy to a WLAN service· 34

ACL and QoS configuration example· 36

Network requirements· 36

Configuration procedure· 36

Verifying the configuration· 45

Configuring wireless QoS· 46

Overview·· 46

Terminology· 46

WMM protocol overview·· 46

Enabling wireless QoS· 48

Setting the SVP service· 49

Setting CAC admission policy· 50

Setting radio EDCA parameters for APs· 50

Setting EDCA parameters for wireless clients· 51

Configuration restrictions and guidelines· 51

Configuration procedure· 52

Displaying radio statistics· 53

Displaying client statistics· 54

Setting rate limiting· 55

Setting wireless service-based client rate limiting· 55

Setting radio-based client rate limiting· 56

Configuring the bandwidth guarantee function· 57

Setting the reference radio bandwidth· 58

Setting guaranteed bandwidth percents· 58

Enabling bandwidth guaranteeing· 59

Displaying guaranteed bandwidth settings· 60

CAC service configuration example· 60

Network requirements· 60

Configuring the wireless service· 61

Configuring CAC·· 61

Verifying the configuration· 62

Wireless service-based static rate limiting configuration example· 62

Network requirements· 62

Configuring the wireless service· 62

Configuring static rate limiting· 63

Verifying the configuration· 63

Wireless service-based dynamic rate limiting configuration example· 63

Network requirements· 63

Configuring the wireless service· 64

Configuring dynamic rate limiting· 64

Verifying the configuration· 64

Bandwidth guarantee configuration example· 64

Network requirements· 64

Configuring the wireless services· 65

Configuring bandwidth guaranteeing· 65

Verifying the configuration· 66

 


Configuring ACL and QoS

ACL overview

An access control list (ACL) is a set of rules (or permit or deny statements) for identifying traffic based on criteria such as source IP address, destination IP address, and port number.

ACLs are primarily used for packet filtering. You can use ACLs in QoS, security, and other feature modules for identifying traffic. The packet drop or forwarding decisions varies with the modules that use ACLs.

ACLs include the following categories.

 

Category

ACL number

IP version

Match criteria

WLAN ACLs

100 to 199

IPv4 and IPv6

WLAN SSID

WLAN-AP ACLs

200 to 299

IPv4 and IPv6

MAC address and serial ID of a WLAN AP.

Basic ACLs

2000 to 2999

IPv4

Source IPv4 address.

IPv6

Source IPv6 address.

Advanced ACLs

3000 to 3999

IPv4

Source/destination IPv4 address, packet priority, protocols over IPv4, and other Layer 3 and Layer 4 header fields.

IPv6

Source/destination IPv6 address, packet priority, protocols over IPv6, and other Layer 3 and Layer 4 header fields.

Ethernet frame header ACLs

4000 to 4999

IPv4 and IPv6

Layer 2 header fields, such as source and destination MAC addresses, 802.1p priority, and link layer protocol type.

 

For more information about ACL, see ACL and QoS Configuration Guide.

QoS overview

Quality of Service (QoS) is a concept concerning service demand and supply. It reflects the ability to meet customer needs. Generally, QoS does not focus on grading services precisely, but on improving services under certain conditions.

In the Internet, QoS refers to the ability of the network to forward packets. The evaluation on QoS of a network can be based on different aspects because the network might provide various services. Generally, QoS refers to the ability to provide improved service by solving the core issues such as delay, jitter, and packet loss ratio in the packet forwarding process.

Traditional packet forwarding services

On traditional IP networks, devices treat all packets equally and handle them using the first in first out (FIFO) policy. All packets share the resources of the network and devices. The amount of resources the packets can obtain completely depends on the time they arrive. This service is called "best-effort." It delivers packets to their destinations as best it can, without any guarantee for such issues as delay, jitter, packet loss ratio, and reliability.

This service policy is only suitable for applications insensitive to bandwidth and delay, such as WWW, file transfer and email.

New requirements from new applications

The Internet has been growing along with the fast development of networking technologies. More and more users take the Internet as their data transmission platform to implement various applications.

Besides traditional applications such as WWW, email and FTP, network users are implementing new services, such as tele-education, telemedicine, video telephone, videoconference and Video-on-Demand (VoD). The enterprise users expect to connect their regional branches together through VPN technologies to carry out operational applications (for example, to access the database of the company or to monitor remote devices through Telnet).

These new applications have one thing in common, and they all have special requirements for bandwidth, delay, and jitter. For instance, videoconference and VoD need large bandwidth, low delay, and low jitter. Mission-critical applications, such as transactions and Telnet, may not require large bandwidth but require low delay and preferential service during congestion.

The new emerging applications require higher service performance of IP networks. Required network services during packet forwarding include providing dedicated bandwidth, reducing packet loss ratio, managing and avoiding congestion, regulating network traffic, and setting the precedence of packets. To meet these requirements, networks must provide improved services.

For more information about QoS, see ACL and QoS Configuration Guide.

Configuration guidelines

When you configure an ACL and QoS, follow these guidelines:

·     You cannot add an ACL rule with, or modify a rule to have, the same permit/deny statement as an existing rule in the ACL.

·     You can only modify the existing rules of an ACL that uses the match order of config. When modifying a rule of such an ACL, you can choose to change just some of the settings, in which case the other settings remain the same.

·     When you configure rate limit and traffic policing for a behavior, make sure the ratio of CBS to CIR is more than 100:16. Otherwise, the handling for bursty traffic might be affected.

·     If an ACL is referenced by a QoS policy for defining traffic classification rules, the operation of the QoS policy varies by interface (the definition of software/hardware interface varies with device models). The specific process is as follows:

¡     If the QoS policy is applied to a software interface and the referenced ACL rule is a deny clause, the ACL rule does not take effect and packets go to the next classification rule.

¡     If the QoS policy is applied to a hardware interface, packets matching the referenced ACL rule are organized as a class and the behavior defined in the QoS policy applies to the class regardless of whether the referenced ACL rule is a deny or permit clause.

·     If a QoS policy is applied in the outbound direction of a port, the QoS policy cannot influence local packets. Local packets refer to the important protocol packets that maintain the normal operation of the device. QoS must not process such packets to avoid packet drop. Commonly used local packets are: link maintenance packets, ISIS packets, OSPF packets, RIP packets, BGP packets, LDP packets, RSVP packets, and SSH packets and so on.

·     When you configure queuing for a traffic behavior:

¡     In a policy, the total bandwidth assigned to the AF and EF classes cannot be greater than the available bandwidth of the interface to which the policy applies. The total bandwidth percentage assigned to the AF and EF classes cannot be greater than 100%.

¡     In the same policy, the same bandwidth unit must be used to configure bandwidth for AF classes and EF classes, either absolute bandwidth value or percent.

Configuring an ACL

Recommended ACL configuration procedures

Recommended IPv4 basic ACL configuration procedure

IPv4 basic ACLs match packets based only on source IP addresses.

To configure an IPv4 basic ACL:

 

Step

Remarks

1.     Adding a time range

Optional.

A rule referencing a time range takes effect only during the specified time range.

2.     Add an IPv4 basic ACL

Required.

For more information, see "Adding an ACL."

3.     Configuring a rule for an IPv4 basic ACL

Required.

 

Recommended IPv4 advanced ACL configuration procedure

IPv4 advanced ACLs match packets based on source IP addresses, destination IP addresses, packet priorities, protocols over IP, and other protocol header information, such as TCP/UDP source and destination port numbers, TCP flags, ICMP message types, and ICMP message codes.

IPv4 advanced ACLs allow more flexible and accurate filtering than IPv4 basic ACLs.

To configure an IPv4 advanced ACL:

 

Step

Remarks

1.     Adding a time range

Optional.

A rule referencing a time range takes effect only during the specified time range.

2.     Add an IPv4 advanced ACL

Required.

For more information, see "Adding an ACL."

3.     Configuring a rule for an IPv4 advanced ACL

Required.

 

Recommended Ethernet frame header ACL configuration procedure

Ethernet frame header ACLs, also called "Layer 2 ACLs," match packets based on Layer 2 protocol header fields, such as source MAC address, destination MAC address, 802.1p priority (VLAN priority), and link layer protocol type.

To configure an Ethernet frame header ACL:

 

Step

Remarks

1.     Adding a time range

Optional.

A rule referencing a time range takes effect only during the specified time range.

2.     Add an Ethernet frame header ACL

Required.

For more information, see "Adding an ACL."

3.     Configuring a rule for an Ethernet frame header ACL

Required.

 

Recommended WLAN-AP ACL configuration procedure

WLAN-AP ACLs match APs based on MAC addresses or serial IDs of APs.

To configure a WLAN-AP ACL:

 

Step

Remarks

1.     Adding a time range

Optional.

A rule referencing a time range takes effect only during the specified time range.

2.     Add a WLAN-AP ACL

Required.

For more information, see "Adding an ACL."

3.     Configuring a rule for a WLAN-AP ACL

Required.

 

Recommended IPv6 basic ACL configuration procedure

IPv6 basic ACLs match packets based only on source IP addresses.

To configure an IPv6 basic ACL:

 

Step

Remarks

1.     Adding a time range

Optional.

A rule referencing a time range takes effect only during the specified time range.

2.     Add an IPv6 basic ACL

Required.

For more information, see "Adding an IPv6 ACL."

3.     Configuring a rule for an IPv6 basic ACL

Required.

 

Recommended IPv6 advanced ACL configuration procedure

IPv6 advanced ACLs match packets based on the source IPv6 addresses, destination IPv6 addresses, packet priorities, protocols carried over IPv6, and other protocol header fields such as the TCP/UDP source port number, TCP/UDP destination port number, ICMPv6 message type, and ICMPv6 message code.

Compared to IPv6 basic ACLs, IPv6 advanced ACLs allow more flexible and accurate filtering.

To configure an IPv6 advanced ACL:

 

Step

Remarks

1.     Adding a time range

Optional.

A rule referencing a time range takes effect only during the specified time range.

2.     Add an IPv6 advanced ACL

Required.

For more information, see "Adding an IPv6 ACL."

3.     Configuring a rule for an IPv6 advanced ACL

Required.

 

Adding a time range

You can implement ACL rules based on the time of day by applying a time range to them. A time-based ACL rule only takes effect in any time periods specified by the time range.

To add a time range:

1.     Select QoS > Time Range from the navigation tree.

2.     Click the Add tab to enter the time range adding page.

Figure 1 Adding a time range

 

3.     Configure the time range information, as described in Table 1.

4.     Click Apply.

Table 1 Configuration items

Item

Description

Time Range Name

Set the name for the time range.

Periodic Time Range

·     Start Time—Set the start time of the periodic time range.

·     End Time—Set the end time of the periodic time range. The end time must be later than the start time.

·     Sun, Mon, Tue, Wed, Thu, Fri, and Sat—Select the day or days of the week on which the periodic time range is valid. You can select any combination of the days of the week.

NOTE:

These items are available after you select the Periodic Time Range option.

Absolute Time Range

·     From—Set the start time of the absolute time range. The time of the day is in the hh:mm format (24-hour clock), and the date is in the MM/DD/YYYY format.

·     To—Set the end time of the absolute time range. The time of the day is in the hh:mm format (24-hour clock), and the date is in the MM/DD/YYYY format. The end time must be later than the start time.

NOTE:

These items are available after you select the Absolute Time Range option.

 

Adding an ACL

1.     Select QoS > ACL IPv4 from the navigation tree.

2.     Click the Add tab to enter the ACL adding page, as shown in Figure 2.

Figure 2 Adding an ACL

 

3.     Configure the ACL information, as described in Table 2.

4.     Click Apply.

Table 2 Configuration items

Item

Description

ACL Number

Set the number of the ACL.

·     WLAN-AP ACL200 to 299.

·     IPv4 basic ACL2000 to 2999.

·     IPv4 advanced ACL3000 to 3999.

·     Ethernet frame header ACL4000 to 4999.

For an IPv4 basic or advanced ACLs, its ACL number and name must be unique in IPv4.

Match Order

Set the match order of the ACL:

·     Config—Packets are compared against ACL rules in the order that the rules are configured.

·     Auto—Packets are compared against ACL rules in the depth-first match order.

Description

Set the description for the ACL.

 

Configuring a rule for an IPv4 basic ACL

1.     Select QoS > ACL IPv4 from the navigation tree.

2.     Click the Basic Setup tab.

Figure 3 Configuring an IPv4 basic ACL

 

3.     Configure an IPv4 basic ACL, as described in Table 3.

4.     Click Add.

Table 3 Configuration items

Item

Description

ACL

Select the IPv4 basic ACL for which you want to configure rules.

Available ACLs are IPv4 basic ACLs.

Rule ID

Select the Rule ID option and enter a number for the rule.

If you do not specify the rule number, the system assigns one automatically.

IMPORTANT IMPORTANT:

If the rule number you specify already exists, this procedure modifies the configuration of the existing rule.

Action

Select the action to be performed for IPv4 packets matching the rule:

·     Permit—Allows matched packets to pass.

·     Deny—Drops matched packets.

Check Fragment

Select this option to apply the rule to only non-first fragments.

If you do not select this option, the rule applies to all fragments and non-fragments.

NOTE:

Do not select this option for an AC, because an AC does not support fragmentation.

Check Logging

Select this option to keep a log of matched IPv4 packets.

A log entry contains the ACL rule number, operation for the matched packets, protocol that IP carries, source/destination address, source/destination port number, and number of matched packets.

NOTE:

Do not select this option for an AC, because an AC does not support logging.

Source IP Address

Select the Source IP Address option, and enter a source IPv4 address and source wildcard, in dotted decimal notation.

Source Wildcard

Time Range

Select the time range during which the rule takes effect.

 

Configuring a rule for an IPv4 advanced ACL

1.     Select QoS > ACL IPv4 from the navigation tree.

2.     Click the Advanced Setup tab.

Figure 4 Configuring an IPv4 advanced ACL

 

3.     Configure an IPv4 advanced ACL rule, as described in Table 4.

4.     Click Add.

Table 4 Configuration items

Item

Description

ACL

Select the IPv4 advanced ACL for which you want to configure rules.

Available ACLs are IPv4 advanced ACLs.

Rule ID

Select the Rule ID option and enter a number for the rule.

If you do not specify the rule number, the system assigns one automatically.

IMPORTANT IMPORTANT:

If the rule number you specify already exists, this procedure modifies the configuration of the existing rule.

Action

Select the action to be performed for IPv4 packets matching the rule:

·     Permit—Allows matched packets to pass.

·     Deny—Drops matched packets.

Non-First Fragments Only

Select this option to apply the rule to only non-first fragments.

If you do not select this option, the rule applies to all fragments and non-fragments.

NOTE:

Do not select this option for an AC, because an AC does not support fragmentation.

Logging

Select this option to keep a log of matched IPv4 packets.

A log entry contains the ACL rule number, operation for the matched packets, protocol that IP carries, source/destination address, source/destination port number, and number of matched packets.

NOTE:

Do not select this option for an AC, because an AC does not support logging.

IP Address Filter

Source IP Address

Select the Source IP Address option, and enter a source IPv4 address and source wildcard, in dotted decimal notation.

Source Wildcard

Destination IP Address

Select the Destination IP Address option, and enter a destination IP address and destination wildcard, in dotted decimal notation.

Destination Wildcard

Protocol

Select the protocol to be carried by IP.

If you select 1 ICMP, you can configure the ICMP message type and code; if you select 6 TCP or 17 UDP, you can configure the TCP or UDP specific items.

ICMP Type

ICMP Message

Specify the ICMP message type and code.

These items are available only when you select 1 ICMP from the Protocol list.

If you select Other from the ICMP Message list, you must enter values in the ICMP Type and ICMP Code fields. Otherwise, the two fields will take the default values, which cannot be changed.

ICMP Type

ICMP Code

TCP/UDP Port

TCP Connection Established

Select this option to make the rule match packets used for establishing and maintaining TCP connections.

These items are available only when you select 6 TCP from the Protocol list.

Source

Operation

Select the operations, and enter the source port numbers and destination port numbers as required.

These items are available only when you select 6 TCP or 17 UDP from the Protocol list.

Different operations have different configuration requirements for the port number fields:

·     Not Check—The following port number fields cannot be configured.

·     Range—The following port number fields must be configured to define a port range.

·     Other values—The first port number field must be configured and the second port number field must not.

Port

-

Destination

Operation

Port

-

Precedence Filter

DSCP

Specify the DSCP value.

TOS

Specify the ToS preference.

Precedence

Specify the IP precedence.

Time Range

Select the time range during which the rule takes effect.

 

Configuring a rule for an Ethernet frame header ACL

1.     Select QoS > ACL IPv4 from the navigation tree.

2.     Click the Link Setup tab.

Figure 5 Configuring a rule for an Ethernet frame header ACL

 

3.     Configure an Ethernet frame header ACL rule, as described in Table 5.

4.     Click Add.

Table 5 Configuration items

Item

Description

ACL

Select the Ethernet frame header ACL for which you want to configure rules.

Available ACLs are Ethernet frame header ACLs.

Rule ID

Select the Rule ID option and enter a number for the rule.

If you do not specify the rule number, the system assigns one automatically.

IMPORTANT IMPORTANT:

If the rule number you specify already exists, this procedure modifies the configuration of the existing rule.

Action

Select the action to be performed for Layer 2 frames matching the rule:

·     Permit—Allows matched frames to pass.

·     Deny—Drops matched frames.

MAC Address Filter

Source MAC Address

Select the Source MAC Address option and enter a source MAC address and wildcard.

Source Mask

Destination MAC Address

Select the Destination MAC Address option and enter a destination MAC address and wildcard.

Destination Mask

COS(802.1p priority)

Specify the 802.1p priority for the rule.

Type Filter

LSAP Type

Select the LSAP Type option and specify the DSAP and SSAP fields in the LLC encapsulation by configuring the following items:

·     LSAP TypeFrame encapsulation format.

·     LSAP Mask—LSAP wildcard.

TIP TIP:

The AC does not support the LSAP Type or Protocol Type option. They do not take effect after being configured.

LSAP Mask

Protocol Type

Select the Protocol Type option and specify the link layer protocol type by configuring the following items:

·     Protocol TypeFrame type. It corresponds to the type-code field of Ethernet_II and Ethernet_SNAP frames.

·     Protocol MaskWildcard.

Protocol Mask

Time Range

Select the time range during which the rule takes effect.

 

Configuring a rule for a WLAN-AP ACL

1.     Select QoS > ACL IPv4 from the navigation tree.

2.     Click the Wlan Setup tab.

Figure 6 Configuring a WLAN-AP ACL

 

3.     Configure a WLAN-AP ACL rule as described in Table 6.

4.     Click Add.

Table 6 Configuration items

Item

Description

ACL

Select the WLAN-AP ACL for which you want to configure rules.

Rule ID

Specify an ID for the rule.

If you do not specify the rule ID, the system will assign one automatically.

If the rule ID you specify already exists, the following operations modify the configuration of the rule.

Action

Select the action to be performed for APs matching the rule:

·     Permit—Allows matched APs.

·     Deny—Drops matched APs.

MAC address

Set the MAC address range of APs.

MAC Mask

Serial ID

Set the serial ID of an AP.

 

Adding an IPv6 ACL

1.     Select QoS > ACL IPv6 from the navigation tree.

2.     Click the Add tab.

Figure 7 Adding an IPv6 ACL

 

3.     Configure the IPv6 ACL information, as described in Table 7.

4.     Click Apply.

Table 7 Configuration items

Item

Description

ACL Number

Enter a number for the IPv6 ACL.

·     IPv6 basic ACL2000 to 2999.

·     IPv6 advanced ACL3000 to 3999.

For an IPv6 basic or advanced ACLs, its ACL number and name must be unique in IPv6.

Match Order

Select a match order for the ACL:

·     Config—Packets are compared against ACL rules in the order the rules are configured.

·     Auto—Packets are compared against ACL rules in the depth-first match order.

Description

Set the description for the ACL.

 

Configuring a rule for an IPv6 basic ACL

1.     Select QoS > ACL IPv6 from the navigation tree

2.     Click the Basic Setup tab.

Figure 8 Configuring a rule for an IPv6 basic ACL

 

3.     Configure the IPv6 basic ACL rule information, as described in Table 8.

4.     Click Add.

Table 8 Configuration items

Item

Description

Select Access Control List (ACL)

Select the IPv6 basic ACL for which you want to configure rules.

Available ACLs are IPv6 basic ACLs.

Rule ID

Select the Rule ID option and enter a number for the rule.

If you do not specify the rule number, the system assigns one automatically.

IMPORTANT IMPORTANT:

If the rule number you specify already exists, this procedure modifies the configuration of the existing rule.

Operation

Select the operation to be performed for IPv6 packets matching the rule:

·     Permit—Allows matched packets to pass.

·     Deny—Drops matched packets.

Check Fragment

Select this option to apply the rule to only non-first fragments.

If you do not select this option, the rule applies to all fragments and non-fragments.

NOTE:

Do not select this option for an AC, because an AC does not support fragmentation.

Check Logging

Select this option to keep a log of matched IPv6 packets.

A log entry contains the ACL rule number, operation for the matched packets, protocol that IP carries, source/destination address, source/destination port number, and number of matched packets.

NOTE:

Do not select this option for an AC, because an AC does not support logging.

Source IP Address

Select the Source IP Address option, and enter a source IPv6 address and prefix length.

The IPv6 address must be in a format like X:X::X:X. An IPv6 address consists of eight 16-bit long fields, each of which is expressed with two hexadecimal numbers and separated from its neighboring fields by colon (:).

Source Prefix

Time Range

Select the time range during which the rule takes effect.

 

Configuring a rule for an IPv6 advanced ACL

1.     Select QoS > ACL IPv6 from the navigation tree

2.     Click the Advanced Setup tab.

Figure 9 Configuring a rule for an IPv6 advanced ACL

 

3.     Configure the IPv6 advanced ACL rule information, as described in Table 9.

4.     Click Add.

Table 9 Configuration items

Item

Description

Select Access Control List (ACL)

Select the IPv6 advanced ACL for which you want to configure rules.

Available ACLs are IPv6 advanced ACLs.

Rule ID

Select the Rule ID option and enter a number for the rule.

If you do not specify the rule number, the system assigns one automatically.

IMPORTANT IMPORTANT:

If the rule number you specify already exists, this procedure modifies the configuration of the existing rule.

Operation

Select the operation to be performed for IPv6 packets matching the rule:

·     Permit—Allows matched packets to pass.

·     Deny—Drops matched packets.

Check Fragment

Select this option to apply the rule to only non-first fragments.

If you do not select this option, the rule applies to all fragments and non-fragments.

NOTE:

Do not select this option for an AC, because an AC does not support fragmentation.

Check Logging

Select this option to keep a log of matched IPv6 packets.

A log entry contains the ACL rule number, operation for the matched packets, protocol that IP carries, source/destination address, source/destination port number, and number of matched packets.

NOTE:

Do not select this option for an AC, because an AC does not support logging.

IP Address Filter

Source IP Address

Select the Source IP Address option, and enter a source IPv6 address and prefix length.

The IPv6 address must be in a format like X:X::X:X. An IPv6 address consists of eight 16-bit long fields, each of which is expressed with two hexadecimal numbers and separated from its neighboring fields by colon (:).

Source Prefix

Destination IP Address

Select the Destination IP Address option, and enter a destination IPv6 address and prefix length.

The IPv6 address must be in a format like X:X::X:X. An IPv6 address consists of eight 16-bit long fields, each of which is expressed with two hexadecimal numbers and separated from its neighboring fields by colon (:).

Destination Prefix

Protocol

Select the protocol to be carried by IP.

If you select 58 ICMPv6, you can configure the ICMPv6 message type and code. If you select 6 TCP or 17 UDP, you can configure the TCP or UDP specific items.

ICMPv6 Type

Named ICMPv6 Type

Specify the ICMPv6 message type and code.

These items are available only when you select 58 ICMPv6 from the Protocol list.

If you select Other from the Named ICMPv6 Type list, you must enter values in the ICMPv6 Type and ICMPv6 Code fields. Otherwise, the two fields will take the default values, which cannot be changed.

ICMPv6 Type

ICMPv6 Code

TCP/UDP Port

Source

Operator

Select the operators, and enter the source port numbers and destination port numbers as required.

These items are available only when you select 6 TCP or 17 UDP from the Protocol list.

Different operators have different configuration requirements for the port number fields:

·     Not Check—The following port number fields cannot be configured.

·     Range—The following port number fields must be configured to define a port range.

·     Other values—The first port number field must be configured and the second must not.

Port

To Port

Destination

Operator

Port

Port

Time Range

Select the time range during which the rule takes effect.

 

Configuring rate limit

Rate limit uses token buckets to control traffic. The rate limit of a physical interface specifies the maximum rate for forwarding packets (including critical packets). Rate limit can limit all the packets passing a physical interface.

To configure rate limit:

1.     Select QoS > Line rate from the navigation tree.

2.     Click the Setup tab.

Figure 10 Configuring rate limit on a port

 

3.     Configure rate limit, as described in Table 10.

4.     Click Apply.

Table 10 Configuration items

Item

Description

Please select an interface type

Select the types of interfaces to be configured with rate limit.

The interface types available for selection depend on your device model.

Rate Limit

Select Enable or Disable to enable or disable rate limit on the specified port.

Direction

Select a direction to which the rate limit is to be applied:

·     Inbound—Limits the rate of packets received by the specified port.

·     Outbound—Limits the rate of packets sent by the specified port.

CIR

Set the committed information rate (CIR), the average traffic rate.

CBS

Set the committed burst size (CBS), number of bits that can be sent in each interval.

EBS

Set the excess burst size (EBS).

This configuration item is not supported.

Please select port(s)

Specify the ports to be configured with rate limit.

Click the ports to be configured with rate limit in the port list. You can select one or more ports.

 

Configuring the priority trust mode of a port

Priority mapping overview

When a packet enters a device, the device assigns a set of QoS priority parameters to the packet based on a certain priority field carried in the packet and sometimes might modify its priority, according to certain rules depending on device status. This process is called "priority mapping". The set of QoS priority parameters decides the scheduling priority and forwarding priority of the packet.

The device provides various types of priority mapping tables, or rather, priority mappings. By looking up a priority mapping table, the device decides which priority value is to assign to a packet for subsequent packet processing.

You can configure priority mapping by configuring trusting packet priority or trusting port priority.

·     If packet priority is trusted, the device uses the specified priority field of the incoming packet to look up the priority mapping tables for the set of QoS priority parameters to assign to the packet. Note that, if a received packet does not carry the specified priority field, the device uses the port priority to look up the priority mapping tables for the set of QoS priority parameters to assign to the packet.

·     If port priority is trusted, the device uses the port priority rather than packet priority to look up the priority mapping tables for the set of QoS priority parameters to assign to the packet.

Configuring priority mapping

Two methods are available for you to configure the priority trust mode on a port for priority mapping:

·     By using the first method, you can configure a port to use the 802.1p or 802.11e priority carried in received packets for priority mapping. This method is supported for the WLAN-ESS interface in addition to other types of interface.

·     By using the second method, more options are available. In addition, you can change port priority (local precedence) of a port for priority mapping. This method is not supported on the WLAN-ESS interface.

Configuring the trust mode

1.     Select QoS > Trust Mode from the navigation tree.

Figure 11 Configuring priority trust mode

 

2.     Configure the priority trust mode of the interfaces, as described in Table 11.

3.     Click Apply.

Table 11 Configuration items

Item

Description

Please select the interface type

Select the type of the ports to be configured. The interface types available for selection depend on your device model.

IMPORTANT IMPORTANT:

If a WLAN-ESS interface in use has WLAN-DBSS interfaces created on it, its priority cannot be modified. To modify the priority of the WLAN-ESS interface, you must stop the service the interface provides (make the current users on the interface offline).

Trust Mode

Select the priority trust mode:

·     Dot1p—Uses the 802.1p priority of received packets for mapping.

·     Dscp—Uses the DSCP value of received packets for mapping.

·     Dot11e—Uses the 802.11e priority of received packets for mapping. This option is applicable to only WLAN-ESS interfaces.

IMPORTANT IMPORTANT:

Support for priority trust modes depends on the interface type. The supported priority trust modes are shown in the Trust Mode list.

(Select the ports)

Specify the ports to be configured.

Click the ports to be configured in the port list. You can select one or more ports.

 

Configuring the port priority

1.     Select QoS > Port Priority from the navigation tree.

Figure 12 Port priority

 

2.     Click the  icon for a port to enter the page for configuring the priority and priority trust mode of the port.

Figure 13 Modifying the port priority

 

3.     Set the port priority, as described in Table 12.

4.     Click Apply.

Table 12 Configuration items

Item

Remarks

Interface Name

Name of the interface to be configured.

Priority

Set the local precedence value for the port.

Local precedence is allocated by the device and has only local significance. A local precedence value corresponds to an output queue. A packet with higher local precedence is assigned to a higher priority output queue to be preferentially scheduled.

Trust Mode

Set the priority trust mode of the port:

·     Untrust—Uses the port priority rather than a packet priority value for priority mapping.

·     Dot1p—Uses the 802.1p priority of received packets for priority mapping.

·     DSCP—Uses the DSCP value of received packets for priority mapping.

IMPORTANT IMPORTANT:

Support for priority trust modes depends on the interface type.

 

Configuring a QoS policy

A QoS policy defines what QoS actions to take on what class of traffic for purposes such as traffic shaping or traffic policing. Before configuring a QoS policy, be familiar with these concepts: class, traffic behavior, and policy.

Class

Classes identify traffic.

A class is identified by a class name and contains some match criteria for identifying traffic. The relationship between the criteria can be:

·     AND—A packet is considered belonging to a class only when the packet matches all the criteria in the class.

·     OR—A packet is considered belonging to a class if it matches any of the criteria in the class. 

Traffic behavior

A traffic behavior, identified by a name, defines a set of QoS actions for packets.

Policy

A policy associates a class with a traffic behavior to define what actions to take on which class of traffic.

You can define multiple class-traffic behavior associations in a policy.

You can apply a policy to a port to regulate traffic sent or received on the port. A QoS policy can be applied to multiple ports, but in one direction (inbound or outbound) of a port, only one QoS policy can be applied.

QoS policy configuration procedure

Step

Remarks

1.     Adding a class

Required.

Add a class and specify the operation of the class.

2.     Configuring traffic classification rules

Required.

Configure match criteria for the class.

3.     Adding a traffic behavior

Required.

Add a traffic behavior.

4.     Configuring actions for a traffic behavior

Use either method.

Configure various actions for the traffic behavior.

5.     Adding a policy

Required.

Add a policy.

6.     Configuring classifier-behavior associations for the policy

Required.

Associate a traffic behavior with a class in the QoS policy.

You can associate a class with only one traffic behavior in a QoS policy. If a class is associated with multiple traffic behaviors, the last associated one takes effect.

7.     Apply the policy:

¡     Applying a policy to a port

¡     Applying a QoS policy to a WLAN service

Use either method.

Apply the QoS policy to a port or a WLAN service.

 

Adding a class

1.     Select QoS > Classifier from the navigation tree.

2.     Click the Add tab.

Figure 14 Adding a class

 

3.     Configure the class information, as described in Table 13.

4.     Click Add.

Table 13 Configuration items

Item

Description

Classifier Name

Specify a name for the classifier to be added.

Operation

Specify the logical relationship between rules of the classifier:

·     And—Specifies the relationship between the rules in a class as logic AND. The device considers a packet belongs to a class only when the packet matches all the rules in the class.

·     Or—Specifies the relationship between the rules in a class as logic OR. The device considers a packet belongs to a class as long as the packet matches one of the rules in the class.

 

Configuring traffic classification rules

1.     Select QoS > Classifier from the navigation tree.

2.     Click the Setup tab.

Figure 15 Configuring classification rules

 

3.     Configuration classification rules, as described in Table 14.

4.     Click Apply.

A progress dialog box appears.

5.     Click Close on the progress dialog box when the progress dialog box prompts that the configuration succeeds.

Table 14 Configuration items

Item

Description

Please select a classifier

Select an existing classifier in the list.

Any

Define a rule to match all packets.

Select the option to match all packets.

DSCP

Define a rule to match DSCP values.

If multiple rules are configured for a class, the new configuration does not overwrite the previous.

You can configure up to eight DSCP values at a time. If multiple identical DSCP values are specified, the system considers them as a single value. The relationship between different DSCP values is OR. After configuration, all the DSCP values are arranged in ascending order automatically.

IP Precedence

Define a rule to match IP precedence values.

If multiple rules are configured for a class, the new configuration does not overwrite the previous.

You can configure up to eight IP precedence values at a time. If multiple identical IP precedence values are specified, the system considers them as a single value. The relationship between different IP precedence values is OR. After configuration, all the IP precedence values are arranged in ascending order automatically.

Classifier

Define a rule to match a QoS class.

TIP TIP:

This configuration item is not supported.

Inbound Interface

Define a rule to match inbound interfaces.

TIP TIP:

This configuration item is not supported.

RTP Port

Define a rule to match a range of RTP ports.

Specify the start port in the from field and the end port in the to field.

TIP TIP:

This configuration item is not supported.

Dot1p

Service 802.1p

Define a rule to match the service 802.1p precedence values.

If multiple rules are configured for a class, the new configuration does not overwrite the previous.

You can configure up to eight Dot1p values at a time. If multiple identical Dot1p values are specified, the system considers them as a single value. The relationship between different Dot1p values is OR. After configuration, all the Dot1p values are arranged in ascending order automatically.

TIP TIP:

This configuration item is not supported.

Customer 802.1p

Define a rule to match the customer 802.1p precedence values.

If multiple rules are configured for a class, the new configuration does not overwrite the previous.

You can configure up to eight Dot1p values at a time. If multiple identical Dot1p values are specified, the system considers them as a single value. The relationship between different Dot1p values is OR. After configuration, all the Dot1p values are arranged in ascending order automatically.

MAC

Source MAC

Define a rule to match a source MAC address.

If multiple rules are configured for a class, the new configuration does not overwrite the previous.

A rule to match a source MAC address is significant only to Ethernet interfaces.

Destination MAC

Define a rule to match a destination MAC address.

If multiple rules are configured for a class, the new configuration does not overwrite the previous.

A rule to match a destination MAC address is significant only to Ethernet interfaces.

VLAN

Service VLAN

Define a rule to match service VLAN IDs.

If multiple rules are configured for a class, the new configuration does not overwrite the previous.

You can configure multiple VLAN IDs at a time. If the same VLAN ID is specified multiple times, the system considers them as a single value. The relationship between different VLAN IDs is logical OR. You can specify VLAN IDs by using one of the following methods:

·     Enter a range of VLAN IDs, such as 10-500. The number of VLAN IDs in the range is not limited.

·     Specify a combination of individual VLAN IDs and VLAN ID ranges, such as 3, 5-7, 10. You can specify up to eight VLAN IDs.

TIP TIP:

This configuration item is not supported.

Customer VLAN

Define a rule to match customer VLAN IDs.

If multiple rules are configured for a class, the new configuration does not overwrite the previous.

You can configure multiple VLAN IDs at a time. If the same VLAN ID is specified multiple times, the system considers them as a single value. The relationship between different VLAN IDs is logical OR. You can specify VLAN IDs in two ways:

·     Enter a range of VLAN IDs, such as 10-500. The number of VLAN IDs in the range is not limited.

·     Specify a combination of individual VLAN IDs and VLAN ID ranges, such as 3, 5-7, 10. You can specify up to eight VLAN IDs in this way.

ACL

ACL IPv4

Define an IPv4 ACL-based rule.

ACL IPv6

Define an IPv6 ACL-based rule.

 

Adding a traffic behavior

1.     Select QoS > Behavior from the navigation tree.

2.     Click the Add tab.

3.     Set the traffic behavior name.

4.     Click Add.

Figure 16 Adding a traffic behavior

 

Configuring actions for a traffic behavior

1.     Select QoS > Behavior from the navigation tree.

2.     Click the Setup tab.

Figure 17 Setting a traffic behavior

 

3.     Configure the traffic behavior actions, as described in Table 15.

4.     Click Apply.

A progress dialog box appears.

5.     Click Close on the progress dialog box when the progress dialog box prompts that the configuration succeeds.

Table 15 Configuration items

Item

Description

Please select a behavior

Select an existing behavior in the list.

CAR

Enable/Disable

Enable or disable CAR

CIR

Set the committed information rate (CIR), the average traffic rate.

CBS

Set the committed burst size (CBS), number of bits that can be sent in each interval.

Red

Discard

Set the action to perform for exceeding packets.

After selecting the Red option, you can select one of the following options:

·     Discard—Drops the exceeding packet.

·     Pass—Permits the exceeding packet to pass through.

·     Remark DSCP PassSets a DSCP value for the exceeding packet and then sends it.

Pass

Remark

IP Precedence

Configure the action of marking IP precedence for packets.

Select the IP Precedence option and then select the IP precedence value to be marked for packets in the following list. Select Not Set to cancel the action of marking IP precedence.

TIP TIP:

This configuration item is not supported.

Dot1p

Configure the action of marking 802.1p precedence for packets.

Select the Dot1p option and then select the 802.1p precedence value to be marked for packets in the following list. Select Not Set to cancel the action of marking 802.1p precedence.

Local Precedence

Configure the action of marking local precedence for packets.

Select the Local Precedence option and then select the local precedence value to be marked for packets in the following list. Select Not Set to cancel the action of marking local precedence.

DSCP

Configure the action of marking DSCP values for packets.

Select the DSCP option and then select the DSCP value to be marked for packets in the following list. Select Not Set to cancel the action of marking DSCP values.

TIP TIP:

This configuration item is not supported.

Queue

EF

Max Bandwidth

Configure the maximum bandwidth for Expedited Forwarding (EF).

TIP TIP:

These configuration items are not supported.

CBS

Configure the CBS for EF.

Percent

Configure the percent of available bandwidth for EF.

CBS-Ratio

Configure the ratio of CBS to CIR for EF.

AF

Min Bandwidth

Configure the minimum guaranteed bandwidth for Assured Forwarding (AF).

Percent

Configure the percent of available bandwidth for AF.

WFQ

Configure WFQ for the default class by entering the total number of fair queues, which must be the power of two.

Filter

Configure the packet filtering action.

After selecting the Filter option, select one item in the following list:

·     Permit—Forwards the packet.

·     Deny—Drops the packet.

·     Not Set—Cancels the packet filtering action.

Accounting

Configure the traffic accounting action.

Select the Accounting option and select Enable or Disable in the following list to enable/disable the traffic accounting action.

TIP TIP:

This configuration item is not supported.

 

Adding a policy

1.     Select QoS > QoS Policy from the navigation tree.

2.     Click the Add tab.

3.     Set the policy name.

4.     Click Add.

Figure 18 Adding a policy

 

Configuring classifier-behavior associations for the policy

1.     Select QoS > QoS Policy from the navigation tree.

2.     Click the Setup tab.

Figure 19 Setting a policy

 

3.     Configure classifier-behavior associations, as described in Table 16.

4.     Click Apply.

Table 16 Configuration items

Item

Description

Please select a policy

Select an existing policy in the list.

Classifier Name

Select an existing classifier in the list.

Behavior Name

Select an existing behavior in the list.

 

Applying a policy to a port

1.     Select QoS > Port Policy from the navigation tree.

2.     Click the Setup tab.

Figure 20 Applying a policy to a port

 

3.     Select a policy and apply the policy to the specified ports, as described in Table 17.

4.     Click Apply.

Table 17 Configuration items

Item

Description

Please select a policy

Select an existing policy in the list.

Direction

Set the direction in which you want to apply the policy:

·     Inbound—Applies the policy to the incoming packets of the specified ports.

·     Outbound—Applies the policy to the outgoing packets of the specified ports.

Please select port(s)

Click the ports to which the QoS policy is to be applied in the port list. You can select one or more ports.

 

Applying a QoS policy to a WLAN service

1.     Select QoS > Service Policy from the navigation tree.

Figure 21 Service policy

 

2.     Click the  icon for a wireless service.

Figure 22 Service policy setup

 

3.     Apply the policy to the wireless service, as described in Table 18.

4.     Click Apply.

Table 18 Configuration items

Item

Remarks

WLAN ID

Display the selected WLAN ID.

WLAN Service

Display the specified WLAN service to which you want to apply a QoS policy.

Inbound Policy

Apply the QoS policy to the packets received by the wireless service.

Outbound Policy

Apply the QoS policy to the packets sent by the wireless service.

Trust Mode

Set the priority trust mode:

·     Untrust—Trusts the port priority.

·     Dscp—Uses the DSCP values of received packets for mapping.

·     802.11e—Uses the 802.11e priority of received 802.11 packets for mapping.

QoS Priority

Set the local precedence value.

 

ACL and QoS configuration example

Network requirements

As shown in Figure 23, in the WLAN, the FTP server (10.1.1.1/24) is connected to the AC (SSID: service1), and the wireless clients are connected to the AC through APs and a Layer 2 switch and access the network resources.

Configure an ACL and a QoS policy on the AC to prohibit the wireless clients from accessing the FTP server from 8:00 to 18:00 every day:

1.     Add an ACL to prohibit the hosts from accessing the FTP server from 8:00 to 18:00 every day.

2.     Configure a QoS policy to drop the packets matching the ACL.

3.     Apply the QoS policy in the inbound direction of the wireless service named service1.

Figure 23 Network diagram

 

Configuration procedure

Before performing the following configurations, make sure the AC has been configured with wireless service service1. For more information about the wireless service configuration, see "Configuring access services."

1.     Define a time range to cover the time range from 8:00 to 18:00 every day:

a.     Select QoS > Time Range from the navigation tree.

b.     Click the Add tab.

c.     On the page as shown in Figure 24, enter the time range name test-time, select the Periodic Time Range option, set the Start Time to 8:00 and the End Time to 18:00, and select the options Sun through Sat.

d.     Click Apply.

Figure 24 Defining a time range covering 8:00 to 18:00 every day

 

2.     Add an IPv4 advanced ACL:

a.     Select QoS > ACL IPv4 from the navigation tree.

b.     Click the Add tab.

c.     Enter the ACL number 3000.

d.     Click Apply.

Figure 25 Adding an IPv4 advanced ACL

 

3.     Define an ACL rule for traffic to the FTP server:

a.     Click the Advanced Setup tab.

b.     On the page as shown in Figure 26, select 3000 in the ACL list, select the Rule ID option, and enter rule ID 2.

c.     Select Permit in the Action list.

d.     Select the Destination IP Address option, and enter IP address 10.1.1.1 and destination wildcard 0.0.0.0.

e.     Select test-time in the Time Range list.

f.     Click Add.

Figure 26 Defining an ACL rule for traffic to the FTP server

 

4.     Add a class:

a.     Select QoS > Classifier from the navigation tree.

b.     Click the Add tab.

c.     On the page as shown in Figure 27, enter the class name class1.

d.     Click Add.

Figure 27 Adding a class

 

5.     Define classification rules:

a.     Click the Setup tab.

b.     On the page as shown in Figure 28, select the class name class1 in the list, select the ACL IPv4 option, and select ACL 3000 in the following list.

c.     Click Apply.

A progress dialog box appears.

d.     Click Close on the progress dialog box when the progress dialog box prompts that the configuration succeeds.

Figure 28 Defining classification rules

 

6.     Add a traffic behavior:

a.     Select QoS > Behavior from the navigation tree.

b.     Click the Add tab.

c.     On the page as shown in Figure 29, enter the behavior name behavior1.

d.     Click Add.

Figure 29 Adding a traffic behavior

 

7.     Configure actions for the traffic behavior:

a.     Click the Setup tab.

b.     On the page as shown in Figure 30, select behavior1 in the list, select the Filter option, and then select Deny in the following list.

c.     Click Apply.

A progress dialog box appears.

d.     Click Close when the progress dialog box prompts that the configuration succeeds.

Figure 30 Configuring actions for the behavior

 

8.     Add a policy:

a.     Select QoS > QoS Policy from the navigation tree.

b.     Click the Add tab.

c.     On the page as shown in Figure 31, enter the policy name policy1.

d.     Click Add.

Figure 31 Adding a policy

 

9.     Configure classifier-behavior associations for the policy:

a.     Click the Setup tab.

b.     On the page as shown in Figure 32, select policy1, select class1 in the Classifier Name list, and select behavior1 in the Behavior Name list.

c.     Click Apply.

Figure 32 Configuring classifier-behavior associations for the policy

 

10.     Apply the QoS policy in the inbound direction of the wireless service named service1:

a.     Select QoS > Service Policy from the navigation tree.

b.     Click the icon_mdf icon for wireless service service1.

c.     On the page as shown in Figure 33, select the Inbound Policy option, and select policy1 from the following list.

d.     Click Apply.

Figure 33 Applying the QoS policy in the inbound direction of WLAN service service1

 

Verifying the configuration

After you complete these configurations, the QoS policy is successfully applied to the wireless service named service1. The wireless clients cannot access the FTP server at IP address 10.1.1.1/24 from 8:00 to 18:00 every day, but they can do that at any other time.

 


Configuring wireless QoS

Overview

An 802.11 network offers wireless access based on the carrier sense multiple access with collision avoidance (CSMA/CA) channel contention. All clients accessing the WLAN have equal channel contention opportunities. All applications carried on the WLAN use the same channel contention parameters. A live WLAN, however, is required to provide differentiated access services to address diversified requirements of applications for bandwidth, delay, and jitter.

When IEEE 802.11e was being standardized, Wi-Fi Alliance defined the Wi-Fi Multimedia (WMM) standard to allow QoS provision devices of different vendors to interoperate. WMM makes a WLAN network capable of providing QoS services.

Terminology

WMM

WMM is a wireless QoS protocol designed to preferentially transmit packets with high priority, and guarantees better QoS services for voice and video applications in a wireless network.

EDCA

Enhanced distributed channel access (EDCA) is a channel contention mechanism designed by WMM to preferentially transmit packets with high priority and allocate more bandwidth to such packets.

AC  

WMM uses access categories (ACs) for handling channel contentions. WMM assigns WLAN data to four access categories: AC-VO (voice), AC-VI (video), AC-BE (best-effort), and AC-BK (background), in the descending order of priority. Each access category uses an independent priority queue for transmitting data. When contention occurs, WMM guarantees that a high-priority access category preempts a low-priority access category.

CAC

Connection admission control (CAC) limits the number of clients that are using high-priority access categories (AC-VO and AC-VI) to guarantee sufficient bandwidth for existing high-priority traffic.

U-APSD

Unscheduled automatic power-save delivery (U-APSD) is a new power saving mechanism defined by WMM to enhance the power saving capability of clients.

SVP

SpectraLink voice priority (SVP) is a voice priority protocol designed by the Spectralink company to guarantee QoS for voice traffic.

WMM protocol overview

The distributed coordination function (DCF) in 802.11 stipulates that access points (APs) and clients use the CSMA/CA access mechanism. APs or clients listen to the channel before they hold the channel for data transmission. When the specified idle duration of the channel times out, APs or clients randomly select a backoff slot within the contention window to perform backoff. The device that finishes backoff first gets the channel. With 802.11, all devices have the same idle duration and contention window. They are equal when contending for a channel. In WMM, this fair contention mechanism is changed.

EDCA parameters

WMM assigns data packets to four access categories. By allowing a high-priority access category to have more channel contention opportunities than a low-priority access category, WMM offers different service levels to access categories.

WMM define a set of EDCA parameters for each access category, covering the following:

·     Arbitration inter-frame spacing number (AIFSN)—Different from the 802.11 protocol where the idle duration (set using DIFS) is a constant value, WMM can define an idle duration per access category. The idle duration increases as the AIFSN value increases (see Figure 34 for the AIFS durations).

·     Exponent of CWmin (ECWmin) and exponent of CWmax (ECWmax)—Determine the average backoff slots, which increases as the two values increase (see Figure 34 for the backoff slots).

·     Transmission opportunity limit (TXOPLimit)—Indicates the maximum time for which a user can hold a channel after a successful contention. The greater the TXOPLimit, the longer the user can hold the channel. The value 0 indicates that the user can send only one packet each time it holds the channel.

Figure 34 Per-AC channel contention parameters in WMM

 

CAC admission policies

CAC requires that a client obtain permission of the AP before it can use a high-priority access category for transmission, and guarantees bandwidth to the clients that have gained access. CAC controls real-time traffic (AC-VO and AC-VI traffic) but not common data traffic (AC-BE and AC-BK traffic).

To use a high-priority access category, a client must send a request to the AP. The AP returns a positive or negative response based on either of the following admission control policy:

·     Channel utilization-based admission policy—The AP calculates the total time that the existing high-priority access categories occupy the channel in one second, and then calculates the time that the requesting traffic will occupy the channel in one second. If the sum of the two values is smaller than or equal to the maximum hold time of the channel, the client can use the requested access category. Otherwise, the request is rejected.

·     Users-based admission policy—If the number of clients using high-priority access categories plus the requesting clients is smaller than or equal to the maximum number of high-priority access category clients, the request is accepted. Otherwise, the request is rejected. During calculation, a client is counted once even if it is using both AC-VO and AC-VI.

U-APSD power-save mechanism

U-APSD improves the 802.11 APSD power saving mechanism. When associating clients with access categories, specify some access categories as trigger-enabled, some access categories as delivery-enabled, and the maximum number of data packets that can be delivered after receiving a trigger packet. You can modify both the trigger attribute and the delivery attribute when flows are established using CAC. When a client sleeps, the delivery-enabled AC packets destined for the client are buffered. The client needs to send a trigger-enabled AC packet to get the buffered packets. After the AP receives the trigger packet, packets in the transmit queue are sent. The number of sent packets depends on the agreement made when the client was admitted. Access categories without the delivery attribute store and transmit packets as defined in the 802.11 protocol.

SVP service

SVP service implements differentiated treatment of SVP packets by mapping each SVP packet (IP protocol number 119) to an access category, which corresponds to a transmit queue with certain priority.

ACK policy

WMM defines the following ACK policies:

·     No ACK—When the no acknowledgement (No ACK) policy is used, the recipient does not acknowledge received packets during wireless packet exchange. This policy can improve transmission efficiency in the environment where communication quality is good and interference is weak. However, in the environment where communication quality is poor, it can cause increased packet loss and deteriorated communication quality.

·     Normal ACK—When the Normal ACK policy is used, the recipient acknowledges each received unicast packet.

Enabling wireless QoS

1.     Select QoS > Wireless QoS from the navigation tree.

By default, the Wireless QoS tab is displayed, as shown in Figure 35.

Figure 35 Wireless QoS

 

2.     Select the option in front of the radio unit to be configured.

3.     Click Enable.

By default, wireless QoS is enabled.

 

 

NOTE:

The WMM protocol is the foundation of the 802.11n protocol. When the radio operates in 802.11n (5 GHz) or 802.11n (2.4 GHz) radio mode, you must enable WMM. Otherwise, the associated 802.11n clients might fail to communicate.

 

Setting the SVP service

1.     Select QoS > Wireless QoS from the navigation tree.

By default, the Wireless QoS tab is displayed, as shown in Figure 36.

Figure 36 Mapping SVP service to an access category

 

2.     Click the icon_mdf icon in the Operation column for the desired AP to enter the page for mapping SVP service to an access category, as shown in Figure 37.

Figure 37 Mapping SVP service to an access category

 

3.     Configure SVP mapping, as described in Table 19.

4.     Click Apply.

Table 19 Configuration items

Item

Description

AP Name

Displays the selected AP.

Radio

Displays the selected AP's radio.

SVP Mapping

Select the option before SVP Mapping, and then select an access category for SVP service:

·     AC-VO.

·     AC-VI.

·     AC-BE.

·     AC-BK.

 

 

NOTE:

SVP mapping is applicable only to non-WMM clients.

 

Setting CAC admission policy

1.     Select QoS > Wireless QoS from the navigation tree.

By default, the Wireless QoS tab is displayed.

2.     Click the  icon in the Operation column for the desired AP to enter the page for setting CAC admission policy, as shown in Figure 38.

Figure 38 Setting CAC admission policy

 

3.     Configure the CAC admission policy, as described in Table 20.

4.     Click Apply.

Table 20 Configuration items

Item

Description

Client Number

Users-based admission policy, or the maximum number of clients allowed to be connected. A client is counted only once, even if it is using both AC-VO and AC-VI.

By default, the users-based admission policy applies, with the maximum number of users being 20.

Channel Utilization

Channel utilization-based admission policy, or the rate of the medium time of the accepted AC-VO and AC-VI traffic to the valid time during the unit time. The valid time is the total time during which data is transmitted.

 

Setting radio EDCA parameters for APs

1.     Select QoS > Wireless QoS from the navigation tree.

By default, the Wireless QoS tab is displayed.

2.     Click the  icon in the Operation column for the desired AP to enter the page for configuring wireless QoS.

3.     On the radio EDCA list, click the  icon in the Operation column for the desired priority type (AC_BK, for example) to enter the page for setting radio EDCA parameters.

Figure 39 Setting radio EDCA parameters

 

4.     Configure the radio EDCA parameters, as described in Table 21.

5.     Click Apply.

Table 21 Configuration items

Item

Description

AP Name

Displays the selected AP.

Radio

Displays the selected AP's radio.

Priority type

Displays the priority type.

AIFSN

Arbitration inter-frame spacing number used by the AP.

TXOP Limit

Transmission opportunity limit used by the AP.

ECWmin

Exponent of CWmin used by the AP.

ECWmax

Exponent of CWmax used by the AP.

No ACK

If you select the option before No ACK, the No ACK policy is used by the AP.

By default, the normal ACK policy is used by the AP.

 

Table 22 Default radio EDCA parameters

Access category

TXOP Limit

AIFSN

ECWmin

ECWmax

AC-BK

0

7

4

10

AC-BE

0

3

4

6

AC-VI

94

1

3

4

AC-VO

47

1

2

3

 

 

NOTE:

·     ECWmin cannot be greater than ECWmax.

·     On an AP operating in 802.11b radio mode, HP recommends that you set the TXOP-Limit to 0, 0, 188, and 102 for AC-BK, AC-BE, AC-VI, and AC-VO.

 

Setting EDCA parameters for wireless clients

Configuration restrictions and guidelines

Follow these restrictions and guidelines when you set EDCA parameters for wireless clients:

·     ECWmin cannot be greater than ECWmax.

·     If all clients operate in 802.11b radio mode, set TXOPLimit to 188 and 102 for AC-VI and AC-VO.

·     If some clients operate in 802.11b radio mode and some clients operate in 802.11g radio mode in the network, HP recommends the TXOPLimit parameters in Table 24.

·     Once you enable CAC for an access category, it is enabled automatically for all higher priority access categories. For example, if you enable CAC for AC-VI, CAC is also enabled for AC-VO. However, enabling CAC for AC-VO does not enable CAC for AC-VI.

Configuration procedure

1.     Select QoS > Wireless QoS from the navigation tree.

By default, the Wireless QoS tab is displayed.

2.     Click the  icon in the Operation column for the desired AP.

3.     On the client EDCA list, click the  icon in the Operation column for the desired priority type (AC_BK, for example).

Figure 40 Setting client EDCA parameters

 

4.     Configure the client EDCA parameters, as described in Table 23.

5.     Click Apply.

Table 23 Configuration items

Item

Description

AP Name

Displays the selected AP.

Radio

Displays the selected AP's radio.

Priority type

Displays the priority type.

AIFSN

Arbitration inter-frame spacing number used by clients.

TXOP Limit

Transmission opportunity limit used by clients.

ECWmin

Exponent of CWmin used by clients.

ECWmax

Exponent of CWmax used by clients.

CAC

Enable CAC:

·     EnableEnable CAC.

·     DisableDisable CAC.

AC-VO and AC-VI support CAC, which is disabled by default. This item is not available for AC-BE or AC-BK, because they do not support CAC.

 

Table 24 Default EDCA parameters for clients

Access category

TXOP Limit

AIFSN

ECWmin

ECWmax

AC-BK

0

7

4

10

AC-BE

0

3

4

10

AC-VI

94

2

3

4

AC-VO

47

2

2

3

 

Displaying radio statistics

1.     Select QoS > Wireless QoS from the navigation tree.

2.     Click the Radio Statistics tab.

3.     Click an AP to see its details.

Figure 41 Displaying the radio statistics

 

Table 25 Filed description

Field

Description

AP ID

AP ID.

AP Name

AP name.

Radio

Radio ID.

Client EDCA update count

Number of client EDCA parameter updates.

QoS mode

QoS mode:

·     WMMThe client is a QoS client.

·     NoneThe client is a non-QoS client.

Radio chip QoS mode

Radio chip's support for the QoS mode.

Radio chip max AIFSN

Maximum AIFSN allowed by the radio chip.

Radio chip max ECWmin

Maximum ECWmin allowed by the radio chip.

Radio chip max TXOPLimit

Maximum TXOPLimit allowed by the radio chip.

Radio chip max ECWmax

Maximum ECWmax allowed by the radio chip.

Client accepted

Number of clients that have been admitted to access the radio, including the number of clients that have been admitted to access the AC-VO and the AC-VI queues.

Total request mediumtime(us)

Total requested medium time, including that of the AC-VO and the AC-VI queues.

Calls rejected due to insufficient resource

Number of requests rejected due to insufficient resources.

Calls rejected due to invalid parameters

Number of requests rejected due to invalid parameters.

Calls rejected due to invalid mediumtime

Number of requests rejected due to invalid medium time.

Calls rejected due to invalid delaybound

Number of requests rejected due to invalid delay bound.

 

Displaying client statistics

1.     Select QoS > Wireless QoS from the navigation tree.

2.     Click the Client Statistics tab.

3.     Click a client name to see its details.

Figure 42 Displaying the client statistics

 

Table 26 Field description

Field

Description

MAC address

MAC address of the client.

SSID

Service set ID (SSID)

QoS Mode

QoS mode:

·     WMM—QoS mode is enabled.

·     None—QoS mode is not enabled.

Max SP length

Maximum service period.

AC

Access category.

State

APSD attribute of an access category:

·     T—The access category is trigger-enabled.

·     D—The access category is delivery-enabled.

·     T | D—The access category is both trigger-enabled and delivery-enabled.

·     L—The access category is of legacy attributes.

Assoc State

APSD attribute of the four access categories when a client accesses the AP.

Uplink CAC packets

Number of uplink CAC packets.

Uplink CAC bytes

Number of uplink CAC bytes.

Downlink CAC packets

Number of downlink CAC packets.

Downlink CAC bytes

Number of downlink CAC bytes.

Downgrade packets

Number of downgraded packets.

Downgrade bytes

Number of downgraded bytes.

Discard packets

Number of dropped packets.

Discard bytes

Number of dropped bytes.

 

Setting rate limiting

The WLAN provides limited bandwidth for each AP. Because the bandwidth is shared by wireless clients attached to the AP, aggressive use of bandwidth by a client will affect other clients. To ensure fair use of bandwidth, rate limit traffic of clients in either of the following methods:

·     Configure the total bandwidth shared by all clients in the same BSS. This is called "dynamic mode". The rate limit of a client is the configured total rate/the number of online clients. For example, if the configure total rate is 10 Mbps and five clients are online, the rate of each client is 2 Mbps.

·     Configure the maximum bandwidth that can be used by each client in the BSS. This is called "static mode". For example, if the configured rate is 1 Mbps, the rate limit of each user online is 1 Mbps. When the set rate limit multiplied by the number of access clients exceeds the available bandwidth provided by the AP, no clients can get the guaranteed bandwidth.

Setting wireless service-based client rate limiting

You can configure the access controller to limit client rates for a service within a BSS.

To set wireless service-based client rate limiting:

1.     Select QoS > Wireless QoS from the navigation tree on the left.

2.     Click the Client Rate Limit tab.

3.     Click icon_mdf for the target wireless service.

Figure 43 Setting wireless service-based client rate limiting

 

4.     Configure service-based client rate limiting, as described in Table 27.

5.     Click Apply.

Table 27 Configuration items

Item

Description

WLAN ID

Display the selected WLAN ID.

Wireless Service

Select an existing wireless service.

Direction

Set the traffic direction:

·     Inbound—Traffic from client to AP.

·     Outbound—Traffic from AP to client.

Mode

Set a rate limiting mode:

·     Static—Limits the rate of each client to a fixed value.

·     Dynamic—Limits the rate of a client to the configured total rate/the number of online clients.

Rate

Set the rate of the clients.

·     If you select the static mode, Per-Client Rate is displayed, and the rate is the rate of each client.

·      If you select the dynamic mode, Total Rate is displayed, and the rate is the total rate of all clients.

 

Setting radio-based client rate limiting

You can configure the access controller to limit client rates for a radio.

To set radio-based client rate limiting:

1.     Select QoS > Wireless QoS from the navigation tree on the left.

2.     Click the Client Rate Limit tab.

3.     Click Add in the Radio-Based Configuration area.

Figure 44 Setting radio-based client rate limiting

 

4.     Configure radio-based client rate limiting, as described in Table 28.

5.     Click Apply.

Table 28 Configuration items

Item

Description

Radio List

List of radios available. You can create the rate limiting rules for one or multiple radios.

Direction

Traffic direction:

·     Inbound—Traffic from clients to the AP.

·     Outbound—Traffic from the AP to clients.

·     Both—Includes inbound traffic (traffic from clients to the AP) and outbound traffic (traffic from the AP to clients)

Mode

Rate limiting mode:

·     Static—Limits the rate of each client to a fixed value.

·     Dynamic—Limits the rate of a client to the configured total rate/the number of online clients.

Rate

Set the rate of the clients:

·     If you select the static mode, Per-Client Rate is displayed, and the rate is the rate of each client.

·     If you select the dynamic mode, Total Rate is displayed, and the rate is the total rate of all clients.

 

Configuring the bandwidth guarantee function

When traffic is heavy, a BSS without any rate limitation might aggressively occupy the available bandwidth for other BSSs. If you limit the rate of the BSS, it cannot use the idle bandwidth of other BSSs.

To improve bandwidth use efficiency when ensuring bandwidth use fairness among wireless services, use the bandwidth guarantee function. Bandwidth guarantee makes sure all traffic from each BSS can pass through when the network is not congested, and each BSS can get the guaranteed bandwidth when the network is congested. For example, suppose you guarantee SSID1, SSID2, and SSID3 25%, 25%, and 50% of the bandwidth. When the network is not congested, SSID1 can use all idle bandwidth in addition to its guaranteed bandwidth. When the network is congested, SSID1 can use at least its guaranteed bandwidth, 25% of the bandwidth.

 

 

NOTE:

Bandwidth guarantees apply only to the traffic from AP to client.

 

Setting the reference radio bandwidth

1.     Select QoS > Wireless QoS from the navigation tree.

2.     Click the Bandwidth Guarantee tab.

Figure 45 Setting the reference radio bandwidth

 

3.     Set the reference radio bandwidth, as described in Table 29.

4.     Click Apply.

Table 29 Configuration items

Item

Description

802.11a Mode

Set the reference radio bandwidth.

IMPORTANT IMPORTANT:

Set the reference radio bandwidth slightly lower than the maximum available bandwidth.

802.11b Mode

802.11g Mode

802.11n Mode

 

 

NOTE:

After you set the reference radio bandwidth values, the new settings do not take effect for the radios with bandwidth guarantee enabled. To make the new settings take effect, you must disable and then enable the radios.

 

Setting guaranteed bandwidth percents

1.     Select QoS > Wireless QoS from the navigation tree.

2.     Select a radio from the bandwidth guarantee setup list, and click the  icon for the radio in the Operation column.

Figure 46 Setting guaranteed bandwidth

 

3.     Set the guaranteed bandwidth, as described in Table 30.

4.     Click Apply.

Table 30 Configuration items

Item

Description

Guaranteed Bandwidth Percent (%)

Allocate a percentage of the total radio bandwidth to each wireless service as the guaranteed bandwidth. The total guaranteed bandwidth cannot exceed 100% of the ratio bandwidth.

 

Enabling bandwidth guaranteeing

After the configurations above, the bandwidth guarantee tab appears.

To validate the bandwidth guarantee settings for a radio unit, enable its bandwidth guarantee function.

To enable the bandwidth guarantee function:

1.     Select QoS > Wireless QoS from the navigation tree on the left.

2.     Click the Bandwidth Guarantee tab.

3.     Select the AP and the corresponding radio mode for which you want to enable bandwidth guarantee on the list under the Bandwidth Guarantee title bar.

4.     Click Enable.

Figure 47 Enabling the bandwidth guarantee function

 

Displaying guaranteed bandwidth settings

1.     Select QoS > Wireless QoS from the navigation tree on the left.

2.     Click Bandwidth Guarantee.

3.     Click the specified radio unit of the AP on the list under the Bandwidth Guarantee title bar.

Figure 48 Displaying guaranteed bandwidth settings

 

CAC service configuration example

Network requirements

As shown in Figure 49, a WMM-enabled AP accesses the Ethernet.

Enable CAC for AC-VO and AC-VI on the AP. To guarantee high priority clients (AC-VO and AC-VI clients) sufficient bandwidth, use the user number-based admission policy to limit the number of access users to 10.

Figure 49 Network diagram

 

Configuring the wireless service

1.     Configure the AP, and establish a connection between the AC and the AP.

For related configurations, see "Configuring access services." Follow the steps in the related configuration example to establish a connection between the AC and the AP.

Configuring CAC

1.     Select QoS > Wireless QoS from the navigation tree.

By default, the Wireless QoS tab is displayed.

2.     Make sure WMM is enabled.

Figure 50 Wireless QoS configuration page

 

3.     As shown in Figure 50, select the AP to be configured on the list, and click the  icon for the AP in the Operation column.

4.     On the Client EDCA list, select the priority type (AC_VO, for example) to be modified, and click the  icon for the priority type in the Operation column.

5.     Select Enable from the CAC list.

6.     Click Apply.

Figure 51 Enabling CAC

 

7.     Enable CAC for AC_VI in the same way. (Details not shown.)

8.     Select QoS > Wireless QoS from the navigation tree.

By default, the Wireless QoS tab is displayed.

9.     Click the  icon in the Operation column for the desired AP.

10.     Select the Client Number option, and then enter 10.

11.     Click Apply.

Figure 52 Setting CAC client number

 

Verifying the configuration

If the number of existing clients in the high-priority access categories plus the number of clients requesting for high-priority access categories is smaller than or equal to the user-defined maximum number of users allowed in high-priority access categories (10 in this example) the request is allowed. Otherwise, the request is rejected.

Wireless service-based static rate limiting configuration example

Network requirements

As shown in Figure 53, two wireless clients access the WLAN through a SSID named service1.

Limit the maximum bandwidth per wireless client to 1024 kbps for traffic from the wireless clients to the AP.

Figure 53 Network diagram

 

Configuring the wireless service

For the configuration procedure, see "Configuring access services."

Configuring static rate limiting

1.     Select QoS > Wireless QoS from the navigation tree.

2.     Click Client Rate Limit.

3.     Select Inbound from the Direction list, and click icon_mdf.

4.     Configure static rate limiting:

a.     Select Static from the Mode list.

b.     Enter 1024 in the Per-Client Rate field.

5.     Click Apply.

Figure 54 Configuring static rate limiting

 

Verifying the configuration

1.     Client 1 and Client 2 access the WLAN through the SSID named service1.

2.     Verify that traffic from Client 1 is rate limited to around 1024 kbps, so is traffic from Client 2.

Wireless service-based dynamic rate limiting configuration example

Network requirements

As shown in Figure 55, wireless clients access the WLAN through a SSID named service2.

Configure all wireless clients to share 8000 kbps of bandwidth in any direction.

Figure 55 Network diagram

 

Configuring the wireless service

For the configuration procedure, see "Configuring access services."

Configuring dynamic rate limiting

1.     Select QoS > Wireless QoS from the navigation tree.

2.     Click Client Rate Limit.

3.     Select service2 from the Wireless Service list, select Inbound from the Direction list, and click icon_mdf.

4.     Configure dynamic rate limiting:

a.     Select Dynamic from the Mode list.

b.     Enter 8000 in the Total Rate field.

5.     Click Apply.

Figure 56 Configuring dynamic rate limiting

 

Verifying the configuration

Verify that:

1.     When only Client 1 accesses the WLAN through SSID service2, its traffic can pass through at a rate as high as 8000 kbps.

2.     When both Client 1 and Client 2 access the WLAN through SSID service2, their traffic flows can each pass through at a rate as high as 4000 kbps.

Bandwidth guarantee configuration example

Network requirements

As shown in Figure 57, three wireless clients use wireless services research, office, and entertain to access the wireless network.

To make sure the enterprise network works properly, guarantee the office service 20% of the bandwidth, the research service 80%, and the entertain service none.

Figure 57 Network diagram

 

Configuring the wireless services

For the configuration procedure, see "Configuring access services." Follow the related configuration example to configure the wireless services.

Configuring bandwidth guaranteeing

1.     Select QoS > Wireless QoS from the navigation tree.

2.     Click Bandwidth Guarantee.

3.     Use the default reference radio bandwidth for 802.11a.

4.     Click Apply.

Figure 58 Setting the reference radio bandwidth

 

5.     Click the  icon in the Operation column for 802.11n (5 GHz) to enter the page for setting guaranteed bandwidth, as shown in Figure 59.

6.     Set the guaranteed bandwidth:

a.     Set the guaranteed bandwidth percent to 80 for wireless service research.

b.     Set the guaranteed bandwidth percent to 20 for wireless service office.

c.     Set the guaranteed bandwidth percent to 0 for wireless service entertain.

7.     Click Apply.

After you apply the guaranteed bandwidth settings, the page for enabling bandwidth guarantee appears, as shown in Figure 60.

Figure 59 Setting guaranteed bandwidth

 

8.     Select the option specific to 802.11n(5GHz).

9.     Click Enable.

Figure 60 Enabling bandwidth guarantee

 

Verifying the configuration

·     Send traffic from the AP to the three wireless clients at a rate lower than 30000 kbps. The rate of traffic from the AP to the three wireless clients is not limited.

·     Send traffic at a rate higher than 6000 kbps from the AP to Client 1 and at a rate higher than 24000 kbps from the AP to Client 2. The total rate of traffic rate from the AP to the two wireless clients exceeds 30000 kbps. Because you have enabled bandwidth guarantee for wireless services research and office, the AP forwards traffic to Client 1 and Client 2 at 6000 kbps and 24000 kbps, respectively, and limits the traffic to Client 3.

 

 

NOTE:

·     Guaranteed bandwidth in kbps = reference radio bandwidth × guaranteed bandwidth percent.

·     Set the reference radio bandwidth slightly lower than the available maximum bandwidth.

·     The guaranteed bandwidth configuration applies to only the traffic from the AP to clients.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网