BLADE OS™ Application Guide HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Version 5.1 Advanced Functionality Software
Table Of Contents
- Contents
- Figures
- Tables
- Preface
- Part 1: Basic Switching
- Accessing the Switch
- The Management Network
- Local Management Using the Console Port
- The Command Line Interface
- Remote Management Access
- Client IP Address Agents
- Securing Access to the Switch
- Setting Allowable Source IP Address Ranges
- RADIUS Authentication and Authorization
- TACACS+ Authentication
- LDAP Authentication and Authorization
- Secure Shell and Secure Copy
- Configuring SSH/SCP Features on the Switch
- Configuring the SCP Administrator Password
- Using SSH and SCP Client Commands
- SSH and SCP Encryption of Management Messages
- Generating RSA Host and Server Keys for SSH Access
- SSH/SCP Integration with Radius Authentication
- SSH/SCP Integration with TACACS+ Authentication
- End User Access Control
- Ports and Trunking
- Port-Based Network Access Control
- VLANs
- Spanning Tree Protocol
- RSTP and MSTP
- Link Layer Discovery Protocol
- Quality of Service
- Accessing the Switch
- Part 2: IP Routing
- Basic IP Routing
- Routing Information Protocol
- IGMP
- OSPF
- OSPF Overview
- OSPF Implementation in BLADE OS
- OSPF Configuration Examples
- Remote Monitoring
- Part 3: High Availability Fundamentals
- High Availability
- Layer 2 Failover
- Server Link Failure Detection
- VRRP Overview
- Failover Methods
- BLADE OS Extensions to VRRP
- Virtual Router Deployment Considerations
- High Availability Configurations
- High Availability
- Part 4: Appendices
- Index
BLADE OS 5.1 Application Guide
BMD00113, September 2009 Chapter 8: Quality of Service 145
ACL Metering and Re-Marking
You can define a profile for the aggregate traffic flowing through the GbE2c by configuring a QoS
meter (if desired) and assigning ACL Groups to ports. When you add ACL Groups to a port, make
sure they are ordered correctly in terms of precedence.
Actions taken by an ACL are called In-Profile actions. You can configure additional In-Profile and
Out-of-Profile actions on a port. Data traffic can be metered, and re-marked to ensure that the traffic
flow provides certain levels of service in terms of bandwidth for different types of network traffic.
Metering
QoS metering provides different levels of service to data streams through user-configurable
parameters. A meter is used to measure the traffic stream against a traffic profile, which you create.
Thus, creating meters yields In-Profile and Out-of-Profile traffic for each ACL, as follows:
In-Profile–If there is no meter configured or if the packet conforms to the meter, the packet is
classified as In-Profile.
Out-of-Profile–If a meter is configured and the packet does not conform to the meter (exceeds
the committed rate or maximum burst rate of the meter), the packet is classified as
Out-of-Profile.
Using meters, you set a Committed Rate in kbps (1000 bits per second). All traffic within this
Committed Rate is In-Profile. Additionally, you set a Maximum Burst Size that specifies an allowed
data burst larger than the Committed Rate for a brief period. These parameters define the In-Profile
traffic.
Meters keep the sorted packets within certain parameters. You can configure a meter on an ACL,
and perform actions on metered traffic, such as packet re-marking.
Re-Marking
Re-marking allows for the treatment of packets to be reset based on new network specifications or
desired levels of service. You can configure the ACL to re-mark a packet as follows:
Change the DSCP value of a packet, used to specify the service level traffic should receive.
Change the 802.1p priority of a packet.
Viewing ACL Statistics
ACL statistics display how many packets hit (matched) each ACL. Use ACL statistics to check
filter performance, or to debug the ACL filters.
You must enable statistics (cfg/acl/acl <x>/stats ena) for each ACL that you want to
monitor.