This chapter describes how to configure quality of service (QoS) as implemented on the Policy Feature
Card (PFC) and Distributed Forwarding Cards (DFCs) on the Cisco 7600 series routers.
Note• For complete syntax and usage information for the commands used in this chapter, refer to the
Cisco 7600 Series Router Cisco IOS Command Reference at this URL:
The term “PFC QoS” refers to QoS on the Cisco 7600 series router. PFC QoS is implemented on various
router components in addition to the PFC and any DFCs. These sections describe how PFC QoS works:
• Port Types Supported by PFC QoS, page 42-2
• Overview, page 42-2
• Component Overview, page 42-6
• Understanding Classification and Marking, page 42-16
In all releases, PFC QoS supports LAN ports. LAN ports are Ethernet ports on Ethernet switching
modules, except for the 4-port Gigabit Ethernet WAN (GBIC) modules (OSM-4GE-WAN and
OSM-2+4GE-WAN+). Some OSMs have four Ethernet LAN ports in addition to WAN ports.
With Release 12.2(17b)SXA and later releases, PFC QoS supports optical services module (OSM) ports.
OSM ports are the WAN ports on OSMs. Refer to the following publication for information about
additional OSM QoS features:
Typically, networks operate on a best-effort delivery basis, which means that all traffic has equal priority
and an equal chance of being delivered in a timely manner. When congestion occurs, all traffic has an
equal chance of being dropped.
QoS makes network performance more predictable and bandwidth utilization more effective. QoS
selects (classifies) network traffic, uses or assigns QoS labels to indicate priority, makes the packets
comply with the configured resource usage limits (polices the traffic and marks the traffic), and provides
congestion avoidance where resource contention exists.
PFC QoS classification, policing, marking, and congestion avoidance is implemented in hardware on the
PFC, DFCs, and in LAN switching module port Application Specific Integrated Circuits (ASICs).
NoteCisco 7600 series routers do not support all of the MQC features (for example, Committed Access Rate
(CAR)) for traffic that is Layer 3 switched or Layer 2 switched in hardware. Because queuing is
implemented in the port ASICs, Cisco 7600 series routers do not support MQC-configured queuing.
Figure 42-1 shows an overview of QoS processing in a Cisco 7600 series router.
Port trust state—In PFC QoS, trust means to accept as valid and use as the basis of the initial
internal DSCP value. Ports are untrusted by default, which sets the initial internal DSCP value
to zero. You can configure ports to trust received CoS, IP precedence, or DSCP.
–
Layer 2 CoS remarking—PFC QoS applies Layer 2 CoS remarking, which marks the incoming
frame with the port CoS value, in these situations:
—If the traffic is not in an ISL, 802.1Q, or 802.1p frame.
—If a port is configured as untrusted.
On OSM ATM and POS ports, PFC QoS always sets ingress CoS equal to zero.
–
Congestion avoidance—If you configure an Ethernet LAN port to trust CoS or DSCP, QoS
classifies the traffic on the basis of its Layer 2 CoS value or its Layer 3 DSCP value and assigns
it to an ingress queue to provide congestion avoidance. Layer 3 DSCP-based queue mapping is
available only on WS-X6708-10GE ports.
2. PFC and DFC QoS features:
–
Internal DSCP—On the PFC and DFCs, QoS associates an internal DSCP value with all traffic
to classify it for processing through the system. There is an initial internal DSCP based on the
traffic trust state and a final internal DSCP. The final internal DSCP can be the same as the
initial value or an MQC policy map can set it to a different value.
–
MQC policy maps—MQC policy maps can do one or more of these operations:
—Change the trust state of the traffic (bases the internal DSCP value on a different QoS label)
—Set the initial internal DSCP value (only for traffic from untrusted ports)
—Mark the traffic
—Police the traffic
3. Egress Ethernet LAN port QoS features:
–
Layer 3 DSCP marking with the final internal DSCP (always with PFC2, optionally with PFC3)
–
Layer 2 CoS marking mapped from the final internal DSCP
In PFC QoS, trust means to accept as valid and use as the basis of the initial internal DSCP value. You
can configure ports as untrusted or you can configure them to trust these QoS values:
• Layer 2 CoS
–
A port configured to trust CoS is called a trust CoS port.
–
Traffic received through a trust CoS port or configured by a policy map to trust CoS is called
trust CoS traffic.
NoteNot all traffic carries a CoS value. Only ISL, 802.1Q, and 802.1P traffic carries a CoS value.
PFC QoS applies the port CoS value to any traffic that does not carry a CoS value. On
untrusted ports, PFC QoS applies the port CoS value to all traffic, overwriting any received
CoS value.
• IP precedence
–
A port configured to trust IP precedence is called a trust IP precedence port.
–
Traffic received through a trust IP precedence port or configured by a policy map to trust
IP precedence is called trust IP precedence traffic.
• DSCP
–
A port configured to trust DSCP is called a trust DSCP port.
–
Traffic received through a trust DSCP port or configured by a policy map to trust DSCP is called
trust DSCP traffic.
Traffic received through an untrusted port is called untrusted traffic.
Ingress Congestion Avoidance
PFC QoS implements congestion avoidance on trust CoS ports. On a trust CoS port, QoS classifies the
traffic on the basis of its Layer 2 CoS value and assigns it to an ingress queue to provide congestion
avoidance. In Release 12.2(18)SXF5 and later releases, you can configure WS-X6708-10GE trust DSCP
ports to use received DSCP values for congestion avoidance. See the “Ingress Classification and
Marking at Trust CoS LAN Ports” section on page 42-17 for more information about ingress congestion
avoidance.
PFC and DFC QoS Features
These sections describe PFCs and DFCs as they relate to QoS:
The policy feature card (PFC) is a daughter card that resides on the supervisor engine. The PFC provides
QoS in addition to other functionality. The following PFCs are supported on the Cisco 7600 series
routers:
• PFC2 on the Supervisor Engine 2
• PFC3A on the Supervisor Engine 720
• PFC3B on the Supervisor Engine 720 and Supervisor Engine 32
• PFC3BXL on the Supervisor Engine 720
Supported Distributed Forwarding Cards
The PFC sends a copy of the QoS policies to the distributed forwarding card (DFC) to provide local
support for the QoS policies, which enables the DFCs to support the same QoS features that the PFC
supports.
The following DFCs are supported on the Cisco 7600 series routers:
• WS-F6K-DFC, for use on dCEF256 and CEF256 modules with a Supervisor Engine 2.
• WS-F6K-DFC3A, WS-F6K-DFC3B, WS-F6K-DFC3BXL, for use on dCEF256 and CEF256
modules with a Supervisor Engine 720.
Understanding How PFC QoS Works
• WS-F6700-DFC3A, WS-F6700-DFC3B, WS-F6700-DFC3BXL, for use on CEF720 modules with
a Supervisor Engine 720.
PFC and DFC QoS Feature List and Flowchart
Table 42-1 lists the QoS features supported on the different versions of PFCs and DFCs.
Table 42-1 QoS Features Supported on PFCs and DFCs
During processing, PFC QoS represents the priority of all traffic (including non-IP traffic) with an
internal DSCP value.
Initial Internal DSCP Value
On the PFC, before any marking or policing takes place, PFC QoS derives the initial internal DSCP value
as follows:
Understanding How PFC QoS Works
• For untrusted traffic, when ignore port trust is not enabled, PFC QoS sets the initial internal DSCP
value to zero for both tagged and untagged untrusted traffic.
• For untrusted traffic, when ignore port trust is enabled, PFC QoS does the following:
–
For IP traffic, PFC QoS uses the received DSCP value as the initial internal DSCP value.
–
For traffic without a recognizable ToS byte, PFC QoS maps the port CoS value to the initial
internal DSCP value.
• For trust CoS traffic, when ignore port trust is enabled, PFC QoS does the following:
–
For IP traffic, PFC QoS uses the received DSCP value as the initial internal DSCP value.
NoteFor trust CoS traffic, when ignore port trust is enabled, PFC QoS does not use the
received CoS value in tagged IP traffic.
–
For tagged traffic without a recognizable ToS byte, PFC QoS maps the received CoS value to
the initial internal DSCP value.
–
For untagged traffic without a recognizable ToS byte, PFC QoS maps the port CoS value to the
initial internal DSCP value.
• For trust IP precedence traffic, PFC QoS does the following:
–
For IP traffic, PFC QoS maps the received IP precedence value to the initial internal DSCP
value.
–
For tagged traffic without a recognizable ToS byte, PFC QoS maps the received CoS value to
the initial internal DSCP value.
–
For untagged traffic without a recognizable ToS byte, PFC QoS maps the port CoS value to the
initial internal DSCP value.
• For trust DSCP traffic, PFC QoS, PFC QoS does the following:
–
For IP traffic, PFC QoS uses the received DSCP value as the initial internal DSCP value.
–
For tagged traffic without a recognizable ToS byte, PFC QoS maps the received CoS value to
the initial internal DSCP value.
–
For untagged traffic without a recognizable ToS byte, PFC QoS maps the port CoS value to the
initial internal DSCP value.
For trust CoS traffic and trust IP precedence traffic, PFC QoS uses configurable maps to derive the initial
internal 6-bit DSCP value from CoS or IP precedence, which are 3-bit values.
OL-4266-08
Final Internal DSCP Value
Policy marking and policing on the PFC can change the initial internal DSCP value to a final internal
DSCP value, which is then used for all subsequently applied QoS features.
You can configure each ingress LAN port for either physical port-based PFC QoS (default) or
VLAN-based PFC QoS and attach a policy map to the selected interface.
On ports configured for port-based PFC QoS, you can attach a policy map to the ingress LAN port as
follows:
• On a nontrunk ingress LAN port configured for port-based PFC QoS, all traffic received through the
port is subject to the policy map attached to the port.
• On a trunking ingress LAN port configured for port-based PFC QoS, traffic in all VLANs received
through the port is subject to the policy map attached to the port.
On a nontrunk ingress LAN port configured for VLAN-based PFC QoS, traffic received through the port
is subject to the policy map attached to the port’s VLAN.
On a trunking ingress LAN port configured for VLAN-based PFC QoS, traffic received through the port
is subject to the policy map attached to the traffic’s VLAN.
PFC QoS Egress Port Features
Chapter 42 Configuring PFC QoS
These sections describe PFC QoS egress port features:
• Flowchart of PFC QoS Egress LAN Port Features, page 42-13
• Egress CoS Values, page 42-13
• Egress DSCP Mutation with a PFC3, page 42-14
• Egress ToS Byte, page 42-14
• Egress PFC QoS Interfaces, page 42-14
• Egress ACL Support for Remarked DSCP, page 42-14
With a PFC3, you can configure 15 egress DSCP mutation maps to mutate the internal DSCP value
before it is written in the egress ToS byte. You can attach egress DSCP mutation maps to any interface
that PFC QoS supports.
Note• If you configure egress DSCP mutation, PFC QoS does not derive the egress CoS value from the
mutated DSCP value.
• The PFC2 does not support egress DSCP mutation.
Egress ToS Byte
Except when DSCP transparency is enabled, PFC QoS creates a ToS byte for egress IP traffic from the
final internal or mutated DSCP value and sends it to the egress port to be written into IP packets. For
trust DSCP and untrusted IP traffic, the ToS byte includes the original two least-significant bits from the
received ToS byte.
The internal or mutated DSCP value can mimic an IP precedence value (see the “IP Precedence and
DSCP Values” section on page 42-55).
Chapter 42 Configuring PFC QoS
Egress PFC QoS Interfaces
You can attach an output policy map to a Layer 3 interface (either a LAN port configured as a Layer 3
interface or a VLAN interface) to apply a policy map to egress traffic.
Note• Output policies do not support microflow policing.
• With a PFC3, you cannot apply microflow policing to ARP traffic.
• You cannot set a trust state in an output policy.
Egress ACL Support for Remarked DSCP
NoteEgress ACL support for remarked DSCP is also known as packet recirculation.
With a PFC3, Release 12.2(18)SXE and later releases support egress ACL support for remarked DSCP,
which enables IP precedence-based or DSCP-based egress QoS filtering to use any IP precedence or
DSCP policing or marking changes made by ingress PFC QoS.
Without egress ACL support for remarked DSCP, egress QoS filtering uses received IP precedence or
DSCP values; it does not use any IP precedence or DSCP changes made by ingress PFC QoS as the result
of policing or marking.
42-14
The PFC3 provides egress PFC QoS only for Layer 3-switched and routed traffic on egress Layer 3
interfaces (either LAN ports configured as Layer 3 interfaces or VLAN interfaces).
You configure egress ACL support for remarked DSCP on ingress Layer 3 interfaces (either LAN ports
configured as Layer 3 interfaces or VLAN interfaces).
On interfaces where egress ACL support for remarked DSCP is configured, the PFC3 processes each
QoS-filtered IP packet twice: once to apply ingress PFC QoS and once to apply egress PFC QoS.
CautionIf the router is operating in PFC3A mode with egress ACL support for remarked DSCP configured, when
the PFC3 processes traffic to apply ingress PFC QoS, it applies ingress PFC QoS filtering and ingress
PFC QoS, and incorrectly applies any egress QoS filtering and egress PFC QoS configured on the
ingress interface, which results in unexpected behavior if QoS filtering is configured on an interface
where egress ACL support for remarked DSCP is enabled. This problem does not occur in other
PFC3 modes.
After packets have been processed by ingress PFC QoS and any policing or marking changes have been
made, the packets are processed again on the ingress interface by any configured Layer 2 features (for
example, VACLs) before being processed by egress PFC QoS.
On an interface where egress ACL support for remarked DSCP is configured, if a Layer 2 feature
matches the ingress-QoS-modified IP precedence or DSCP value, the Layer 2 feature might redirect or
drop the matched packets, which prevents them from being processed by egress QoS.
After packets have been processed by ingress PFC QoS and any policing or marking changes have been
made, the packets are processed on the ingress interface by any configured Layer 3 features (for example,
ingress Cisco IOS ACLs, policy based routing (PBR), etc.) before being processed by egress PFC QoS.
Understanding How PFC QoS Works
The Layer 3 features configured on an interface where egress ACL support for remarked DSCP is
configured might redirect or drop the packets that have been processed by ingress PFC QoS, which
would prevent them from being processed by egress PFC QoS.
Marking on Egress OSM Ports
Ingress PFC QoS sets DSCP values that can be used by the OSM egress QoS features (see Figure 42-8).
The following sections describe where and how classification and marking occur on the Cisco 7600
series routers:
• Classification and Marking at Trusted and Untrusted Ingress Ports, page 42-16
• Classification and Marking at Ingress OSM Ports, page 42-17
• Classification and Marking on the PFC Using Service Policies and Policy Maps, page 42-18
• Classification and Marking on the MSFC, page 42-19
Classification and Marking at Trusted and Untrusted Ingress Ports
The trust state of an ingress port determines how the port marks, schedules, and classifies received
Layer 2 frames, and whether or not congestion avoidance is implemented. These are the port trust states:
• Untrusted (default)
• Trust IP precedence
• Trust DSCP
• Trust CoS
Chapter 42 Configuring PFC QoS
In all releases, ingress LAN port classification, marking, and congestion avoidance can use Layer 2 CoS
values and do not set Layer 3 IP precedence or DSCP values.
In Release 12.2(18)SXF5 and later releases, you can configure WS-X6708-10GE ports to use received
DSCP values for ingress LAN port classification and congestion avoidance (see the “Configuring
DSCP-Based Queue Mapping” section on page 42-98)
In Releases earlier than Release 12.2(18)SXF5, ingress LAN port classification, marking, and
congestion avoidance use Layer 2 CoS values only.
The following sections describe classification and marking at trusted and untrusted ingress ports:
• Classification and Marking at Untrusted Ingress Ports, page 42-16
• Ingress Classification and Marking at Trusted Ports, page 42-16
Classification and Marking at Untrusted Ingress Ports
PFC QoS Layer 2 remarking marks all frames received through untrusted ports with the port CoS value
(the default is zero).
To map the port CoS value that was applied to untrusted ingress traffic to the initial internal DSCP value,
configure a trust CoS policy map that matches the ingress traffic.
Ingress Classification and Marking at Trusted Ports
You should configure ports to trust only if they receive traffic that carries valid QoS labels. QoS uses the
received QoS labels as the basis of initial internal DSCP value. After the traffic enters the router, you
can apply a different trust state to traffic with a policy map. For example, traffic can enter the router
through a trust CoS port, and then you can use a policy map to trust IP precedence or DSCP, which uses
the trusted value as the basis of the initial internal DSCP value, instead of the QoS label that was trusted
at the port.
These sections describe classification and marking at trusted ingress ports:
• Ingress Classification and Marking at Trust CoS LAN Ports, page 42-17
• Ingress Classification and Marking at Trust IP Precedence Ports, page 42-17
• Ingress Classification and Marking at Trust DSCP Ports, page 42-17
Ingress Classification and Marking at Trust CoS LAN Ports
You should configure LAN ports to trust CoS only if they receive traffic that carries valid Layer 2 CoS.
When an ISL frame enters the router through a trusted ingress LAN port, PFC QoS accepts the three least
significant bits in the User field as a CoS value. When an 802.1Q frame enters the router through a
trusted ingress LAN port, PFC QoS accepts the User Priority bits as a CoS value. PFC QoS Layer 2
remarking marks all traffic received in untagged frames with the ingress port CoS value.
On ports configured to trust CoS, PFC QoS does the following:
• PFC QoS maps the received CoS value in tagged trust CoS traffic to the initial internal DSCP value.
• PFC QoS maps the ingress port CoS value applied to untagged trusted traffic to the initial internal
DSCP value.
• PFC QoS enables the CoS-based ingress queues and thresholds to provide congestion avoidance.
See the “Understanding Port-Based Queue Types” section on page 42-22 for more information about
ingress queues and thresholds.
Understanding How PFC QoS Works
Ingress Classification and Marking at Trust IP Precedence Ports
You should configure ports to trust IP precedence only if they receive traffic that carries valid Layer 3
IP precedence. For traffic from trust IP precedence ports, PFC QoS maps the received IP precedence
value to the initial internal DSCP value. Because the ingress port queues and thresholds use Layer 2 CoS,
PFC QoS does not implement ingress port congestion avoidance on ports configured to trust IP
precedence. PFC does not mark any traffic on ingress ports configured to trust IP precedence.
Ingress Classification and Marking at Trust DSCP Ports
You should configure ports to trust DSCP only if they receive traffic that carries valid Layer 3 DSCP.
In Release 12.2(18)SXF5 and later releases, you can enable DSCP-based ingress queues and thresholds
on WS-X6708-10GE ports to provide congestion avoidance (see the “Configuring DSCP-Based Queue
Mapping” section on page 42-98).
In releases earlier than Release 12.2(18)SXF5, the ingress port queues and thresholds use only Layer 2
CoS, and PFC QoS does not implement ingress port congestion avoidance on ports configured to trust
DSCP.
For traffic from trust DSCP ports, PFC QoS uses the received DSCP value as the initial internal DSCP
value. PFC QoS does not mark any traffic on ingress ports configured to trust received DSCP.
Classification and Marking at Ingress OSM Ports
PFC QoS associates CoS zero with all traffic received through ingress OSM ports. You can configure
ingress OSM port trust states that can be used by the PFC to set IP precedence or DSCP values and the
CoS value. You can configure the trust state of each ingress OSM port as follows:
• Trust CoS (CoS is always zero for POS and ATM OSM ports because the port CoS value is not
configurable on POS and ATM OSM ports.)
Classification and Marking on the PFC Using Service Policies and Policy Maps
PFC QoS supports classification and marking with service policies that attach one policy map to these
interface types to apply ingress PFC QoS:
• Each ingress port (except FlexWAN interfaces)
• Each EtherChannel port-channel interface
• Each VLAN interface
With a PFC3, you can attach one policy map to each Layer 3 interface (except FlexWAN interfaces) to
apply egress PFC QoS.
Each policy map can contain multiple policy-map classes. You can configure a separate policy-map class
for each type of traffic handled by the interface. There are two ways to configure filtering in policy-map
classes:
• Access control lists (ACLs)
• Class-map match commands for IP precedence and DSCP values
Policy-map classes specify actions with the following optional commands:
• Policy-map set commands—For untrusted traffic or if ignore port trust is enabled, PFC QoS can use
configured IP precedence or DSCP values as the final internal DSCP value. The “IP Precedence and
DSCP Values” section on page 42-55 shows the bit values for IP precedence and DSCP.
• Policy-map class trust commands—PFC QoS applies the policy-map class trust state to matched
ingress traffic, which then uses the trusted value as the basis of its initial internal DSCP value,
instead of the QoS label that was trusted at the port (if any). In a policy map, you can trust CoS, IP
precedence, or DSCP.
NoteA trust CoS policy map cannot restore received CoS in traffic from untrusted ports. Traffic
from untrusted ports always has the port CoS value.
• Aggregate and microflow policers—PFC QoS can use policers to either mark or drop both
PFC QoS sends IP traffic to the MSFC with the final internal DSCP values. CoS is equal to
IP precedence in all traffic sent from the MSFC to egress ports.
Figure 42-9 Marking with PFC2 or PFC3 and MSFC2, MSFC2A, or MSFC3
From PFC
Multilayer Switch Feature Card (MSFC) marking
Understanding How PFC QoS Works
Policers
IP traffic
from PFC?
No
Route
traffic
To egress
port
NoteTraffic that is Layer 3 switched on the PFC does not go through the MSFC and retains the CoS value
Ye s
CoS =
all traffic
Write ToS
byte into
packet
144800
IP precedence for
(not configurable)
assigned by the PFC.
These sections describe policers:
• Overview of Policers, page 42-19
• Aggregate Policers, page 42-20
• Microflow Policers, page 42-21
Overview of Policers
Policing allows you to rate limit incoming and outgoing traffic so that it adheres to the traffic forwarding
rules defined by the QoS configuration. Sometimes these configured rules for how traffic should be
forwarded through the system are referred to as a contract. If the traffic does not adhere to this contract,
it is marked down to a lower DSCP value or dropped.
Policing does not buffer out-of-profile packets. As a result, policing does not affect transmission delay.
In contrast, traffic shaping works by buffering out-of-profile traffic, which moderates the traffic bursts.
(PFC QoS does not support shaping.)
The PFC2 supports only ingress PFC QoS, which includes ingress policing. The PFC3 supports both
ingress and egress PFC QoS, which includes ingress and egress policing. Traffic shaping is supported on
some WAN modules. For more information about traffic shaping on the OSM and FlexWAN modules,
refer to the OSM and FlexWAN documentation at this location:
NotePolicers can act on ingress traffic per-port or per-VLAN. With a PFC3, for egress traffic, the policers can
act per-VLAN only.
You can create policers to do the following:
Aggregate Policers
PFC QoS applies the bandwidth limits specified in an aggregate policer cumulatively to all flows in
matched traffic. For example, if you configure an aggregate policer to allow 1 Mbps for all TFTP traffic
flows on VLAN 1 and VLAN 3, it limits the TFTP traffic for all flows combined on VLAN 1 and VLAN
3 to 1 Mbps.
Chapter 42 Configuring PFC QoS
• Mark traffic
• Limit bandwidth utilization and mark traffic
• You define per-interface aggregate policers in a policy map class with the police command. If you
attach a per-interface aggregate policer to multiple ingress ports, it polices the matched traffic on
each ingress port separately.
• You create named aggregate policers with the mls qos aggregate-policer command. If you attach a
named aggregate policer to multiple ingress ports, it polices the matched traffic from all the ingress
ports to which it is attached.
• Aggregate policing works independently on each DFC-equipped switching module and
independently on the PFC, which supports any non-DFC-equipped switching modules. Aggregate
policing does not combine flow statistics from different DFC-equipped switching modules. You can
display aggregate policing statistics for each DFC-equipped switching module and for the PFC and
any non-DFC-equipped switching modules supported by the PFC.
• Each PFC or DFC polices independently, which might affect QoS features being applied to traffic
that is distributed across the PFC and any DFCs. Examples of these QoS feature are:
–
Policers applied to a port channel interface.
–
Policers applied to a switched virtual interface.
–
Egress policers applied to either a Layer 3 interface or an SVI. Note that PFC QoS performs
egress policing decisions at the ingress interface, on the PFC or ingress DFC.
Policers affected by this restriction deliver an aggregate rate that is the sum of all the independent
policing rates.
PFC QoS applies the bandwidth limit specified in a microflow policer separately to each flow in matched
traffic. For example, if you configure a microflow policer to limit the TFTP traffic to 1 Mbps on VLAN
1 and VLAN 3, then 1 Mbps is allowed for each flow in VLAN 1 and 1 Mbps for each flow in VLAN 3.
In other words, if there are three flows in VLAN 1 and four flows in VLAN 3, the microflow policer
allows each of these flows 1 Mbps.
You can configure PFC QoS to apply the bandwidth limits in a microflow policer as follows:
Understanding How PFC QoS Works
• You can create microflow policers with up to 63 different rate and burst parameter combinations.
• You create microflow policers in a policy map class with the police flow command.
• You can configure a microflow policer to use only source addresses, which applies the microflow
policer to all traffic from a source address regardless of the destination addresses.
• You can configure a microflow policer to use only destination addresses, which applies the
microflow policer to all traffic to a destination address regardless of the source addresses.
• For MAC-Layer microflow policing, PFC QoS considers MAC-Layer traffic with the same protocol
and the same source and destination MAC-Layer addresses to be part of the same flow, including
traffic with different EtherTypes. With a PFC3, you can configure MAC ACLs to filter IPX traffic.
• With a PFC2, you can configure IPX ACLs to filter IPX traffic. For IPX microflow policing,
PFC QoS considers IPX traffic with the same source network, destination network, and destination
node to be part of the same flow, including traffic with different source nodes or source sockets.
• By default, microflow policers only affect traffic routed by the MSFC. To enable microflow policing
of other traffic, including traffic in bridge groups, enter the mls qos bridged command. With a
PFC2, you must enable bridged mircoflow policing for routed traffic as well.
• With a PFC3, you cannot apply microflow policing to ARP traffic.
• You cannot apply microflow policing to IPv6 multicast traffic.
You can include both an aggregate policer and a microflow policer in each policy map class to police a
flow based on both its own bandwidth utilization and on its bandwidth utilization combined with that of
other flows.
NoteIf traffic is both aggregate and microflow policed, then the aggregate and microflow policers must both
be in the same policy-map class and each must use the same conform-action and exceed-action
keyword option: drop, set-dscp-transmit, set-prec-transmit, or transmit.
For example, you could create a microflow policer with a bandwidth limit suitable for individuals in a
group, and you could create a named aggregate policer with bandwidth limits suitable for the group as a
whole. You could include both policers in policy map classes that match the group’s traffic. The
combination would affect individual flows separately and the group aggregately.
For policy map classes that include both an aggregate and a microflow policer, PFC QoS responds to an
out-of-profile status from either policer and, as specified by the policer, applies a new DSCP value or
drops the packet. If both policers return an out-of-profile status, then if either policer specifies that the
packet is to be dropped, it is dropped; otherwise, PFC QoS applies a marked-down DSCP value.
OL-4266-08
NoteTo avoid inconsistent results, ensure that all traffic policed by the same aggregate policer has the same
With a PFC3, policing uses the Layer 2 frame size. With a PFC2, policing uses the Layer 3 packet size.
You specify the bandwidth utilization limit as a committed information rate (CIR). You can also specify
a higher peak information rate (PIR). Packets that exceed a rate are “out of profile” or “nonconforming.”
In each policer, you specify if out-of-profile packets are to be dropped or to have a new DSCP value
applied to them (applying a new DSCP value is called “markdown”). Because out-of-profile packets do
not retain their original priority, they are not counted as part of the bandwidth consumed by in-profile
packets.
If you configure a PIR, the PIR out-of-profile action cannot be less severe than the CIR out-of-profile
action. For example, if the CIR out-of-profile action is to mark down the traffic, then the PIR
out-of-profile action cannot be to transmit the traffic.
For all policers, PFC QoS uses a configurable global table that maps the internal DSCP value to a
marked-down DSCP value. When markdown occurs, PFC QoS gets the marked-down DSCP value from
the table. You cannot specify marked-down DSCP values in individual policers.
Note• Policing with the conform-action transmit keywords supersedes the ingress LAN port trust state
of matched traffic with trust DSCP or with the trust state defined by a trust policy-map class
command.
Chapter 42 Configuring PFC QoS
• By default, the markdown table is configured so that no markdown occurs: the marked-down DSCP
values are equal to the original DSCP values. To enable markdown, configure the table appropriately
for your network.
• When you apply both ingress policing and egress policing to the same traffic, both the input policy
and the output policy must either mark down traffic or drop traffic. PFC QoS does not support
ingress markdown with egress drop or ingress drop with egress markdown.
Understanding Port-Based Queue Types
Port-based queue types are determined by the ASICs that control the ports. The following sections
describe the queue types, drop thresholds, and buffers that are supported on the Cisco 7600 series router
LAN modules:
• Ingress and Egress Buffers and Layer 2 CoS-Based Queues, page 42-22
• Ingress Queue Types, page 42-24
• Egress Queue Types, page 42-25
• Module to Queue Type Mappings, page 42-26
Ingress and Egress Buffers and Layer 2 CoS-Based Queues
42-22
The Ethernet LAN module port ASICs have buffers that are divided into a fixed number of queues. When
congestion avoidance is enabled, PFC QoS uses the traffic’s Layer 2 CoS value to assign traffic to the
queues. The buffers and queues store frames temporarily as they transit the switch. PFC QoS allocates
the port ASIC memory as buffers for each queue on each port.
The Cisco 7600 series router LAN modules support the following types of queues:
The Cisco 7600 series router LAN modules support the following types of scheduling algorithms
between queues:
• Shaped round robin (SRR)—SRR allows a queue to use only the allocated bandwidth.
• Deficit weighted round robin (DWRR)—DWRR keeps track of any lower-priority queue
under-transmission caused by traffic in a higher-priority queue and compensates in the next round.
• Weighted Round Robin (WRR)—WRR does not explicitly reserve bandwidth for the queues. Instead,
the amount of bandwidth assigned to each queue is user configurable. The percentage or weight allocated
to a queue defines the amount of bandwidth allocated to the queue.
• Strict-priority queueing—Strict priority queueing allows delay-sensitive data such as voice to be
dequeued and sent before packets in other queues are dequeued, giving delay-sensitive data preferential
treatment over other traffic. The router services traffic in the strict-priority transmit queue before
servicing the standard queues. After transmitting a packet from a standard queue, the switch checks
for traffic in the strict-priority queue. If the switch detects traffic in the strict-priority queue, it
suspends its service of the standard queue and completes service of all traffic in the strict-priority
queue before returning to the standard queue.
The Cisco 7600 series router LAN modules provides congestion avoidance with these types of
thresholds within a queue:
• Weighted Random Early Detection (WRED)—On ports with WRED drop thresholds, frames with a
given QoS label are admitted to the queue based on a random probability designed to avoid buffer
congestion. The probability of a frame with a given QoS label being admitted to the queue or
discarded depends on the weight and threshold assigned to that QoS label.
For example, if CoS 2 is assigned to queue 1, threshold 2, and the threshold 2 levels are 40 percent
(low) and 80 percent (high), then frames with CoS 2 will not be dropped until queue 1 is at least
40 percent full. As the queue depth approaches 80 percent, frames with CoS 2 have an increasingly
higher probability of being discarded rather than being admitted to the queue. Once the queue is over
80 percent full, all CoS 2 frames are dropped until the queue is less than 80 percent full. The frames
the switch discards when the queue level is between the low and high thresholds are picked out at
random, rather than on a per-flow basis or in a FIFO manner. This method works well with protocols
such as TCP that can adjust to periodic packet drops by backing off and adjusting their transmission
window size.
Understanding How PFC QoS Works
OL-4266-08
• Tail-drop thresholds—On ports with tail-drop thresholds, frames with a given QoS label are
admitted to the queue until the drop threshold associated with that QoS label is exceeded;
subsequent frames of that QoS label are discarded until the threshold is no longer exceeded. For
example, if CoS 1 is assigned to queue 1, threshold 2, and the threshold 2 watermark is 60 percent,
then frames with CoS 1 will not be dropped until queue 1 is 60 percent full. All subsequent CoS 1
frames will be dropped until the queue is less than 60 percent full. With some port types, you can
configure the standard receive queue to use both a tail-drop and a WRED-drop threshold by mapping
a CoS value to the queue or to the queue and a threshold. The switch uses the tail-drop threshold for
traffic carrying CoS values mapped only to the queue. The switch uses WRED-drop thresholds for
traffic carrying CoS values mapped to the queue and a threshold. All LAN ports of the same type
use the same drop-threshold configuration.
NoteIn Release 12.2(18)SXF5 and later releases, you can enable DSCP-based queues and thresholds on
WS-X6708-10GE ports (see the “Configuring DSCP-Based Queue Mapping” section on page 42-98).
The combination of multiple queues and the scheduling algorithms associated with each queue allows the
switch to provide congestion avoidance.
Figure 42-10 illustrates the drop thresholds for a 1q4t ingress LAN port. Drop thresholds in other
configurations function similarly.
Figure 42-10 Receive Queue Drop Thresholds
Reserved for
CoS 6 and 7
Reserved for
CoS 4 and higher
Reserved for
CoS 2 and higher
Available for
traffic with any
CoS value
Drop threshold 4: 100%
Drop threshold 3: 80%
Drop threshold 2: 60%
Drop threshold 1: 50%
Chapter 42 Configuring PFC QoS
C
o
S
6
a
n
C
o
S
4
a
C
o
S
C
o
S
0
a
n
d
n
d
2
a
n
d
3
1
d
7
5
Traffic is dropped
100% available for CoS 6 and 7
80% available for CoS 4 and 5
60% available for CoS 2 and 3
50% available for CoS 0 and 1
Ingress Queue Types
To see the queue structure of a LAN port, enter the show queueing interface {ethernet | fastethernet |
gigabitethernet | tengigabitethernet} slot/port | include type command. The command displays one of
the following architectures:
• 1q2t indicates one standard queue with one configurable tail-drop threshold and one
nonconfigurable tail-drop threshold.
• 1q4t indicates one standard queue with four configurable tail-drop thresholds.
• 1q8t indicates one standard queue with eight configurable tail-drop thresholds.
• 2q8t indicates two standard queues, each with eight configurable tail-drop thresholds.
• 8q4t indicates eight standard queues, each with four thresholds, each configurable as either
WRED-drop or tail-drop.
• 8q8t indicates eight standard queues, each with eight thresholds, each configurable as either
WRED-drop or tail-drop.
Receive queue
(Default values shown)
26249
42-24
• 1p1q4t indicates:
–
One strict-priority queue
–
One standard queue with four configurable tail-drop thresholds.
To see the queue structure of an egress LAN port, enter the show queueing interface {ethernet |
fastethernet | gigabitethernet | tengigabitethernet} slot/port | include type command.
The command displays one of the following architectures:
• 2q2t indicates two standard queues, each with two configurable tail-drop thresholds.
Understanding How PFC QoS Works
–
One strict-priority queue
–
One standard queue with no configurable threshold (effectively a tail-drop threshold at
100 percent).
–
One strict-priority queue
–
One standard queue with these thresholds:
—Eight thresholds, each configurable as either WRED-drop or tail-drop
—One non configurable (100 percent) tail-drop threshold
• 1p2q2t indicates the following:
–
One strict-priority queue
–
Two standard queues, each with two configurable WRED-drop thresholds
• 1p3q1t indicates the following:
–
One strict-priority queue
–
Three standard queues with these thresholds:
—One threshold configurable as either WRED-drop or tail-drop