Plantilla QoS Perfil 28 Huawei Ver 2

Descargar como docx, pdf o txt
Descargar como docx, pdf o txt
Está en la página 1de 6

#

acl name ce.cd


description MARCADO DE PAQUETES DATOS CRITICOS
rule 5 permit tcp destination 168.255.101.0 0.0.0.255 destination-port eq www
rule 10 permit tcp destination 168.255.101.0 0.0.0.255 destination-port eq 443
rule 15 permit tcp destination 168.255.153.0 0.0.0.255 destination-port eq www
rule 20 permit tcp destination 168.255.153.0 0.0.0.255 destination-port eq 443
rule 25 permit tcp destination 168.255.254.0 0.0.0.255 destination-port eq www
rule 30 permit tcp destination 168.255.254.0 0.0.0.255 destination-port eq 443
rule 35 permit tcp destination 10.2.10.0 0.0.0.255 destination-port eq www
rule 40 permit tcp destination 10.2.10.0 0.0.0.255 destination-port eq 443
rule 45 permit tcp destination 10.2.15.128 0.0.0.127 destination-port eq www
rule 50 permit tcp destination 10.2.15.128 0.0.0.127 destination-port eq 443
acl name ce.rt
description MARCADO DE PAQUETES VOZ
rule 5 permit ip source 10.40.100.0 0.0.0.127
rule 10 permit ip source 10.40.100.128 0.0.0.127
rule 15 permit ip source 10.40.120.128 0.0.0.127 destination 10.2.1.66 0
rule 20 permit ip source 10.40.200.0 0.0.0.255
rule 25 permit ip destination 10.2.199.0 0.0.0.31
rule 30 permit ip destination 10.1.199.0 0.0.0.31
rule 35 permit ip destination 10.2.1.66 0
rule 40 permit ip destination 10.2.1.67 0
rule 45 permit ip destination 10.2.1.68 0
rule 50 permit ip destination 10.1.1.66 0
rule 55 permit ip destination 10.3.1.66 0
rule 60 permit ip destination 10.2.199.0 0.0.0.31
rule 65 permit ip destination 10.1.199.0 0.0.0.31
rule 70 permit udp destination-port eq 5060
rule 75 permit udp source-port eq 5060
rule 80 permit tcp destination-port eq 5060
rule 85 permit tcp source-port eq 5060
rule 90 permit tcp destination-port eq 5061
rule 95 permit tcp source-port eq 5061
rule 100 permit tcp destination-port eq 5161
rule 105 permit tcp source-port eq 5161
rule 110 permit tcp destination-port eq 5080
rule 115 permit tcp source-port eq 5080
rule 120 permit tcp destination-port eq 5081
rule 125 permit tcp source-port eq 5081
rule 130 permit udp destination-port eq 10000
rule 135 permit udp source-port eq 10000
rule 140 permit udp destination-port range 10002 10003
rule 145 permit udp source-port range 10002 10003
rule 150 permit udp destination-port range 1718 1719
rule 155 permit udp source-port range 1718 1719
rule 160 permit tcp destination-port eq 1720
rule 165 permit tcp source-port eq 1720
rule 170 permit udp destination-port range 21000 23000
rule 175 permit udp source-port range 21000 23000

rule 180 permit udp destination-port range 30000 32000


rule 185 permit udp source-port range 30000 32000
rule 190 permit tcp destination-port range 1320 1416
rule 195 permit tcp source-port range 1320 1416
acl name ce.mt
description SNMP
rule 0 permit ip source 172.17.4.247 0
rule 5 permit ip source 172.17.4.243 0
rule 10 permit ip source 172.17.4.240 0.0.0.15 <<<<< les faltaba la palabra ip
acl name ce.vd
description MARCADO DE PAQUETES VIDEO-CONFERENCIA
rule 10 permit ip destination 10.1.231.1 0
rule 15 permit ip destination 10.1.231.2 0
rule 20 permit ip destination 10.1.231.3 0
rule 25 permit ip destination 10.1.231.4 0
rule 30 permit ip destination 10.1.231.5 0
rule 35 permit ip destination 10.1.231.6 0
acl name ce.bs
description MARCADO DE PAQUETES BUSINESS
rule 5 permit tcp destination 168.255.101.0 0.0.0.255 destination-port eq smtp
rule 10 permit tcp destination 168.255.101.0 0.0.0.255 destination-port eq pop3
rule 15 permit tcp destination 168.255.203.19 0 destination-port eq smtp
rule 20 permit tcp destination 168.255.203.253 0 destination-port eq smtp
rule 25 permit tcp destination 10.2.15.0 0.0.0.127 destination-port eq www
rule 30 permit tcp destination 10.2.15.0 0.0.0.127 destination-port eq 443
rule 35 permit tcp destination 10.2.15.0 0.0.0.127 destination-port eq 135
rule 45 permit tcp destination 10.2.15.0 0.0.0.127 destination-port eq smtp
rule 50 permit tcp destination 10.2.15.0 0.0.0.127 destination-port eq 691
rule 55 permit tcp destination 10.2.15.0 0.0.0.127 destination-port eq 143
rule 60 permit tcp destination 10.2.15.0 0.0.0.127 destination-port eq 993
rule 65 permit tcp destination 10.2.15.0 0.0.0.127 destination-port eq pop3
rule 70 permit tcp destination 10.2.15.0 0.0.0.127 destination-port eq 995
acl number 3002
#
traffic classifier mark.ce.cd
if-match dscp cs2 af31 af32 af33
if-match acl ce.cd
traffic classifier mark.ce.rt operator or
if-match acl ce.rt
if-match dscp cs3 cs5 ef
traffic classifier mark.ce.mt operator or
if-match acl ce.mt
if-match dscp cs6 cs7
traffic classifier mark.ce.vd operator or
if-match acl ce.vd
if-match dscp af41 af42 af43
traffic classifier mark.ce.bs operator or
if-match acl ce.bs

if-match dscp cs1 af21 af22 af23


traffic classifier mark.ce.default operator or
if-match dscp 0
#
traffic behavior behavior.ce.cd
remark dscp af32
statistic enable
traffic behavior behavior.ce.rt
remark dscp ef
statistic enable
traffic behavior behavior.ce.mt
remark dscp cs6
statistic enable
traffic behavior behavior.ce.vd
remark dscp af42
statistic enable
traffic behavior behavior.ce.bs
remark dscp af22
statistic enable
traffic behavior behavior.ce.default
remark dscp 0
statistic enable
#
drop-profile QoS
wred dscp
traffic policy pb28.ce.lan
classifier mark.ce.rt behavior behavior.ce.rt
classifier mark.ce.vd behavior behavior.ce.vd
classifier mark.ce.cd behavior behavior.ce.cd
classifier mark.ce.bs behavior behavior.ce.bs
classifier mark.ce.mt behavior behavior.ce.mt
#
traffic classifier rpvm_bs_in <<<< Se debe estar en modo sys # para crear un traffic classifier
if-match acl ce.bs
traffic classifier rpvm_vd_in
if-match acl ce.vd
traffic classifier rpvm_mt_in
if-match acl ce.mt
traffic classifier rpvm_rt_in
if-match acl ce.rt
traffic classifier rpvm_cd_in
if-match acl ce.cd
#
traffic behavior rpvm_bs_in
car cir pct 13 mode color-blind green pass yellow pass red pass
statistic enable
traffic behavior rpvm_vd_in
car cir pct 50 mode color-blind green pass yellow pass red discard

statistic enable
traffic behavior rpvm_mt_in
car cir pct 15 mode color-blind green pass yellow pass red pass
statistic enable
traffic behavior rpvm_rt_in
car cir pct 25 mode color-blind green pass yellow pass red discard
statistic enable
traffic behavior rpvm_cd_in
car cir pct 13 mode color-blind green pass yellow pass red pass
statistic enable
#
traffic classifier policing.in
if-match any
traffic classifier rpvm_bs_out operator or
if-match acl ce.bs
if-match dscp af22
traffic classifier rpvm_vd_out operator or
if-match acl ce.vd
if-match dscp af42
traffic classifier rpvm_mt_out operator or
if-match acl ce.mt
if-match dscp cs6
traffic classifier rpvm_rt_out operator or
if-match acl ce.rt
if-match dscp ef
traffic classifier rpvm_cd_out operator or
if-match acl ce.cd
if-match dscp af32
traffic classifier shaping.out operator or
if-match any
#
traffic behavior rpvm_bs_out
car cir pct 1 mode color-blind green pass yellow pass red discard
remark 8021p 2
queue af bandwidth pct 1
drop-profile QoS
statistic enable
traffic behavior rpvm_vd_out
car cir pct 60 mode color-blind green pass yellow pass red discard
queue af bandwidth pct 60
drop-profile QoS
remark 8021p 2
statistic enable
traffic behavior rpvm_mt_out
remark 8021p 2
car cir pct 4 mode color-blind green pass yellow pass red discard
queue af bandwidth pct 4
queue-length packets 512
drop-profile QoS
statistic enable

traffic behavior rpvm_default_out


car cir pct 1 mode color-blind green pass yellow pass red discard
remark 8021p 1
queue af bandwidth pct 1
queue-length packets 512
drop-profile QoS
statistic enable
traffic behavior rpvm_rt_out
car cir pct 25 mode color-blind green pass yellow discard red discard
remark 8021p 5
queue ef bandwidth pct 25
statistic enable
traffic behavior rpvm_cd_out
car cir pct 4 mode color-blind green pass yellow pass red discard
remark 8021p 2
queue af bandwidth pct 4
drop-profile QoS
statistic enable
traffic behavior eth.shaping.out
gts cir 10000 cbs 62500 queue-length 512
traffic-policy rpvm.ce.pb28.out <<<<< faltaba un espacio
#
traffic policy rpvm.ce.pb28.out
classifier rpvm_mt_out behavior rpvm_mt_out
classifier rpvm_rt_out behavior rpvm_rt_out
classifier rpvm_vd_out behavior rpvm_vd_out
classifier rpvm_cd_out behavior rpvm_cd_out
classifier rpvm_bs_out behavior rpvm_bs_out
classifier default-class behavior rpvm_default_out
traffic policy eth.shaping.out
classifier shaping.out behavior eth.shaping.out
traffic behavior policing.in
car cir 10000 cbs 62500 pbs 62500 mode color-blind green pass yellow pass red pass
traffic-policy rpvm.ce.pb28.in
traffic policy eth.policing.in
classifier policing.in behavior policing.in
traffic policy rpvm.ce.pb28.in
classifier rpvm_bs_in behavior rpvm_bs_in
classifier rpvm_vd_in behavior rpvm_vd_in
classifier rpvm_mt_in behavior rpvm_mt_in
classifier rpvm_rt_in behavior rpvm_rt_in
classifier rpvm_cd_in behavior rpvm_cd_in
APLICAR LA POLITICA pb28.ce.lan inbound EN INTERFACE O SUBINTERFACE LAN
(SEGN SEA EL CASO)

#
interface GigabitEthernet0/0/0
#
interface GigabitEthernet0/0/0.5
description CONEXION CON 0005-SWSECEP-MEX01A-15951965M-pto-2-0-24
dot1q termination vid 5
ip address 10.40.1.1 255.255.255.192
traffic-policy pb28.ce.lan inbound <<< faltaba un espacio
INTERFACE WAN (AJUSTAR A LA INTERFACE WAN QUE RECIBA EL ENLACE DE 10
MEGAS)
interface GigabitEthernet0/0/1
description CONEXION CON SW-CLIENTE
ip address 10.40.200.1 255.255.255.252
undo negotiation auto
set flow-stat interval 30
duplex full
speed 100
interface GigabitEthernet0/0/1.3779
description CONEXION CON C01-1511-0117
dot1q termination vid 3779
ip address 187.219.248.22 255.255.255.252
trust dscp
qos gts cir 10000 cbs 25000
service-policy output eth.shaping.out
service-policy input eth.policing.in <<<< confundi el commando con el de cisco
traffic-policy eth.shaping.out outbound
traffic-policy input eth.policing.in inbound <<<< commandos correctos para aplicar las politicas
WAN en huawei
ip netstream inbound
ip netstream outbound

También podría gustarte