Applying Qos Configurations To Remote Site Routers
Applying Qos Configurations To Remote Site Routers
Applying Qos Configurations To Remote Site Routers
This process completes the remote-site QoS configuration and applies to all DMVPN spoke routers.
This procedure configures the remote-site router to reference the QoS policy configured on the hub site routers.
Step 1: Apply the NHRP group policy to the DMVPN tunnel interface on the corresponding remote-site router.
Use the NHRP group name as defined on the hub router in Procedure 2, “Configure per tunnel QoS policies for
DMVPN hub router,” above.
interface Tunnel[value]
ip nhrp group [NHRP GROUP Policy Name]
interface Tunnel10
ip nhrp group RS-GROUP-20MBPS
interface Tunnel11
ip nhrp group RS-GROUP-10MBPS
Repeat this procedure in order to support remote-site routers that have multiple WAN connections attached to
different interfaces.
With WAN interfaces using Ethernet as an access technology, the demarcation point between the enterprise
and service provider may no longer have a physical-interface bandwidth constraint. Instead, a specified amount
of access bandwidth is contracted with the service provider. To ensure the offered load to the service provider
does not exceed the contracted rate that results in the carrier discarding traffic, configure shaping on the physi-
cal interface. This shaping is accomplished with a QoS service policy. You configure a QoS service policy on the
outside Ethernet interface, and this parent policy includes a shaper that then references a second or subordinate
(child) policy that enables queuing within the shaped rate. This is called a hierarchical Class-Based Weighted Fair
Queuing configuration. When you configure the shape average command, ensure that the value matches the
contracted bandwidth rate from your service provider.
As a best practice, embed the transport number within the name of the parent policy map.
policy-map [policy-map-name]
class [class-name]
shape [average | peak] [bandwidth (kbps)]
Step 3: Apply the child service policy as defined in Procedure 2, “Create policy map with queuing policy” above.
service-policy WAN
policy-map POLICY-TRANSPORT-1
class class-default
shape average 20000000
service-policy WAN
policy-map POLICY-TRANSPORT-2
class class-default
shape average 10000000
service-policy WAN
Repeat this procedure in order to support remote-site routers that have multiple WAN connections attached to
different interfaces.
To invoke shaping and queuing on a physical interface, you must apply the parent policy that you configured in the
previous procedure.
interface GigabitEthernet0/1
service-policy output POLICY-TRANSPORT-2
After all of the physical interfaces on a router are configured, you can verify each one before moving to the next
remote site.
Step 1: Verify the QoS output policy on each interface is correct by using the show policy-map interface com-
mand.
Service-policy : WAN
Step 2: Repeat the previous step for each interface configured with QoS.
After the all of the DMVPN routers are configured for Per-Tunnel QoS, you can verify the configurations from the
hub router.
Step 1: Verify the Per-Tunnel QoS output policy to each remote-site is correct by using the show dmvpn detail
command.
# Ent Peer NBMA Addr Peer Tunnel Add State UpDn Tm Attrb Target Network
----- --------------- --------------- ----- -------- ----- -----------------
1 192.168.6.5 10.6.34.11 UP 1w0d D 10.6.34.11/32
NHRP group: RS-GROUP-30MBPS
Output QoS service-policy applied: RS-GROUP-30MBPS-POLICY
1 192.168.6.9 10.6.34.12 UP 1w0d D 10.6.34.12/32
NHRP group: RS-GROUP-20MBPS
Output QoS service-policy applied: RS-GROUP-20MBPS-POLICY
1 192.168.6.13 10.6.34.21 UP 1w0d D 10.6.34.21/32
Step 2: Repeat the previous step for each DMVPN hub router.
These procedures include best practice recommendations for which key fields and non-key fields need to be
collected in order to allow for effective IWAN monitoring.
Additional details regarding the deployment of NetFlow with NBAR2 and the usage of a broad range of NetFlow
collector/analyzers are covered in the Application Monitoring Using NetFlow Technology Design Guide.
Flexible NetFlow requires the explicit configuration of a flow record that consists of both key fields and non-key
fields. This procedure provides guidance on how to configure a user-defined flow record that includes all of the
Traditional NetFlow (TNF) fields (key and non-key) as well as additional FNF fields (key and non-key). The result-
ing flow record includes the full subset of TNF fields used in classic NetFlow deployments.
The examples in this guide are from Cisco Prime Infrastructure and LiveAction. Different NetFlow collector ap-
plications support different export version formats and you should align your flow record with the type of network
management platform used by your organization.
Step 1: Specify key fields. This determines unique flow. Be sure to include a separate match statement for each key field.
flow record [record name]
description [record description]
match [key field type] [key field value]
Step 2: Specify non-key fields to be collected for each unique flow. Be sure to include a separate collect state-
ment for each non-key field.
flow record [record name]
collect [non-key field type] [non-key field value]
interface output
counter bytes
packets
timestamp sys-uptime first
sys-uptime last
Example
flow record Record-FNF-IWAN
description Flexible NetFlow for IWAN Monitoring
match flow direction
match interface input
match ipv4 destination address
match ipv4 protocol
match ipv4 source address
match ipv4 tos
match transport destination-port
match transport source-port
collect application name
collect counter bytes
collect counter packets
collect flow sampler
collect interface output
collect ipv4 destination mask
collect ipv4 dscp
collect ipv4 id
collect ipv4 source mask
collect ipv4 source prefix
collect routing destination as
collect routing next-hop address ipv4
collect routing source as
collect timestamp sys-uptime first
collect timestamp sys-uptime last
collect transport tcp flags
The NetFlow data that is stored in the cache of the network device can be more effectively analyzed when ex-
ported to an external collector.
Creating a flow exporter is only required when exporting data to an external collector. If data is analyzed only on
the network device, you can skip this procedure.
Reader Tip
Most external collectors use SNMP to retrieve the interface table from the network device. Ensure
that you have completed the relevant SNMP procedures for your platform.
Different NetFlow collector applications support different export version formats (v5, v9, IPFIX) and expect to
receive the exported data on a particular UDP or TCP port (ports 2055, 9991, 9995, 9996 are popular). The
NetFlow RFC 3954 does not specify a specific port for collectors to receive NetFlow data. In this deployment, the
collector applications used for testing use the parameters designated in the following table.
Step 2: For FNF records, export the interface table for FNF. The option interface-table command enables the
periodic sending of an options table. This provides interface names through the NetFlow export.
Step 3: If you are using an NBAR flow record, export the NBAR application table. The option application-table
command enables the periodic sending of an options table that allows the collector to map the NBAR application
IDs provided in the flow records to application names.
Step 4: If you are using an NBAR flow record, export the NBAR application attributes. The option application-
attributes command causes the periodic sending of NBAR application attributes to the collector.
Step 5: If you are using the Cisco ISR-G2 series routers, enable output-features. Otherwise, NetFlow traffic that
originates from a WAN remote-site router will not be encrypted or tagged using QoS.
Example: LiveAction
flow exporter Export-FNF-Monitor-1
description FNFv9 NBAR2 with LiveAction
destination 10.4.48.178
source Loopback0
output-features ! this command is not required on IOS-XE routers
transport udp 2055
template data timeout 600
option interface-table
option application-table
option application-attributes
Step 6: Verify the NetFlow exporter configuration using the show flow exporter command.
The network device must be configured to monitor the flows through the device on a per-interface basis. The
flow monitor must include a flow record and optionally one or more flow exporters if data is to be collected and
analyzed. After the flow monitor is created, it is applied to device interfaces. The flow monitor stores flow in-
formation in a cache, and the timer values for this cache are modified within the flow monitor configuration. It is
recommended that you set the timeout active timer to 60 seconds, which exports flow data on existing long-lived
flows.
Step 1: Create the flow monitor, and then set the cache timers.
Step 2: Associate the flow record to the flow monitor. You can use either a custom or a built-in flow record.
Step 3: If you are using an external NetFlow collector, associate the exporters to the flow monitor. If you are us-
ing multiple exporters, add additional lines.
Step 4: Verify the flow monitor configuration by using the show flow monitor command.
A best practice for NetFlow in an IWAN deployment is to monitor all inbound and outbound traffic on the DMVPN
tunnel interfaces.
interface [name]
ip flow monitor [monitor name] input
ip flow monitor [monitor name] output
interface Tunnel11
ip flow monitor Monitor-FNF-IWAN input
ip flow monitor Monitor-FNF-IWAN output
Step 2: Verify the proper interfaces are configured for NetFlow monitoring using the show flow interface com-
mand.
Step 3: At dual-router sites with a distribution layer, also apply the flow monitor to the interfaces that connect to
the distribution layer switch. This ensures that you capture all possible traffic flows.
Step 4: Verify the dscp used in the network by displaying the NetFlow cache on the WAN aggregation routers.
Use the show flow monitor command.
The Cisco Prime example below shows the site-to-site topology for RS12, which is a dual router IWAN hy-
brid model remote site. The remote site graphic shows the logical separation of the MC and BR functions, even
though they are physically in the same router.
INTERNET EDGE
Place In Network Product Description Part Number SW Version Feature Set
Firewall Cisco ASA 5545-X ASA5545-K9 ASA 9.1(6)
Cisco ASA 5525-X ASA5525-K9 ASA 9.1(6)
Cisco ASA 5515-X ASA5515-K9 ASA 9.1(6)
Cisco ASA 5512-X ASA5512-K9 ASA 9.1(6)
Cisco ASA 5512-X Security Plus license ASA5512-SEC-PL
Firewall Management ASDM 7.5(2)
Default
Inside
DMVPN Hub Router Internet Edge
Default
VPN-DMZ
Default
Outside
Internet
t
ul
fa
De
DMVPN Spoke Router
2034F
Default Route
If you need to extend the internal network and the same default routing options that are available to internal users,
you must advertise a default route to the VPN hub router. For details, see section A in the following figure.
Default Default
EIG
EIG
RP
RP
De
De
fa
fa
Inside
ul
Inside
ul
t
VPN-DMZ VPN-DMZ
Default Default
Outside Outside
Internet Internet
lt lt
fau fau
DMVPN De DMVPN De
Spoke Spoke
Router Router
2035F
2035