Configuring Global QoS Parameters
•
When automatic NMS prioritization is enabled, QoS policies that specify priority are not applied to the
NMS traffic. Other QoS policies, however, are applied to this type of traffic as usual. If a policy speci-
fies rate limiting, then the policy with the lowest rate limiting value is applied.
Configuring Automatic Prioritization for IP Phone Traffic
The switch automatically trusts the priority of IP phone traffic by default. This means that the priority
value contained in packets originating from IP phones is used for the ingress priority. The default priority
value configured for the QoS port receiving such traffic is used for the egress priority of the packet.
IP phone traffic is detected by examining the source MAC address of the packet to determine if the
address falls within the following ranges of IP phone MAC addresses:
00-80-9F-54-xx-xx to 00-80-9F-64-xx-xx
00-80-9F-66-xx-xx to 00-80-9F-6F-xx-xx.
In addition to prioritizing IP phone traffic, it is also possible to automatically prioritize non-IP phone traf-
fic. This is done by adding up to four MAC addresses or four ranges of MAC addresses to the predefined
QoS "alaPhone" MAC address group. See
The
qos phones
command is used to enable or disable automatic prioritization of IP phone traffic. In addi-
tion, this command also specifies whether to trust the IP phone traffic (the default) or apply a specified
priority value to the traffic. For example, the following command specifies a priority value to apply for
ingress IP phone traffic:
-> qos phones priority 1
To trust IP phone traffic, enter the following command:
-> qos phones trusted
To disable automatic IP phone traffic prioritization for the switch, enter the following command:
-> qos no phones
Note that When automatic prioritization of IP phone traffic is enabled, QoS policies that specify priority
are not applied to the IP phone traffic. Other QoS policies, however, are applied to this type of traffic as
usual. If a policy specifies rate limiting, then the policy with the lowest rate limiting value is applied.
Using Quarantine Manager and Remediation
Quarantine Manager and Remediation (QMR) is a switch-based application that interacts with the
OmniVista Quarantine Manager (OVQM) application to restrict the network access of quarantined clients
and provide a remediation path for such clients to regain their network access. This functionality is driven
by OVQM, but the following QMR components are configured through QoS CLI commands:
•
Quarantined MAC address group. This is a reserved QoS MAC address group that contains the
MAC addresses of clients that OVQM has quarantined and that are candidates for remediation. The
default name of this group is "Quarantined", but the user can specify a different name using the
quarantine mac-group
•
Remediation server and exception subnet group. This is a reserved QoS network group, called
"alaExceptionSubnet", that is configured with the IP address of a remediation server and any subnets to
which a quarantined client is allowed access. The quarantined client is redirected to the remediation
server to obtain updates and correct its quarantined state. IP addresses are added to this group using the
policy network group
page 40-16
"Creating MAC Groups" on page 40-46
command.
command.
OmniSwitch AOS Release 6 Network Configuration Guide
Configuring QoS
for more information.
qos
September 2009
Need help?
Do you have a question about the OmniSwitch 6850-48 and is the answer not in the manual?
Questions and answers