- Finding Feature Information
- Prerequisites for QoS Tunnel Marking for GRE Tunnels
- Restrictions for QoS Tunnel Marking for GRE Tunnels
- Information About QoS Tunnel Marking for GRE Tunnels
QoS Tunnel Marking for GRE Tunnels
The QoS Tunnel Marking for GRE Tunnels feature introduces the capability to define and control the quality of service (QoS) for incoming customer traffic on the provider edge (PE) router in a service provider network.
Note |
For Cisco IOS Release 12.4(15)T2, the QoS Tunnel Marking for GRE Tunnels feature is supported only on platforms equipped with a Cisco MGX Route Processor Module (RPM-XF). |
- Finding Feature Information
- Prerequisites for QoS Tunnel Marking for GRE Tunnels
- Restrictions for QoS Tunnel Marking for GRE Tunnels
- Information About QoS Tunnel Marking for GRE Tunnels
- How to Configure Tunnel Marking for GRE Tunnels
- Configuration Examples for QoS Tunnel Marking for GRE Tunnels
- Additional References
- Feature Information for QoS Tunnel Marking for GRE Tunnels
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for QoS Tunnel Marking for GRE Tunnels
- You must configure Cisco Express Forwarding (CEF) on the interface before GRE tunnel marking can be used.
- You must determine the topology and interfaces that need to be configured to mark incoming traffic.
Restrictions for QoS Tunnel Marking for GRE Tunnels
- GRE tunnel marking is supported in input policy maps only and should not be configured for output policy maps.
- It is possible to configure GRE tunnel marking and the ip tos command at the same time. However, Modular Quality of Service (QoS) Command-Line Interface (CLI) (MQC) GRE tunnel marking has higher priority over IP ToS commands, meaning that tunnel marking always rewrites the IP header of the tunnel packet and overwrites the values set by ip tos commands. The priority of enforcement is as follows when these commands are used simultaneously:
- set ip dscp tunnel or set ip precedence tunnel (GRE tunnel marking)
- ip tos reflect
- ip tos tos-value
Note |
This is the designed behavior. We recommend that you configure only GRE tunnel marking and reconfigure any peers configured with the ip tos command to use GRE tunnel marking. |
Information About QoS Tunnel Marking for GRE Tunnels
- GRE Definition
- GRE Tunnel Marking Overview
- GRE Tunnel Marking and the MQC
- GRE Tunnel Marking and DSCP or IP Precedence Values
- Benefits of GRE Tunnel Marking
GRE Definition
Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco that can encapsulate a wide variety of protocol packet types inside IP tunnels, creating a virtual point-to-point link to Cisco routers at remote points over an IP internetwork.
GRE Tunnel Marking Overview
The QoS Tunnel Marking for GRE Tunnels feature allows you to define and control QoS for incoming customer traffic on the PE router in a service provider (SP) network. This feature lets you set (mark) either the IP precedence value or the differentiated services code point (DSCP) value in the header of an GRE tunneled packet. GRE tunnel marking can be implemented by using a QoS marking command, such as set ip {dscp| precedence} [tunnel], and it can also be implemented in QoS traffic policing. This feature simplifies administrative overhead previously required to control customer bandwidth by allowing you to mark the GRE tunnel header on the incoming interface on the PE routers.
The figure below shows traffic being received from the CE1 router through the incoming interface on the PE1 router on which tunnel marking occurs. The traffic is encapsulated (tunneled), and the tunnel header is marked on the PE1 router. The marked packets travel (tunnel) through the core and are decapsulated automatically on the exit interface of the PE2 router. This feature is designed to simplify classifying customer edge (CE) traffic and is configured only in the service provider network. This process is transparent to the customer sites. The CE1 and CE2 routers simply exist as a single network.
GRE Tunnel Marking and the MQC
To configure the tunnel marking for GRE tunnels, you must configure a class map and a policy map and then attach that policy map to the appropriate interface. These three tasks can be accomplished by using the MQC.
For information on using the MQC, see the "Applying QoS Features Using the MQC" module.
GRE Tunnel Marking and DSCP or IP Precedence Values
GRE tunnel marking is configured with the set ip precedence tunnel or set ip dscp tunnelcommand on PE routers that carry incoming traffic from customer sites. GRE tunnel marking allows you to mark the header of a GRE tunnel by setting a DSCP value from 0 to 63 or an IP precedence value from 0 to 7 to control GRE tunnel traffic bandwidth and priority.
GRE traffic can also be marked under traffic policing with the set-dscp-tunnel-transmitand the set-prec-tunnel-transmit actions (or keywords) of the police command. The tunnel marking value is from 0 to 63 for the set-dscp-tunnel-transmit actions and from 0 to 7 for the set-prec-tunnel-transmitcommand. Under traffic policing, tunnel marking can be applied with "conform" and "exceed" action statements, allowing you to automatically apply a different value for traffic that does not conform to the expected traffic rate.
After the tunnel header is marked, GRE traffic is carried through the tunnel and across the service provider network. This traffic is decapsulated on the interface of the PE router that carries the outgoing traffic to the other customer site. The configuration of GRE tunnel marking is transparent to customer sites. All internal configuration is preserved.
It is important to distinguish between the set ip precedence and set ip dscp commands and the set ip precedence tunnel and set ip dscp tunnel commands.
- The set ip precedence and set ip dscp commands are used to set the IP precedence value or DSCP value in the header of an IP packet.
- The set ip precedence tunneland set ip dscp tunnelcommands are used to set (mark) the IP precedence value or DSCP value in the tunnel header that encapsulates the GRE traffic.
Benefits of GRE Tunnel Marking
GRE tunnel marking provides a simple mechanism to control the bandwidth of customer GRE traffic. The QoS Tunnel Marking for GRE Tunnels feature is configured entirely within the service provider network and only on interfaces that carry incoming traffic on the PE routers.
GRE Tunnel Marking and Traffic Policing
Traffic policing allows you to control the maximum rate of traffic sent or received on an interface and to partition a network into multiple priority levels or class of service (CoS). If you use traffic policing in your network, you can also implement the GRE tunnel marking feature with the set-dscp-tunnel-transmitor set-prec-tunnel-transmit actions (or keywords) of the police command in policy-map class configuration mode. Under traffic policing, tunnel marking can be applied with "conform" and "exceed" action statements, allowing you to apply a different value automatically for traffic that does not conform to the expected traffic rate.
GRE Tunnel Marking Values
The range of the tunnel marking values for the set ip dscp tunnel and set-dscp-tunnel-transmitcommands is from 0 to 63; and the range of values for the set ip precedence tunneland set-prec-tunnel-transmit commands is from 0 to 7.
How to Configure Tunnel Marking for GRE Tunnels
- Configuring a Class Map
- Creating a Policy Map
- Attaching the Policy Map to an Interface or a VC
- Verifying the Configuration of Tunnel Marking for GRE Tunnels
Configuring a Class Map
DETAILED STEPS
Creating a Policy Map
Note |
It is possible to configure GRE tunnel marking and the ip tos command at the same time. However, MQC (GRE) tunnel marking has higher priority over IP ToS commands, meaning that tunnel marking will always rewrite the IP header of the tunnel packet, overwriting the values set by ip tos commands. The order of enforcement is as follows when these commands are used simultaneously:
|
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode. |
||
|
Example: Router# configure terminal |
Enters global configuration mode. |
||
|
Example: Router(config)# policy-map TUNNEL_MARKING |
Creates or modifies a policy map that can be attached to one or more interfaces to specify a service policy, and enters policy-map configuration mode. |
||
|
Example: Router(config-pmap)# class MATCH_FRDE |
Specifies the name of the class whose policy you want to create or change or specifies the default class (commonly known as the class-default class) before you configure its policy. Also enters policy-map class configuration mode. |
||
|
Example: Router(config-pmap-c)# set ip dscp tunnel 3 |
Sets or marks the differentiated services code point (DSCP) value in the tunnel header of a GRE-tunneled packet on the ingress interface. The tunnel marking value is a number from 0 to 63 when configuring DSCP. |
||
|
|
|
||
|
Example: Router(config-pmap-c)# set ip precedence tunnel 3 |
Sets or marks the IP precedence value in the tunnel header of a GRE-tunneled packet on the ingress interface. The tunnel marking value is a number from 0 to 7 when configuring IP precedence. |
||
|
|
|
||
|
Example: Router(config-pmap-c)# police 8000 conform-action set-dscp-tunnel-transmit 4 Example: exceed-action set-dscp-tunnel-transmit 0 Example:
Example:
Example: Router(config-pmap-c)# police 8000 conform-action set-prec-tunnel-transmit 4 exceed-action set-prec-tunnel-transmit 0 Example:
|
Configures traffic policing on the basis of the bits per second (bps) specified and the actions specified. If you use traffic policing in your network, you can implement the GRE tunnel marking feature with the set-dscp-tunnel-transmitor set-prec-tunnel-transmit keywords of the police command instead of the set ip dscp tunnel or the set ip precedence tunnel commands. The tunnel marking value for the traffic policing commands is from 0 to 63 when using set-dscp-tunnel-transmit and from 0 to 7 when using set-prec-tunnel-transmit.
|
||
|
Example: Router(config-pmap-c)# end |
(Optional) Returns to privileged EXEC mode. |
Attaching the Policy Map to an Interface or a VC
Note |
Policy maps can be attached to main interfaces, subinterfaces, or ATM permanent virtual circuits (PVCs). Policy maps are attached to interfaces by using the service-policycommand and specifying either the input or output keyword to indicate the direction of the interface. This feature is supported only on ingress interfaces with the input keyword and should not be configured on egress interfaces with the output keyword. > |
- service-policy {input| output} policy-map-name
- end
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
||
|
Example: Router# configure terminal |
Enters global configuration mode. |
||
|
Example: Router(config)# interface serial 0 |
Configures the specified interface type and enters interface configuration mode.
|
||
|
Example: Router(config-if)# pvc cisco 0/16 ilmi |
(Optional) Creates or assigns a name to an ATM PVC, specifies the encapsulation type on an ATM PVC, and enters ATM virtual circuit configuration mode. |
||
|
Example: Router(config-if)# service-policy input policy1 Example:
Example:
Example: Router(config-if-atm-vc)# service-policy input policy1 |
Specifies the name of the policy map to be attached to the input or outputdirection of the interface.
|
||
|
Example: Router(config-if)# end Example:
Example: Router(config-if-atm-vc)# end |
(Optional) Returns to privileged EXEC mode. |
Verifying the Configuration of Tunnel Marking for GRE Tunnels
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode.
|
|
Example: Router# show policy-map interface serial4/0 |
(Optional) Displays the packet statistics of all classes that are configured for all service policies either on the specified interface or subinterface or on a specific PVC on the interface.
|
|
Example: Router# show policy-map policy1 |
(Optional) Displays the configuration of all classes for a specified service policy map or all classes for all existing policy maps.
|
|
Example: Router# exit |
(Optional) Returns to user EXEC mode. |
Troubleshooting Tips
The commands in the Verifying the Configuration of Tunnel Marking for GRE Tunnels section allow you to verify that you achieved the intended configuration and that the feature is functioning correctly. If, after using the show commands listed above, you find that the configuration is not functioning as expected, perform these operations to troubleshoot the configuration.
- Use the show running-config command and analyze the output of the command.
- If the policy map does not appear in the output of the show running-config command, enable the logging console command.
- Attach the policy map to the interface again.
Configuration Examples for QoS Tunnel Marking for GRE Tunnels
- Example Configuring Tunnel Marking for GRE Tunnels
- Example Verifying the Tunnel Marking for GRE Tunnels Configuration
Example Configuring Tunnel Marking for GRE Tunnels
The following is an example of a GRE tunnel marking configuration. In this example, a class map called "MATCH_FRDE" has been configured to match traffic based on the Frame Relay DE bit.
Router> enable Router# configure terminal Router(config)# class-map MATCH_FRDE Router(config-cmap)# match fr-de Router(config-cmap)# end
In this part of the example configuration, a policy map called "TUNNEL_MARKING" has been created and the set ip dscp tunnel command has been configured in the policy map. You could use the set ip precedence tunnel command instead of the set ip dscp tunnel command if you do not use DSCP in your network.
Router(config)# policy-map TUNNEL_MARKING
Router(config-pmap)# class MATCH_FRDE
Router(config-pmap-c)# set ip dscp tunnel 3
Router(config-pmap-c)# end
Note |
This next part of the example configuration is not required to configure this feature if you use the set ip dscp tunnel or set ip precedence tunnel commands to enable GRE tunnel marking. This example shows how GRE tunnel marking can be enabled under traffic policing. |
In this part of the example configuration, the policy map called "TUNNEL_MARKING" has been created and traffic policing has also been configured by using the police command and specifying the appropriate policing actions. The set-dscp-tunnel-transmit command can be used instead of the set-prec-tunnel-transmit command if you use DSCP in your network.
Router(config)# policy-map TUNNEL_MARKING
Router(config-pmap)# class class-default
Router(config-pmap-c)# police 8000 conform-action set-prec-tunnel-transmit 4 exceed-action set-prec-tunnel-transmit 0 Router(config-pmap-c)# end
In the final part of the example configuration, the policy map is attached to serial interface 0 in the inbound (input) direction by specifying the input keyword of the service-policy command.
Router(config)# interface serial 0 Router(config-if)# service-policy input TUNNEL_MARKING Router(config-if)# end
Example Verifying the Tunnel Marking for GRE Tunnels Configuration
This section contains sample output from the show policy-map interface command and the show policy-map command. The output from these commands can be used to verify and monitor the feature configuration in your network.
The following is sample output from the show policy-map interface command. In this sample output, the character string "ip dscp tunnel 3" indicates that GRE tunnel marking has been configured to set the DSCP value in the header of a GRE-tunneled packet.
Router# show policy-map interface
Serial0
Service-policy input: tunnel
Class-map: frde (match-all)
0 packets, 0 bytes
30 second offered rate 0 bps, drop rate 0 bps
Match: fr-de
QoS Set
ip dscp tunnel 3
Packets marked 0
Class-map: class-default (match-any)
13736 packets, 1714682 bytes
30 second offered rate 0 bps, drop rate 0 bps
Match: any
13736 packets, 1714682 bytes
30 second rate 0 bps
The following is sample output from the show policy-mapcommand. In this sample output, the character string "ip precedence tunnel 4" indicates that the GRE tunnel marking feature has been configured to set the IP precedence value in the header of an GRE-tunneled packet.
Router# show policy-map
Policy Map TUNNEL_MARKING
Class MATCH_FRDE
set ip precedence tunnel 4
Additional References
Related Documents
Related Topic |
Document Title |
---|---|
Cisco IOS commands |
|
QoS commands: complete command syntax, command modes, command history, defaults, usage guidelines, and examples |
Cisco IOS Quality of Service Solutions Command Reference |
MQC |
"Applying QoS Features Using the MQC" module |
Tunnel marking for Layer 2 Tunnel Protocol Version 3 (L2TPv3) tunnels |
"QoS: Tunnel Marking for L2TPv3 Tunnels" module |
DSCP |
"Overview of DiffServ for Quality of Service" module |
Standards
Standard |
Title |
---|---|
No new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature. |
-- |
MIBs
MIB |
MIBs Link |
---|---|
No new or modified MIBs are supported by this feature, and support for existing MIBs has not been modified by this feature. |
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: |
RFCs
RFC |
Title |
---|---|
No new or modified RFCs are supported by this feature, and support for existing RFCs has not been modified by this feature. |
-- |
Technical Assistance
Description |
Link |
---|---|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
Feature Information for QoS Tunnel Marking for GRE Tunnels
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 1 | Feature Information for QoS Tunnel Marking for GRE Tunnels |
Feature Name |
Releases |
Feature Information |
||
---|---|---|---|---|
QoS Tunnel Marking for GRE Tunnels |
12.4(15)T2 12.2(33)SRC 12.2(33)SB |
The QoS Tunnel Marking for GRE Tunnels feature introduces the capability to define and control the QoS for incoming customer traffic on the PE router in a service provider network.
The following commands were introduced or modified: match atm-clp, match cos, match fr-de, police, police (two rates), set ip dscp tunnel, set ip precedence tunnel, show policy-map, show policy-map interface. |
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.