19.07.2013 Views

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 2 Campus <strong>QoS</strong> <strong>Design</strong><br />

Call Signaling Ports<br />

Version 3.3<br />

<strong>Enterprise</strong> <strong>QoS</strong> <strong>Solution</strong> <strong>Reference</strong> <strong>Network</strong> <strong>Design</strong> <strong>Guide</strong><br />

<strong>QoS</strong> <strong>Design</strong> Overview<br />

Cisco does not recommend policing all traffic to 5 Mbps and automatically dropping the excess. If that<br />

was the case, there would be no need to deploy FastEthernet or GigabitEthernet switch ports to endpoint<br />

devices because even 10-BaseT Ethernet switch ports have more uplink capacity than a 5 Mbps<br />

policer-enforced limit. Such an approach would also penalize legitimate traffic that did exceed 5 Mbps<br />

on a FastEthernet switch port.<br />

A less severe approach is to couple access layer policers with hardware/software (campus/WAN/VPN)<br />

queuing polices, with both sets of policies provisioning for a less-than Best-Effort Scavenger class.<br />

With this method, access layer policers mark down out-of-profile traffic to DSCP CS1 (Scavenger) and<br />

then all congestion management policies (whether in Catalyst hardware or in IOS software) provision a<br />

less-than Best-Effort service for any traffic marked to CS1 during periods of congestion.<br />

This method works for both legitimate traffic exceeding the access layer policer’s watermark and also<br />

for illegitimate excess traffic as a result of a DoS or worm attack.<br />

In the former case, for example, assume that the PC generates over 5 Mbps of traffic, perhaps because<br />

of a large file transfer or backup. Congestion under normal operating conditions is rarely if ever<br />

experienced because there is generally abundant capacity to carry the traffic within the campus. This is<br />

usually true because the uplinks to the distribution and core layers of the campus network are typically<br />

GigabitEthernet and require 1000 Mbps of traffic from the access layer switch to congest. If the traffic<br />

is destined to the far side of a WAN/VPN link, which is rarely over 5 Mbps in speed, dropping occurs<br />

even without the access layer policer, because of the campus/WAN speed mismatch and resulting<br />

bottleneck. TCP’s sliding windows mechanism eventually finds an optimal speed (under 5 Mbps) for the<br />

file transfer. Thus, access layer policers that mark down out-of-profile traffic to Scavenger (CS1) do not<br />

affect legitimate traffic, aside from the obvious remarking. No reordering or dropping occurs on such<br />

flows as a result of these policers that would not have occurred in any event.<br />

In the case of illegitimate excess traffic, the effect of access layer policers on traffic caused by DoS or<br />

worm attacks is quite different. As many hosts become infected and traffic volumes multiply, congestion<br />

may be experienced in the campus up-links due to the aggregate traffic volume. For example, if just 11<br />

end-user PCs on a single access-layer switch begin spawning worm flows to their maximum FastEthernet<br />

link capacities, the GigabitEthernet up-link to the distribution layer switch will congest, and<br />

queuing/reordering will engage. At such a point, VoIP and critical data applications, and even Best Effort<br />

applications, gain priority over worm-generated traffic. Scavenger traffic is dropped the most<br />

aggressively, while network devices remain accessible for the administration of patches/plugs/ACLs<br />

required to fully neutralize the specific attack.<br />

WAN links are also protected. VoIP, critical data and even Best Effort flows continue to receive priority<br />

over any traffic marked down to Scavenger/CS1. This is a huge advantage, because WAN links are<br />

generally the first to be overwhelmed by DoS/worm attacks. Access layer policers thus significantly<br />

mitigate network traffic generated by DoS or worm attacks.<br />

You should recognize the distinction between mitigating an attack and preventing it entirely. The<br />

strategy presented here does not guarantee that no Denial of Service or worm attacks will ever happen,<br />

but serves only to reduce the risk and impact that such attacks have on the campus network infrastructure<br />

and then, by extension, the WAN/VPN network infrastructure. Furthermore, while this strategy reduces<br />

the collateral damage to the network infrastructure caused by DoS/worm attacks, it may not mitigate<br />

other specific objectives of such worms, such as reconnaissance and vulnerability exploitation. Hence,<br />

a comprehensive approach much be used to address DoS/worm attacks, involving a holistic integration<br />

of security technologies with Quality of Service technologies.<br />

In this design chapter, only Skinny Call Control Protocol (SCCP) ports (TCP Ports 2000–2002) are used<br />

to identify call signaling protocols to keep the examples relatively simple.<br />

2-5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!