19.07.2013 Views

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>QoS</strong> <strong>Design</strong> Overview<br />

Access Edge Trust Models<br />

2-6<br />

<strong>Enterprise</strong> <strong>QoS</strong> <strong>Solution</strong> <strong>Reference</strong> <strong>Network</strong> <strong>Design</strong> <strong>Guide</strong><br />

Chapter 2 Campus <strong>QoS</strong> <strong>Design</strong><br />

However, SCCP is by no means the only call signaling protocol used in IP telephony environments.<br />

Cisco recommends including all relevant call signaling ports required for a given IPT environment in the<br />

access lists that identify call signaling protocols. Firewalls protecting CallManagers should also allow<br />

additional ports to provide the supplementary services that CallManagers provide or require.<br />

This section includes the following topics:<br />

Trusted Endpoints<br />

Untrusted Endpoints<br />

Conditionally-Trusted Endpoints<br />

The primary function of access edge policies is to establish and enforce trust boundaries. A trust<br />

boundary is the point within the network where markings such as CoS or DSCP begin to be accepted.<br />

Previously-set markings are overridden as required at the trust boundary.<br />

You should enforce trust boundaries as close to the endpoints as technically and administratively<br />

possible as shown in Figure 2-3.<br />

Figure 2-3 Establishing Trust Boundaries<br />

1<br />

2<br />

3<br />

Endpoints Access Distribution Core WAN Aggregators<br />

Legend for Figure 2-3:<br />

1. Optimal trust boundary: trusted endpoint<br />

2. Optimal trust boundary: untrusted endpoint<br />

3. Sub-optimal trust boundary<br />

The definition of the trust boundary depends on the capabilities of the endpoints that are being connected<br />

to the access edge of the LAN. The following are the three main categories of endpoints as they relate<br />

to trust boundaries:<br />

Trusted endpoints<br />

Untrusted endpoints<br />

Conditionally-trusted endpoints<br />

Trust Boundary<br />

1 Optimal Trust Boundary: 2 Optimal Trust Boundary: 3 Suboptimal Trust Boundary<br />

Trusted Endpoint<br />

Untrusted Endpoint<br />

Si<br />

Si<br />

Si<br />

Si<br />

Version 3.3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!