19.07.2013 Views

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

Enterprise QoS Solution Reference Network Design Guide

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 2 Campus <strong>QoS</strong> <strong>Design</strong><br />

Trusted Endpoints<br />

Version 3.3<br />

<strong>Enterprise</strong> <strong>QoS</strong> <strong>Solution</strong> <strong>Reference</strong> <strong>Network</strong> <strong>Design</strong> <strong>Guide</strong><br />

<strong>QoS</strong> <strong>Design</strong> Overview<br />

Trusted endpoints have the capabilities and intelligence to mark application traffic to the appropriate<br />

CoS and/or DSCP values. Trusted endpoints also have the ability to remark traffic that may have been<br />

previously marked by an untrusted device. Trusted endpoints are not typically mobile devices, which<br />

means that the switch port into which they are plugged does not usually change.<br />

Note Cisco IP Phones, which often change switch ports as users move, are more appropriately classified as<br />

conditionally-trusted endpoints.<br />

Examples of trusted endpoints include the following:<br />

Analog gateways—These devices connect analog devices such as fax machines, modems,<br />

TDD/TTYs, and analog phones to the VoIP network, such that the analog signals can be packetized<br />

and transmitted over the IP network.<br />

Examples of analog gateways include the following:<br />

– Analog network modules (NM-1V and NM2-V, which support either high- or low-density<br />

Voice/Fax Interface Cards (VICs)<br />

– Cisco Communication Media Module (CMM) linecard<br />

– Catalyst 6500 Analog Interface Module (WS-X6624-FXS).<br />

– Cisco VG224 and VG248 IOS-based voice gateways<br />

IP conferencing stations—These devices are specialized IP Phones with 360 degree microphones<br />

and advanced speakerphones designed for meeting room VoIP conferencing. Examples of such<br />

devices include the Cisco 7935 and 7936.<br />

Videoconferencing gateways and systems—These devices transmit interactive video across the IP<br />

network. Examples of such devices capable of setting DSCP markings include the Cisco IP/VC<br />

3511, 3521, 3526 and 3540 videoconferencing gateways and systems. If, on the other hand,<br />

video-conferencing devices do not have the ability to set DSCP markings correctly, they should be<br />

treated as untrusted devices.<br />

Video surveillance units—These third-party devices are used for security and remote monitoring<br />

purposes over an IP (as opposed to a closed-circuit) network. These may support DSCP marking, in<br />

which case they may be considered trusted endpoints.<br />

Servers—Certain servers, within the data center or otherwise, might be capable of correctly marking<br />

their traffic on their NICs. In such cases, the network administrator can choose to trust such<br />

markings. However, enforcing such a trust boundary requires cooperation between network<br />

administrators and system or server administrators, an alliance that is often fragile, at best, and<br />

usually involves considerable finger pointing. Additionally, network administrators should bear in<br />

mind that the majority of DoS/ worm attacks target servers. Infected servers not only might spew<br />

profuse amounts of traffic onto the network, but, in such cases, they might do so with trusted<br />

markings. There’s no hard-and-fast rule that will apply to every situation. Some administrators<br />

prefer to trust certain servers, like Cisco CallManagers, due to the large number of ports that may<br />

be in use to provide services rather than administer complex access lists. In either case, consider the<br />

tradeoffs involved when deciding whether or not to trust a server.<br />

Wireless access points—Some wireless access points (APs) have the ability to mark or remark<br />

802.1p CoS and/or DSCP values and therefore qualify as trusted endpoints. Examples include Cisco<br />

Aironet 350, 1100 and 1200 series APs.<br />

2-7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!