配置 QoS 策略后我看不到丢包

网络工程 思科 思科-ios 网络 服务质量 警务
2022-02-25 18:33:15

我的目标是使用以下SR 路径= { R1、R2、R3、R4、R3、R2、R1、R2 和 R3 } 将iperf流量从Endpoint1(客户端)发送到Endpoint2(服务器) 。 首先,iperfEndpoint1生成的流量是线性增加的 UDP 流量,直到我手动停止。使用SNMPCacti ,我可以通过下面总结的链接(GRE 隧道)获得吞吐量。在此处输入图像描述

我将所有隧道的带宽设置为10Mbps,我期待看到丢包,但我没有。从图中可以明显看出,吞吐量已经超过了隧道的带宽。但是,没有记录丢包。

因此,我在接口的隧道上配置了监管带宽,如下所示:

class-map match-all acgroup2
 match access-group 2
!
policy-map police
 class acgroup2
  police cir 10000000
   conform-action transmit 
   exceed-action drop 
   violate-action drop 

但是,在发送流量后,即使接口超过了带宽隧道,我也看不到任何流量下降。

#show policy-map interface
Tunnel0 

  Service-policy input: POLICER

    Class-map: acgroup2 (match-all)  
      0 packets, 0 bytes
      30 second offered rate 0000 bps, drop rate 0000 bps
      Match: none 
      police:
          cir 10000000 bps, bc 312500 bytes, be 312500 bytes
        conformed 0 packets, 0 bytes; actions:
          transmit 
        exceeded 0 packets, 0 bytes; actions:
          drop 
        violated 0 packets, 0 bytes; actions:
          drop 
        conformed 0000 bps, exceeded 0000 bps, violated 0000 bps

    Class-map: class-default (match-any)  
      323771 packets, 261795856 bytes
      30 second offered rate 8731000 bps, drop rate 0000 bps
      Match: any 
 Tunnel1 

  Service-policy input: POLICER

    Class-map: acgroup2 (match-all)  
      0 packets, 0 bytes
      30 second offered rate 0000 bps, drop rate 0000 bps
      Match: none 
      police:
          cir 10000000 bps, bc 312500 bytes, be 312500 bytes
        conformed 0 packets, 0 bytes; actions:
          transmit 
        exceeded 0 packets, 0 bytes; actions:
          drop 
        violated 0 packets, 0 bytes; actions:
          drop 
        conformed 0000 bps, exceeded 0000 bps, violated 0000 bps

    Class-map: class-default (match-any)  
      857218 packets, 694258348 bytes
      30 second offered rate 22024000 bps, drop rate 0000 bps
      Match: any 

无论发送的流量是多少,conformed超出违反的值根本没有改变。

这是重要的路由器配置

R1

    segment-routing mpls
 global-block 17000 18000
 !
 connected-prefix-sid-map
  address-family ipv4
   11.11.11.11/32 index 11 range 1 
  exit-address-family
!
class-map match-all acgroup2
     match access-group 100
    !
    policy-map police
     class acgroup2
      police cir 8000000
       conform-action transmit 
       exceed-action drop 
       violate-action drop 
    !
    interface Loopback0
     ip address 11.11.11.11 255.255.255.255
    !
    interface Tunnel0
     bandwidth 10000
     ip flow monitor NTAMonitor input
     ip flow monitor NTAMonitor output
     ip address 10.10.1.1 255.255.255.252
     ip router isis aws
     load-interval 30
     mpls traffic-eng tunnels
     keepalive 2 3
     tunnel source GigabitEthernet1
     tunnel destination 52.27.173.12
     tunnel path-mtu-discovery
     isis metric 1
     service-policy output police
    !
    interface Tunnel1
     bandwidth 10000
     ip flow monitor NTAMonitor input
     ip flow monitor NTAMonitor output
     ip address 10.10.4.2 255.255.255.252
     ip router isis aws
     load-interval 30
     mpls traffic-eng tunnels
     keepalive 2 3
     tunnel source GigabitEthernet1
     tunnel destination 54.70.66.102
     tunnel path-mtu-discovery
     isis metric 1
     service-policy output police
    !
    interface Tunnel4
     description MPLS TE Tunnel1 to the destination for path SR1
     ip unnumbered Loopback0
     tunnel mode mpls traffic-eng
     tunnel destination 33.33.33.33
     tunnel mpls traffic-eng autoroute announce
     tunnel mpls traffic-eng path-option 1 explicit name SR1 segment-routing verbatim
    !
    interface Tunnel5
     description MPLS TE Tunnel2 to the destination for path SR2
     ip unnumbered Loopback0
     tunnel mode mpls traffic-eng
     tunnel destination 33.33.33.33
     tunnel mpls traffic-eng autoroute announce
     tunnel mpls traffic-eng path-option 1 explicit name SR2 segment-routing verbatim
    !         
    interface VirtualPortGroup0
     vrf forwarding GS
     ip address 192.168.35.101 255.255.255.0
     ip nat inside
     no mop enabled
     no mop sysid
    !
    interface GigabitEthernet1
     ip flow monitor NTAMonitor input
     ip flow monitor NTAMonitor output
     ip address dhcp
     ip nat outside
     load-interval 30
     negotiation auto
     ipv6 address dhcp
     ipv6 enable
     no mop enabled
     no mop sysid
     service-policy output police
    !
    router isis aws
     net 49.0001.0000.0000.0011.00
     metric-style wide
     segment-routing mpls
     segment-routing prefix-sid-map advertise-local
     passive-interface Loopback0
     mpls traffic-eng router-id Loopback0
    !
    iox
    ip forward-protocol nd
    ip tcp window-size 8192
    ip http server
    ip http authentication local
    ip http secure-server
    ip nat inside source list GS_NAT_ACL interface GigabitEthernet1 vrf GS overload
    ip route 0.0.0.0 0.0.0.0 GigabitEthernet1 172.0.1.1
    ip route 33.33.33.33 255.255.255.255 Tunnel4
    ip route 33.33.33.33 255.255.255.255 Tunnel5
    ip route 172.2.1.5 255.255.255.255 Tunnel4
    ip route 172.2.1.7 255.255.255.255 Tunnel5
    ip route vrf GS 0.0.0.0 0.0.0.0 GigabitEthernet1 172.0.1.1 global
    !
    ip explicit-path name SR1 enable
     index 1 next-label 17022
     index 2 next-label 17033
     index 3 next-label 17044
     index 4 next-label 17033
     index 5 next-label 17022
     index 6 next-label 17011
     index 7 next-label 17022
     index 8 next-label 17033
    !
    ip ssh rsa keypair-name ssh-key
    ip ssh version 2
    ip ssh pubkey-chain
    ip scp server enable
    !
    access-list 100 permit ip any any
    ipv6 route ::/0 GigabitEthernet1 FE80::83F:37FF:FE14:2840
    !
    !
    snmp-server community public RO
    snmp-server community private RW
    !
    !
    control-plane
    !
    line con 0
     stopbits 1
    line vty 0 4
     login local
     transport input ssh
    !
    app-hosting appid guestshell
     app-vnic gateway1 virtualportgroup 0 guest-interface 0
      guest-ipaddress 192.168.35.102 netmask 255.255.255.0
     app-default-gateway 192.168.35.101 guest-interface 0
     name-server0 8.8.8.8
    end

R2

segment-routing mpls
 global-block 17000 18000
 !
 connected-prefix-sid-map
  address-family ipv4
   22.22.22.22/32 index 22 range 1 
  exit-address-family
 !
!
spanning-tree extend system-id
!
netconf-yang
!
restconf
!
redundancy    
!
interface Loopback0
 ip address 22.22.22.22 255.255.255.255
!
interface Tunnel0
 bandwidth 10000
 ip flow monitor NTAMonitor input
 ip flow monitor NTAMonitor output
 ip address 10.10.2.1 255.255.255.252
 ip router isis aws
 load-interval 30
 mpls traffic-eng tunnels
 keepalive 2 3
 tunnel source GigabitEthernet1
 tunnel destination 52.38.167.137
 tunnel path-mtu-discovery
 isis metric 1
!
interface Tunnel1
 bandwidth 10000
 ip flow monitor NTAMonitor input
 ip flow monitor NTAMonitor output
 ip address 10.10.1.2 255.255.255.252
 ip router isis aws
 load-interval 30
 mpls traffic-eng tunnels
 keepalive 2 3
 tunnel source GigabitEthernet1
 tunnel destination 35.167.193.103
 tunnel path-mtu-discovery
 isis metric 1
!
interface VirtualPortGroup0
 vrf forwarding GS
 ip address 192.168.35.101 255.255.255.0
 ip nat inside
 no mop enabled
 no mop sysid
!
interface GigabitEthernet1
 ip flow monitor NTAMonitor input
 ip flow monitor NTAMonitor output
 ip address dhcp
 ip nat outside
 load-interval 30
 negotiation auto
 ipv6 address dhcp
 ipv6 enable
 no mop enabled
 no mop sysid
!
router isis aws
 net 49.0001.0000.0000.0022.00
 metric-style wide
 segment-routing mpls
 segment-routing prefix-sid-map advertise-local
 passive-interface Loopback0
 mpls traffic-eng router-id Loopback0
!
iox
ip forward-protocol nd
ip tcp window-size 8192
ip http server
ip http authentication local
ip http secure-server
ip nat inside source list GS_NAT_ACL interface GigabitEthernet1 vrf GS overload
ip route 0.0.0.0 0.0.0.0 GigabitEthernet1 172.1.1.1
ip route vrf GS 0.0.0.0 0.0.0.0 GigabitEthernet1 172.1.1.1 global
!
ip ssh rsa keypair-name ssh-key
ip ssh version 2
ip scp server enable
!
!
ip access-list standard GS_NAT_ACL
 permit 192.168.35.0 0.0.0.255
ipv6 route ::/0 GigabitEthernet1 FE80::83E:87FF:FEAA:8604
!      
snmp-server community public RO
snmp-server community private RW
!
!
control-plane
!
line con 0
 stopbits 1
line vty 0 4
 login local
 transport input ssh
!
app-hosting appid guestshell
 app-vnic gateway1 virtualportgroup 0 guest-interface 0
  guest-ipaddress 192.168.35.102 netmask 255.255.255.0
 app-default-gateway 192.168.35.101 guest-interface 0
 name-server0 8.8.8.8
end

R3

segment-routing mpls
 global-block 17000 18000
 !
 connected-prefix-sid-map
  address-family ipv4
   33.33.33.33/32 index 33 range 1 
  exit-address-family
 !
spanning-tree extend system-id
!
netconf-yang
!
restconf
!
!
redundancy
!
interface Loopback0
 ip address 33.33.33.33 255.255.255.255
!
interface Tunnel0
 bandwidth 10000
 ip flow monitor NTAMonitor input
 ip flow monitor NTAMonitor output
 ip address 10.10.3.1 255.255.255.252
 ip router isis aws
 load-interval 30
 mpls traffic-eng tunnels
 keepalive 2 3
 tunnel source GigabitEthernet1
 tunnel destination 54.70.66.102
 tunnel path-mtu-discovery
 isis metric 1
!
interface Tunnel1
 bandwidth 10000
 ip flow monitor NTAMonitor input
 ip flow monitor NTAMonitor output
 ip address 10.10.2.2 255.255.255.252
 ip router isis aws
 load-interval 30
 mpls traffic-eng tunnels
 keepalive 2 3
 tunnel source GigabitEthernet1
 tunnel destination 52.27.173.12
 tunnel path-mtu-discovery
 isis metric 1
!
interface VirtualPortGroup0
 vrf forwarding GS
 ip address 192.168.35.101 255.255.255.0
 ip nat inside
 no mop enabled
 no mop sysid
!
interface GigabitEthernet1
 ip flow monitor NTAMonitor input
 ip flow monitor NTAMonitor output
 ip address dhcp
 ip nat outside
 load-interval 30
 negotiation auto
 ipv6 address dhcp
 ipv6 enable
 no mop enabled
 no mop sysid
 service-policy input police
!
router isis aws
 net 49.0001.0000.0000.0033.00
 metric-style wide
 segment-routing mpls
 segment-routing prefix-sid-map advertise-local
 passive-interface Loopback0
 mpls traffic-eng router-id Loopback0
!
iox
ip forward-protocol nd
ip tcp window-size 8192
ip http server
ip http authentication local
ip http secure-server
ip nat inside source list GS_NAT_ACL interface GigabitEthernet1 vrf GS overload
ip route 0.0.0.0 0.0.0.0 GigabitEthernet1 172.2.1.1
ip route 172.0.1.0 255.255.255.240 11.11.11.11
ip route vrf GS 0.0.0.0 0.0.0.0 GigabitEthernet1 172.2.1.1 global
!
ip ssh rsa keypair-name ssh-key
ip ssh version 2
ip ssh pubkey-chain
ip scp server enable
!
ip access-list standard GS_NAT_ACL
 permit 192.168.35.0 0.0.0.255
ipv6 route ::/0 GigabitEthernet1 FE80::893:B3FF:FED5:7104      
!
snmp-server community public RO
snmp-server community private RW
!
control-plane
!
line con 0
 stopbits 1
line vty 0 4
 login local
 transport input ssh
!
app-hosting appid guestshell
 app-vnic gateway1 virtualportgroup 0 guest-interface 0
  guest-ipaddress 192.168.35.102 netmask 255.255.255.0
 app-default-gateway 192.168.35.101 guest-interface 0
 name-server0 8.8.8.8
end

R4

segment-routing mpls
 global-block 17000 18000
 !
 connected-prefix-sid-map
  address-family ipv4
   44.44.44.44/32 index 44 range 1 
  exit-address-family
 !
!
spanning-tree extend system-id
!
netconf-yang
!
restconf
!

!
redundancy
!
interface Loopback0
 ip address 44.44.44.44 255.255.255.255
!
interface Tunnel0
 bandwidth 10000
 ip flow monitor NTAMonitor input
 ip flow monitor NTAMonitor output
 ip address 10.10.4.1 255.255.255.252
 ip router isis aws
 load-interval 30
 mpls traffic-eng tunnels
 keepalive 2 3
 tunnel source GigabitEthernet1
 tunnel destination 35.167.193.103
 tunnel path-mtu-discovery
 isis metric 1
!
interface Tunnel1
 bandwidth 10000
 ip flow monitor NTAMonitor input
 ip flow monitor NTAMonitor output
 ip address 10.10.3.2 255.255.255.252
 ip router isis aws
 load-interval 30
 mpls traffic-eng tunnels
 keepalive 2 3
 tunnel source GigabitEthernet1
 tunnel destination 52.38.167.137
 tunnel path-mtu-discovery
 isis metric 1
!
interface VirtualPortGroup0
 vrf forwarding GS
 ip address 192.168.35.101 255.255.255.0
 ip nat inside
 no mop enabled
 no mop sysid
!
interface GigabitEthernet1
 ip flow monitor NTAMonitor input
 ip flow monitor NTAMonitor output
 ip address dhcp
 ip nat outside
 load-interval 30
 negotiation auto
 ipv6 address dhcp
 ipv6 enable
 no mop enabled
 no mop sysid
!
router isis aws
 net 49.0001.0000.0000.0044.00
 metric-style wide
 segment-routing mpls
 segment-routing prefix-sid-map advertise-local
 passive-interface Loopback0
 mpls traffic-eng router-id Loopback0
!
iox
ip forward-protocol nd
ip tcp window-size 8192
ip http server
ip http authentication local
ip http secure-server
ip nat inside source list GS_NAT_ACL interface GigabitEthernet1 vrf GS overload
ip route 0.0.0.0 0.0.0.0 GigabitEthernet1 172.3.1.1
ip route vrf GS 0.0.0.0 0.0.0.0 GigabitEthernet1 172.3.1.1 global
!
ip ssh rsa keypair-name ssh-key
ip ssh version 2
ip ssh pubkey-chain
ip scp server enable
!
ip access-list standard GS_NAT_ACL
 permit 192.168.35.0 0.0.0.255
ipv6 route ::/0 GigabitEthernet1 FE80::D:1CFF:FE1E:97C2
!       
snmp-server community private RW
snmp-server community public RO
!
control-plane
!
line con 0
 stopbits 1
line vty 0 4
 login local
 transport input ssh
!
app-hosting appid guestshell
 app-vnic gateway1 virtualportgroup 0 guest-interface 0
  guest-ipaddress 192.168.35.102 netmask 255.255.255.0
 app-default-gateway 192.168.35.101 guest-interface 0
 name-server0 8.8.8.8
end
0个回答
没有发现任何回复~