Print Download PDF Send Feedback

Previous

Next

QoS Deployment

In This Section:

Deploying QoS

Sample Bandwidth Allocations

Deploying QoS

This section covers topology restrictions.

QoS Topology Restrictions

QoS can manage up to the maximum number of interfaces supported by the Security Gateway, subject to these restrictions:

  1. All of the traffic on a managed line must go through the gateway.
  2. Each managed line must be connected (directly or indirectly via a router) to a separate physical interface on the QoS machine. Two managed lines cannot share a physical interface to the QoS gateway, and two network segments cannot connect to the same router.

For example, in the configuration depicted in the following diagram, the routers can pass traffic to each other through the hub without the QoS gateway being aware of the traffic.

Item

Description

1

Internal network

2

Security Gateway with QoS enabled

3

Hub

4

Routers

5

Internet

You cannot manage two networks connected to a single router since traffic may pass from one line to the other directly through the router, without the QoS gateway being aware of the traffic:

Item

Description

1

Internal network

2

Security Gateway with QoS enabled

3

Routers

4

Internet

In a correct configuration, the routers connect directly to the QoS gateway.

Sample Bandwidth Allocations

Frame Relay Network

Item

Description

1

Database server

2

Web server

3

Security Gateway with QoS enabled

4

Internet

5

Branch office

The previous diagram shows that the branch office communicates with the central site and the opposite. It only communicates directly with the Internet through the central site. The Web server makes important company documents available to the branch office, and the database server supports the company's mission-critical applications.

The problem is that most of the branch office traffic is internal and external Web traffic, and the mission-critical database traffic suffers as a result. The network administrator has considered upgrading the 56K lines, but is reluctant to do so, not only because of the cost but also because upgrading would probably not solve the problem. The upgraded lines would still be filled mostly with Web traffic.

The goals are as follows:

  1. Allocate the existing bandwidth so that access to the database server gets the largest share.
  2. Take into account that the branch offices are connected to the network by 56K lines.

These goals are accomplished with the following Rule Base:

Main Rules

Rule Name

Source

Destination

Service

Action

Office 1

Office 1

Any

Any

Weight 10

Limit 56KBps

 

Office n

Office n

Any

Any

Weight 10

Limit 56KBps

Default

Any

Any

Any

Weight 10

Each office has sub-rules, as follows:

Office Sub-Rules

Rule Name

Source

Destination

Service

Action

Start of Sub-Rule

Database Rule

Any

Database server

Database service

Weight 50

Web Rule

Any

Web Server

http

Weight 10

Branch Offices

Any

Any

Any

Weight 10

End of Sub Rule

The sub-rules give database traffic priority over Web traffic and other traffic.

Assumptions

The following assumptions are made in this example:

QoS Architecture

Basic Architecture

The architecture and flow control of QoS is similar to firewall.
QoS has three components:

The components can be installed on one machine or in a distributed configuration on a number of machines.

Bandwidth policy is configured using SmartConsole. On the Security Management Server, the policy is verified and installed on the QoS gateways. The QoS Security Gateway uses:

Logging information is created using the firewall kernel API.

The QoS Blade

The primary role of the QoS blade is to:

QoS has two components:

QoS Kernel Driver

The kernel driver is the heart of QoS operations. It is in the kernel driver that IP packets are examined, queued, scheduled and released, enabling QoS traffic control abilities.

QoS Daemon (fgd50)

The QoS daemon is a user mode process that:

QoS SmartConsole

You use the R80.30 SmartConsole and SmartDashboard to create "bandwidth rules" for the QoS policy. Use the Logs & Monitor features in SmartConsole to see information about the active QoS Security Gateways and their Policies.

QoS SmartDashboard

Use SmartConsole to create and change QoS Policies. Use SmartDashboard to work with rules, together with their related network objects and services.

The QoS Policy rules are shown the QoS Rule Base.

QoS Configuration

The Security Management Server and the QoS Security Gateway can be installed on the same machine or on two different machines. When they are installed on different machines, the configuration is known as distributed.

QoS_Configuration

Item

Description

1

Internal network (main office)

2

Security Gateway with QoS enabled

3

Security Management Server

4

SmartConsole

5

Internet

6

Security Gateway with QoS enabled (branch office)

7

Internal network (branch office)

The example shows a distributed configuration, in which one Security Management Server (consisting of a Security Management Server and a SmartConsole controls four QoS gateways. The four QoS gateways manage bandwidth allocation on three QoS enabled lines.

One Security Management Server can control and monitor multiple QoS gateways. The QoS Security Gateway operates independently of the Security Management Server. QoS gateways can operate on more Internet gateways and interdepartmental gateways.

Client-Server Interaction

SmartConsole and the Security Management Server can be installed on the same machine or on two different machines. When they are installed on two different machines, QoS implements the Client/Server model, in which a SmartConsole controls a Security Management Server.

Item

Description

1

Internal network (main office)

2

Security Management Server

3

SmartConsole

4

Security Gateway with QoS enabled

5

Internet

In the configuration depicted in the above figure, the functionality of the Security Management Server is divided between two workstations (Tower and Bridge). The Security Management Server with the database is on Tower. The SmartConsole is on Bridge.

The user, working on Bridge, maintains the QoS Policy and database, which reside on Tower. The QoS Security Gateway on London enforces the QoS Policy on the QoS enabled line.

The Security Management Server is started with the cpstart command, and must be running if you wish to use the SmartConsole on one of the client machines.

A SmartConsole can manage the Server only if both the administrator logged into SmartConsole and the computer on which the SmartConsole is running have been authorized to access the Security Management Server. Use cpconfig to:

Concurrent Sessions

More than one administrator can work with QoS Policies at the same time, each in a different session. A locking mechanism prevents administrators from working on the same object at one time. After you complete you work in a session, click Publish to make your changes available to other sessions and administrators.

Interaction with VPN

Interoperability

QoS and firewall share many core technology components. The same user-defined network objects can be used in both solutions. The integration of an organization's security and bandwidth management policies gives easy policy definition and system configuration. For efficient traffic inspection and enhanced performance, the blades share state table information. The QoS blade and firewall blade let users define bandwidth allocation rules for encrypted and NATed traffic.

Security Management Server

QoS uses the Security Management Server and shares the objects database (network objects, services and resources) with the firewall. Some objects have properties that are product specific. For example, the Firewall has encryption properties which are not related to QoS. A QoS network interface has speed properties that are not related to the firewall.