In a campus QoS implementation, boundaries are defined where the existing
QoS values attached to frames and to packets are to be accepted or altered.
These "trust boundaries" are established by configuring trust levels
on the ports of key peripheral network devices where QoS policies will be
enforced as traffic makes its way into the network. At these boundaries,
traffic will be allowed to retain its original QoS marking or have new marking
ascribed as a result of policies associated with its entry point into the
network.
Trust boundaries establish a border for traffic entering the campus network.
As traffic traverses the switches of the campus network, it is handled and is
prioritized according to the marks received or trusted when the traffic
originally entered the network at the trust boundary.
At the trust
boundary device, QoS values are trusted if they are considered to accurately
represented the type of traffic and precedence processing the traffic should
receive as it enters the campus network. If untrusted, the traffic will be
marked with a new QoS value appropriate for the policy in place at the point
where the traffic entered the campus network. Ideally, the trust boundary
exists at the first switch receiving traffic from a device or IP Phone. It is
also acceptable to establish the trust boundary as all the traffic from an
Access Switch enters a Distribution layer port.
 |
NOTE:
Best Practices suggest classifying and marking traffic as close to the
traffic source as possible.
|