Arcadian Networks Inc. V390I Benutzerhandbuch
Chapter 4 Configuring the V390i
V290iA User Guide
45
Classification
The Cisco 3200 router classifies the packets transmitted to the V384+A UHF modem
board via the Fast Ethernet0/0 port. SCADA packets are identified by their destination
IP address and their destination TCP port and are marked with the value EF on the
DSCP bits. DSCP of other traffic is marked with a zero value.
board via the Fast Ethernet0/0 port. SCADA packets are identified by their destination
IP address and their destination TCP port and are marked with the value EF on the
DSCP bits. DSCP of other traffic is marked with a zero value.
Traffic Shaping
Traffic going from the Cisco 3200 toward the V384+A modem is shaped to match the
rate of the wireless UHF upstream channel.
rate of the wireless UHF upstream channel.
Traffic Priority
The SCADA traffic is prioritized over any other traffic when it is transmitted over the
FastEthernet0/0 port.
FastEthernet0/0 port.
The following set of commands provides the prioritization:
!
class-map match-any All_IP_Traffic
match access-group 101
class-map match-any SCADA_Traffic
match access-group 102
!
!
policy-map SCADA_Policy
class SCADA_Traffic
priority 128
set dscp ef
policy-map SCADA_Priority
class All_IP_Traffic
shape average 1000000
service-policy SCADA_Policy
!
!
interface FastEthernet0/0
ip address 10.1.1.2 255.255.255.0
no shutdown
duplex auto
speed auto
service-policy output SCADA_Priority
!
!
access-list 101 permit ip any any
access-list 102 permit tcp host 10.1.1.2 range 4001 4004 host 10.1.1.1
access-list 102 deny ip any any
no cdp run
!
class-map match-any All_IP_Traffic
match access-group 101
class-map match-any SCADA_Traffic
match access-group 102
!
!
policy-map SCADA_Policy
class SCADA_Traffic
priority 128
set dscp ef
policy-map SCADA_Priority
class All_IP_Traffic
shape average 1000000
service-policy SCADA_Policy
!
!
interface FastEthernet0/0
ip address 10.1.1.2 255.255.255.0
no shutdown
duplex auto
speed auto
service-policy output SCADA_Priority
!
!
access-list 101 permit ip any any
access-list 102 permit tcp host 10.1.1.2 range 4001 4004 host 10.1.1.1
access-list 102 deny ip any any
no cdp run
!