Configuring UCL-based Traffic Policies

By configuring UCL-based traffic policies, you can distinguish between users of different priorities and implement QoS on the traffic of users. In this manner, the CIR and PIR are guaranteed for users.

Usage Scenario

UCL implements user-specific ACL control. During user authentication, to control traffic of some users, for example, to allow or restrict users' access to specific web pages, configure UCL-based traffic policies.

By configuring UCL-based traffic policies on the access device, you can distinguish between users of different priorities and implement QoS on traffic of the users, ensuring the Committed Information Rate (CIR) and Peak Information Rate (PIR) of users. Four types of UCL are defined based on the configuration methods: user-to-network, user-to-user, network-to-network, and network-to-user. If an ACL specifies the source user group (UG), the type of the UCL is user-to-network; if the destination UG is specified, the type of the UCL is network-to-user; if both the source UG and destination UG are specified, the type of the UCL is user-to-user; if neither the source UG or destination UG is specified, the type of the UCL is network-to-network.

UCL rules can be used for IPv4 and IPv6 traffic classification. For IPv6 traffic classification, UCL rules apply only to upstream traffic.

Prerequisites

Before configuring UCL-based traffic policies, complete the following tasks:

  • Configuring link layer protocol parameters (and IP addresses) for interfaces to ensure that the link layer protocol on the interfaces is Up

  • Configuring a routing protocol on the backbone network to realize the IP interworking

  • Configuring the access services to enable the users to access the Internet normally

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >