Home > Storage > PowerScale (Isilon) > Product Documentation > Networking > Dell PowerScale: Network Design Considerations > OneFS QoS classes
OneFS splits network traffic into classes with source ports and destination ports, associating a DSCP value with the class. The table below displays the default OneFS QoS classes. Administrators may customize the DSCP values, source ports, and destination ports per site requirements. By default, the destination ports are not defined.
Class | Traffic | Default DSCP Value | Source Ports | Destination Ports |
Transactional | File Access and Sharing Protocols: NFS, FTP, HTTPS data, HDFS, S3, RoCE Security and Authentication Protocols: Kerberos, LDAP, LSASS, DCE/RPC RPC and Inter-Process Communication Protocols: rpc.bind, mountd, statd, lockd, quotd, mgmntd Naming Services Protocols: NetBIOS, Microsoft-DS | 18 | 20, 21, 80, 88, 111, 135 137, 138, 139, 300, 302, 304, 305, 306, 389, 443, 445, 585, 636, 989, 990, 2049, 3268, 3269, 8020, 8082, 8440, 8441, 8443, 9020, 9021 | Not defined by default, but administrator may configure. |
Network Management | WebUI, SSH, SMTP, syslog, DNS, NTP, SNMP, Perf collector, CEE, alerts | 16 | 22, 25, 53, 123, 161, 162, 514, 6514, 6567, 8080, 9443, 12228 | Not defined by default, but administrator may configure. |
Bulk Data | SmartSync, SyncIQ, NDMP | 10 | 2097, 2098, 3148, 3149, 5667, 5668, 7722, 8470, 10000 | Not defined by default, but administrator may configure. |
Catch-All | All other traffic that does not match any of the above | 0 | all | Not defined by default, but administrator may configure. |
The OneFS firewall matches outgoing network traffic on the front-end ports to a QoS class. The traffic is matched using the source ports and/or destination ports from the top to the bottom in the table above. If no match is found, the Catch-All class is applied. QoS is only applicable on the front-end network ports and has no impact on the back-end networking. The firewall assigns the DSCP value based on the QoS class.
Note: To provide QoS, the OneFS firewall filters through outgoing packets and may have a performance impact. Although the impact should be minimal, you should test in a lab environment to confirm workloads are not impacted before configuring on a production cluster.