I have tested this configuration with a HP MSR 3020 Router with Comware version 5.2. In this setup, I have installed 2 probes both running Linux where one (10.10.10.251) is located locally next to the router and the other (10.0.0.200) located over a WAN connection.
On the MSR router, we configured an access lists (ACL) to match all traffic to/from the remote probe (10.0.0.200)
acl number 3001 name probe_traffic
rule 10 permit ip destination 10.0.0.200 0
rule 15 permit ip source 10.0.0.200 0
traffic classifier class_probe_traffic
if-match acl 3001
traffic behavior mark_dscp_af11
remark dscp af11
INTEGER<0-63> DSCP (DiffServ CodePoint) value
af11 AF11 DSCP (001010)
af12 AF12 DSCP (001100)
af13 AF13 DSCP (001110)
af21 AF21 DSCP (010010)
af22 AF22 DSCP (010100)
af23 AF23 DSCP (010110)
af31 AF31 DSCP (011010)
af32 AF32 DSCP (011100)
af33 AF33 DSCP (011110)
af41 AF41 DSCP (100010)
af42 AF42 DSCP (100100)
af43 AF43 DSCP (100110)
cs1 CS1 (IP Precedence 1) DSCP (001000)
cs2 CS2 (IP Precedence 2) DSCP (010000)
cs3 CS3 (IP Precedence 3) DSCP (011000)
cs4 CS4 (IP Precedence 4) DSCP (100000)
cs5 CS5 (IP Precedence 5) DSCP (101000)
cs6 CS6 (IP Precedence 6) DSCP (110000)
cs7 CS7 (IP Precedence 7) DSCP (111000)
default Default DSCP (000000)
ef EF DSCP (101110)
qos policy qos_test_remark
classifier class_probe_traffic behavior mark_dscp_af11
interface GigabitEthernet0/0
port link-mode route
description # WAN Uplink #
ip address 10.10.10.1 255.255.255.0
qos apply policy qos_test_remark inbound
qos apply policy qos_test_remark outbound
<HP-WAN-TEST-RTR-3020>
Interface: GigabitEthernet0/0
Direction: Inbound
Policy: qos_test_remark
Classifier: class_probe_traffic
Matched : 0(Packets) 0(Bytes)
5-minute statistics:
Forwarded: 0/0 (pps/bps)
Dropped : 0/0 (pps/bps)
Operator: OR
Rule(s) : If-match acl 3001
Behavior: mark_dscp_af11
Marking: 0(Packets)
Remark DSCP af11
Direction: Outbound
Policy: qos_test_remark
Classifier: class_probe_traffic
Matched : 0(Packets) 0(Bytes)
5-minute statistics:
Forwarded: 0/0 (pps/bps)
Dropped : 0/0 (pps/bps)
Operator: OR
Rule(s) : If-match acl 3001
Behavior: mark_dscp_af11
Marking: 0(Packets)
Remark DSCP af11
display qos policy interface g0/0
root@probe:/# ping -c 3 10.0.0.200
PING 10.0.0.200 (10.0.0.200) 56(84) bytes of data.
64 bytes from 10.0.0.200: icmp_req=1 ttl=60 time=21.6 ms
64 bytes from 10.0.0.200: icmp_req=2 ttl=60 time=80.9 ms
64 bytes from 10.0.0.200: icmp_req=3 ttl=60 time=70.5 ms
--- 10.0.0.200 ping statistics ---
3 packets transmitted, 3 received, 0% packet loss, time 2003ms
rtt min/avg/max/mdev = 21.620/57.686/80.932/25.857 ms
<HP-WAN-TEST-RTR-3020>display qos policy interface g0/0
Interface: GigabitEthernet0/0
Direction: Inbound
Policy: qos_test_remark
Classifier: class_probe_traffic
Matched : 3(Packets) 294(Bytes)
5-minute statistics:
Forwarded: 0/2 (pps/bps)
Dropped : 0/0 (pps/bps)
Operator: OR
Rule(s) : If-match acl 3001
Behavior: mark_dscp_af11
Marking: 3(Packets)
Remark DSCP af11
Direction: Outbound
Policy: qos_test_remark
Classifier: class_probe_traffic
Matched : 3(Packets) 294(Bytes)
5-minute statistics:
Forwarded: 0/5 (pps/bps)
Dropped : 0/0 (pps/bps)
Operator: OR
Rule(s) : If-match acl 3001
Behavior: mark_dscp_af11
Marking: 3(Packets)
Remark DSCP af11
From the remote probe, traffic is capture via tcpdump to check in detail the packets arriving at the remote probe.
root@probe200:/# tcpdump -n -vvv host 10.10.10.251
tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
11:50:16.058793 IP (tos 0x28, ttl 60, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
10.10.10.251 > 10.0.0.200: ICMP echo request, id 9789, seq 1, length 64
11:50:16.058822 IP (tos 0x28, ttl 64, id 29999, offset 0, flags [none], proto ICMP (1), length 84)
10.0.0.200 > 10.10.10.251: ICMP echo reply, id 9789, seq 1, length 64
11:50:17.059949 IP (tos 0x28, ttl 60, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
10.10.10.251 > 10.0.0.200: ICMP echo request, id 9789, seq 2, length 64
11:50:17.059972 IP (tos 0x28, ttl 64, id 32390, offset 0, flags [none], proto ICMP (1), length 84)
10.0.0.200 > 10.10.10.251: ICMP echo reply, id 9789, seq 2, length 64
11:50:18.061128 IP (tos 0x28, ttl 60, id 0, offset 0, flags [DF], proto ICMP (1), length 84)
10.10.10.251 > 10.0.0.200: ICMP echo request, id 9789, seq 3, length 64
11:50:18.061163 IP (tos 0x28, ttl 64, id 32510, offset 0, flags [none], proto ICMP (1), length 84)
10.0.0.200 > 10.10.10.251: ICMP echo reply, id 9789, seq 3, length 64
^C
6 packets captured
6 packets received by filter
0 packets dropped by kernel