<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: New Client, New Setup Help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3781201#M7738</link>
    <description>&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's my understanding as well, but I'm a little unclear about how to implement the high priority QoS mapping. Since the PBX is cloud based, there isn't any way to do end to end QoS for the voice traffic. I've been reading about auto QoS on the switches and the pollycom phones they use are supposed to be compatible with both CDP and LLDP so the phones should be able to be auto provisioned on the correct VLAN. If I understand it correctly, that will take care of QoS up to the switches, but how then is that policy applied at the ASA's interface which is where the bottleneck would be. I have been reading the documentation and have been unable to come to a conclusion on how best to implement that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, Ringcentral's documentation has nothing specifically about the ASA, but says that SIP ALG should be disabled. That would translate into turning off inspect SIP correct?&lt;/P&gt;</description>
    <pubDate>Wed, 16 Jan 2019 15:26:53 GMT</pubDate>
    <dc:creator>Chris Mickle</dc:creator>
    <dc:date>2019-01-16T15:26:53Z</dc:date>
    <item>
      <title>New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3781173#M7736</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a new client that has grown beyond what their current network can provide and wanted to run what I was thinking of implementing by everyone here for some feed back and questions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What they have now is about 20 users in two offices down the hall from each other and separate cable internet service using the ISP's cable modem as their router and an off the shelf unmanaged switch&amp;nbsp;in each office. They have ringcentral cloud hosted VoIP desk phones and soft clients. The computers are connected through the phones. They would like to have a guest wifi network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's what I'm thinking for your consideration...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First and foremost, connect the two separate offices via an ethernet drop and get rid of one of the cable internet connections. Second, install an ASA and two L2 or L3 switches (3750G maybe) one in each office to connect the endpoints. Third, install access points in each office and have an internal and guest wifi network on different VLANs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's all pretty straightforward as I have several clients with this exact configuration, but what I'm not sure about is dealing with the VoIP phones. They currently have no issues with the phones and I don't want to introduce any with my proposed solution. I'm not sure weather I should set up a voice VLAN and bother with QoS for this environment or not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any insight would be much appreciated.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:40:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3781173#M7736</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2020-02-21T16:40:08Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3781181#M7737</link>
      <description>&lt;P&gt;Hi there&lt;/P&gt;
&lt;P&gt;Voice traffic should always be placed in a separate VLAN for the very purpose of being able to apply a high priority QoS mapping to it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 15:06:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3781181#M7737</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-01-16T15:06:28Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3781201#M7738</link>
      <description>&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's my understanding as well, but I'm a little unclear about how to implement the high priority QoS mapping. Since the PBX is cloud based, there isn't any way to do end to end QoS for the voice traffic. I've been reading about auto QoS on the switches and the pollycom phones they use are supposed to be compatible with both CDP and LLDP so the phones should be able to be auto provisioned on the correct VLAN. If I understand it correctly, that will take care of QoS up to the switches, but how then is that policy applied at the ASA's interface which is where the bottleneck would be. I have been reading the documentation and have been unable to come to a conclusion on how best to implement that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, Ringcentral's documentation has nothing specifically about the ASA, but says that SIP ALG should be disabled. That would translate into turning off inspect SIP correct?&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 15:26:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3781201#M7738</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2019-01-16T15:26:53Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3781255#M7739</link>
      <description>&lt;P&gt;The default mappings should be fine and therefore all you need to do is trust the CoS markings which are coming from the phone. This will allow you to prioritse the traffic within your network, but you are correct, once it leaves the ASA it is at the mercy of your carrier network., any markings will be ignored.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding the the SIP ALG setting, yes, remove the &lt;STRONG&gt;inspect sip&lt;/STRONG&gt; command from the installed inspection policy on the ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 15:53:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3781255#M7739</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-01-16T15:53:25Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3781269#M7740</link>
      <description>&lt;P&gt;What you're telling me is helping to make sense of what I have been reading so thanks for that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Forgive my ignorance, but what are the "default mappings?"&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 16:04:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3781269#M7740</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2019-01-16T16:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3781464#M7741</link>
      <description>&lt;P&gt;The default CoS marking for VOIP is a value of 5. Depending on the platform being configured these frames will be placed in a dedicated ingress/ egress queue with a higher priority than all other (lower value traffic) traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could configure &lt;STRONG class="cCN_CmdName"&gt; auto qos voip cisco-phone&lt;/STRONG&gt; on the access ports connected to the phones, this would automatically populate the config with suitable values.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 20:17:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3781464#M7741</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-01-16T20:17:43Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3781470#M7743</link>
      <description>&lt;P&gt;Thanks again for the help. I actually have a phone coming tomorrow and have a similar setup here in my office. I will play with it and maybe post some configs or questions when I get it figured out.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jan 2019 20:30:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3781470#M7743</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2019-01-16T20:30:43Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3782841#M7746</link>
      <description>&lt;P&gt;I got the phone yesterday and set everything up according to my understanding and the help from this forum. Everything appears to work correctly. I was able to get the phone to auto provision on the correct voice vlan 40 and have tested some phone calls while at the same time trying to saturate my internet connection and the results were good. I noticed no call quality problems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm still not sure I have implemented QoS correctly. Is there any way for me to test it or see if the ASA prioritizing the voice traffic? I posted my ASA and switch configs below. I removed most of my NAT statements, ACLs and other things from the ASA config for security , but hopefully left enough for you to get the idea of what I'm doing. The switch added a whole bunch of lines to the config after enabling QoS which I left in. I have a /29 block and am NATing the voice vlan to the same public IP as "vlan10" which is my data network. My computer is on vlan 10 which is the native vlan and is physically connected through the phone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I disable inspect SIP on the ASA and disabled CDP on the switch in favor of LLDP. According to Polycom, the phone uses LLDP first and it appears to work. I'm letting the ASA do DHCP for the voice vlan but I read about other dhcp options that may need to be configured like option 160, but didn't do any of that. I got the impression that those options were to be used if CDP or LLDP were not available. Is that correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One more note... The phone and my computer are connected to G1/0/5 on the switch and the ASA is on G1/0/1. G1/0/23 is the trunk port for the wireless access point.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any comments or suggestions would be much appreciated. Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;FONT&gt;ASA Version 9.1(7)4&lt;BR /&gt;!&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq vlan10&lt;BR /&gt;xlate per-session deny udp any4 any6 eq vlan10&lt;BR /&gt;xlate per-session deny udp any6 any4 eq vlan10&lt;BR /&gt;xlate per-session deny udp any6 any6 eq vlan10&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 1.1.1.1 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.10&lt;BR /&gt;&amp;nbsp;vlan 10&lt;BR /&gt;&amp;nbsp;nameif vlan10&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.20&lt;BR /&gt;&amp;nbsp;vlan 20&lt;BR /&gt;&amp;nbsp;nameif vlan20&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.30&lt;BR /&gt;&amp;nbsp;vlan 30&lt;BR /&gt;&amp;nbsp;nameif vlan30&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.40&lt;BR /&gt;&amp;nbsp;vlan 40&lt;BR /&gt;&amp;nbsp;nameif voice&lt;BR /&gt;&amp;nbsp;security-level 40&lt;BR /&gt;&amp;nbsp;ip address 192.168.3.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;same-security-traffic permit intra-interface&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT&gt;object network voice_internet&lt;BR /&gt;&amp;nbsp;subnet 192.168.3.0 255.255.255.0&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT&gt;mtu voice 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT&gt;object network voice_internet&lt;BR /&gt;&amp;nbsp;nat (voice,outside) dynamic interface&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT&gt;route outside 0.0.0.0 0.0.0.0 1.1.1.6 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT&gt;dhcpd dns 8.8.8.8&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.3.10-192.168.3.100 voice&lt;BR /&gt;dhcpd enable voice&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; user-statistics accounting&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT&gt;_________________________________________________________________________________&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;FONT&gt;version 12.2&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname SW1&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT&gt;no aaa new-model&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT&gt;switch 1 provision ws-c3750g-24t&lt;BR /&gt;system mtu routing 1500&lt;BR /&gt;vtp mode transparent&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;mls qos map cos-dscp 0 8 16 24 32 46 48 56&lt;BR /&gt;mls qos srr-queue input bandwidth 90 10&lt;BR /&gt;mls qos srr-queue input threshold 1 8 16&lt;BR /&gt;mls qos srr-queue input threshold 2 34 66&lt;BR /&gt;mls qos srr-queue input buffers 67 33&lt;BR /&gt;mls qos srr-queue input cos-map queue 1 threshold 2 1&lt;BR /&gt;mls qos srr-queue input cos-map queue 1 threshold 3 0&lt;BR /&gt;mls qos srr-queue input cos-map queue 2 threshold 1 2&lt;BR /&gt;mls qos srr-queue input cos-map queue 2 threshold 2 4 6 7&lt;BR /&gt;mls qos srr-queue input cos-map queue 2 threshold 3 3 5&lt;BR /&gt;mls qos srr-queue input dscp-map queue 1 threshold 2 9 10 11 12 13 14 15&lt;BR /&gt;mls qos srr-queue input dscp-map queue 1 threshold 3 0 1 2 3 4 5 6 7&lt;BR /&gt;mls qos srr-queue input dscp-map queue 1 threshold 3 32&lt;BR /&gt;mls qos srr-queue input dscp-map queue 2 threshold 1 16 17 18 19 20 21 22 23&lt;BR /&gt;mls qos srr-queue input dscp-map queue 2 threshold 2 33 34 35 36 37 38 39 48&lt;BR /&gt;mls qos srr-queue input dscp-map queue 2 threshold 2 49 50 51 52 53 54 55 56&lt;BR /&gt;mls qos srr-queue input dscp-map queue 2 threshold 2 57 58 59 60 61 62 63&lt;BR /&gt;mls qos srr-queue input dscp-map queue 2 threshold 3 24 25 26 27 28 29 30 31&lt;BR /&gt;mls qos srr-queue input dscp-map queue 2 threshold 3 40 41 42 43 44 45 46 47&lt;BR /&gt;mls qos srr-queue output cos-map queue 1 threshold 3 5&lt;BR /&gt;mls qos srr-queue output cos-map queue 2 threshold 3 3 6 7&lt;BR /&gt;mls qos srr-queue output cos-map queue 3 threshold 3 2 4&lt;BR /&gt;mls qos srr-queue output cos-map queue 4 threshold 2 1&lt;BR /&gt;mls qos srr-queue output cos-map queue 4 threshold 3 0&lt;BR /&gt;mls qos srr-queue output dscp-map queue 1 threshold 3 40 41 42 43 44 45 46 47&lt;BR /&gt;mls qos srr-queue output dscp-map queue 2 threshold 3 24 25 26 27 28 29 30 31&lt;BR /&gt;mls qos srr-queue output dscp-map queue 2 threshold 3 48 49 50 51 52 53 54 55&lt;BR /&gt;mls qos srr-queue output dscp-map queue 2 threshold 3 56 57 58 59 60 61 62 63&lt;BR /&gt;mls qos srr-queue output dscp-map queue 3 threshold 3 16 17 18 19 20 21 22 23&lt;BR /&gt;mls qos srr-queue output dscp-map queue 3 threshold 3 32 33 34 35 36 37 38 39&lt;BR /&gt;mls qos srr-queue output dscp-map queue 4 threshold 1 8&lt;BR /&gt;mls qos srr-queue output dscp-map queue 4 threshold 2 9 10 11 12 13 14 15&lt;BR /&gt;mls qos srr-queue output dscp-map queue 4 threshold 3 0 1 2 3 4 5 6 7&lt;BR /&gt;mls qos queue-set output 1 threshold 1 138 138 92 138&lt;BR /&gt;mls qos queue-set output 1 threshold 2 138 138 92 400&lt;BR /&gt;mls qos queue-set output 1 threshold 3 36 77 100 318&lt;BR /&gt;mls qos queue-set output 1 threshold 4 20 50 67 400&lt;BR /&gt;mls qos queue-set output 2 threshold 1 149 149 100 149&lt;BR /&gt;mls qos queue-set output 2 threshold 2 118 118 100 235&lt;BR /&gt;mls qos queue-set output 2 threshold 3 41 68 100 272&lt;BR /&gt;mls qos queue-set output 2 threshold 4 42 72 100 242&lt;BR /&gt;mls qos queue-set output 1 buffers 10 10 26 54&lt;BR /&gt;mls qos queue-set output 2 buffers 16 6 17 61&lt;BR /&gt;mls qos&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode pvst&lt;BR /&gt;spanning-tree portfast default&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;vlan 10&lt;BR /&gt;&amp;nbsp;name vlan10&lt;BR /&gt;!&lt;BR /&gt;vlan 20&lt;BR /&gt;&amp;nbsp;name vlan20&lt;BR /&gt;!&lt;BR /&gt;vlan 30&lt;BR /&gt;&amp;nbsp;name vlan30&lt;BR /&gt;!&lt;BR /&gt;vlan 40&lt;BR /&gt;&amp;nbsp;name voice&lt;BR /&gt;!&lt;BR /&gt;lldp run&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/1&lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 10,20,30,40&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/2&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/3&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/4&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/5&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;switchport voice vlan 40&lt;BR /&gt;&amp;nbsp;srr-queue bandwidth share 10 10 60 20&lt;BR /&gt;&amp;nbsp;queue-set 2&lt;BR /&gt;&amp;nbsp;priority-queue out&lt;BR /&gt;&amp;nbsp;mls qos trust cos&lt;BR /&gt;&amp;nbsp;auto qos voip trust&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/22&lt;BR /&gt;&amp;nbsp;switchport access vlan 30&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/23&lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&lt;BR /&gt;&amp;nbsp;switchport trunk native vlan 10&lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 10,20&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.8 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 192.168.0.1&lt;BR /&gt;ip classless&lt;BR /&gt;ip http server&lt;BR /&gt;ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no cdp run&lt;BR /&gt;no cdp tlv location&lt;BR /&gt;no cdp tlv app&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;login local&lt;BR /&gt;&amp;nbsp;length 0&lt;BR /&gt;&amp;nbsp;transport input telnet ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt;&amp;nbsp;login&lt;BR /&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 18 Jan 2019 10:27:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3782841#M7746</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2019-01-18T10:27:39Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3785964#M7748</link>
      <description>&lt;P&gt;The areas where you will see most benefit from QoS will be on your trunk links. Currently you will be marking traffic on ingress to your network, but you need to ensure it is controlled correctly as it moves to its destination. In the case of the VOIP traffic you want to ensure that it flows to the internet with high priority.&lt;/P&gt;
&lt;P&gt;We will use the sae queue settings that are set on the access ports, so on every trunk link between switches configure:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;!
int gi1/0/x
  srr-queue bandwidth share 10 10 60 20
  mls qos trust dscp
!&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You will also need the ASA to correctly priorities VOIP traffic a treat is accordingly, take a look here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/82310-qos-voip-vpn.html#anc18" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/82310-qos-voip-vpn.html#anc18&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unfortunately the ASA cannot mark traffic, so the inbound VOIP packets cannot have their DSCP values changed. If you have a switch or a router between your ASA and ISP, then you could mark the incoming VOIP traffic accordingly based on an ACL (ie source IP matches your VOIP provider) and these tags will then persist and be treated correctly has they flow towards your handsets.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jan 2019 10:49:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3785964#M7748</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-01-23T10:49:21Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3785972#M7750</link>
      <description>&lt;P&gt;Thanks for having a look at that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All that info you gave me makes me think that I need a router between the ASA and the internet, hence it may be better to bypass the ASA for voice traffic all together...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What if the voice VLAN on the switch was configured the same way it was now, but instead of trunking it to the ASA, it was connected to an access port on a second inside interface on the router. If that were possible, then could the router prioritize the interface with the VOIP traffic over the interface with the data traffic?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jan 2019 11:25:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3785972#M7750</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2019-01-23T11:25:35Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3785982#M7752</link>
      <description>&lt;P&gt;I wouldn't start entertaining the idea of creating network paths around your firewall!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you share a network topology diagram of what you have including hardware platform details?&lt;/P&gt;
&lt;P&gt;You could configure the ASA so that it is on-a-stick, ie, it's inside and outside interfaces are connected to the same switch. If that switch is multilayer, you could configure the required inbound VOIP QoS ACL mentioned above before passing it onto the ASA. This way you don't need to worry about finding the money for another piece of kit which would have a very limited function!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jan 2019 11:45:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3785982#M7752</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-01-23T11:45:31Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3786049#M7755</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/324976"&gt;@Seb Rupik&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;I wouldn't start entertaining the idea of creating network paths around your firewall!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN&gt;Thanks for pointing that out. I guess I didn't really think about it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As for hardware details, the configs above were copied from my production environment which consists of an ASA 5520; VID V06 running IOS 9.1(7) and a Catalyst C3750G-24T-S; VID V08 running IOS 12.2(55). The IP phone is a Polycom VVX-311.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm thinking about similar hardware for the client on the used/refurb market to save some money over new hardware, but new hardware is defiantly&amp;nbsp;something to consider if it would be better.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I've attached a network diagram of the current setup. The clients setup would be similar except there would be a second switch and wireless AP for their second office connected via ethernet.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EDIT: It says I'm not authorized to make the request when I try to insert the diagram photo.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jan 2019 13:15:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3786049#M7755</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2019-01-23T13:15:06Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3786067#M7760</link>
      <description>&lt;P&gt;The 3750G would be sufficient for the ASA on a stick.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Create an 'outside' VLAN on the 3750G which is used to transport traffic from the ISP to the ASA outside interface. On the 3750 interface connected to the ISP router configure&amp;nbsp;&lt;STRONG&gt;service-policy input &lt;/STRONG&gt;with a corresponding &lt;STRONG&gt;policy-map&lt;/STRONG&gt; and &lt;STRONG&gt;class-map&lt;/STRONG&gt; referencing an ACL matching traffic to and from your VOIP server and setting the DSCP value to 46.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ASA inside interface will also be connected back to the 3750. IF you do any routing on the 3750 it may be prudent to configure VRF-lite and place 'inside' SVIs into a new VRF.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jan 2019 13:42:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3786067#M7760</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-01-23T13:42:14Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3787035#M7765</link>
      <description>&lt;P&gt;Ok. I created a new outside vlan 5 on the 3750 and connected the ASA and ISP router to it per your advice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Int g1/0/1 was already connected to the inside interface on the ASA so I added vlan 5 to the allowed VLAN command and set the native vlan to 5.&lt;/P&gt;&lt;P&gt;I set int g1/0/24 and g1/0/21 to access ports on vlan 5 and connected the ASA's outside interface and the ISP router to them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All that is pretty straight forward, but after that I'm not sure what service-policy input with a corresponding policy-map and class-map referencing an ACL means or how to configure it. I'm still learning cisco and advanced networking. I use and have clients that use cisco hardware and am able to get things configured the way I need them, but this is something new.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't do any inter-vlan routing on the switch, but the ASA does allow higher security level interfaces to access the lower ones. Does that count as inter-vlan routing for this purpose?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 09:42:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3787035#M7765</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2019-01-24T09:42:25Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3787074#M7769</link>
      <description>&lt;P&gt;That 3750 config doesn't sound right. Can you share the complete running config?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 09:44:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3787074#M7769</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-01-24T09:44:55Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3787087#M7771</link>
      <description>&lt;P&gt;It probably doesn't sound right because I stupidly thought that I needed to configure the switch port connected to the ASA's inside interface with the outside vlan at first. I realized the mistake after the fact and now have just g1/0/23 and 1/0/24 as access ports on the outside vlan 5.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the running config though...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;version 12.2&lt;BR /&gt;no service pad&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;no service password-encryption&lt;BR /&gt;hostname SW1&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;no aaa new-model&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;switch 1 provision ws-c3750g-24t&lt;BR /&gt;system mtu routing 1500&lt;BR /&gt;vtp mode transparent&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;mls qos map cos-dscp 0 8 16 24 32 46 48 56&lt;BR /&gt;mls qos srr-queue input bandwidth 90 10&lt;BR /&gt;mls qos srr-queue input threshold 1 8 16&lt;BR /&gt;mls qos srr-queue input threshold 2 34 66&lt;BR /&gt;mls qos srr-queue input buffers 67 33&lt;BR /&gt;mls qos srr-queue input cos-map queue 1 threshold 2 1&lt;BR /&gt;mls qos srr-queue input cos-map queue 1 threshold 3 0&lt;BR /&gt;mls qos srr-queue input cos-map queue 2 threshold 1 2&lt;BR /&gt;mls qos srr-queue input cos-map queue 2 threshold 2 4 6 7&lt;BR /&gt;mls qos srr-queue input cos-map queue 2 threshold 3 3 5&lt;BR /&gt;mls qos srr-queue input dscp-map queue 1 threshold 2 9 10 11 12 13 14 15&lt;BR /&gt;mls qos srr-queue input dscp-map queue 1 threshold 3 0 1 2 3 4 5 6 7&lt;BR /&gt;mls qos srr-queue input dscp-map queue 1 threshold 3 32&lt;BR /&gt;mls qos srr-queue input dscp-map queue 2 threshold 1 16 17 18 19 20 21 22 23&lt;BR /&gt;mls qos srr-queue input dscp-map queue 2 threshold 2 33 34 35 36 37 38 39 48&lt;BR /&gt;mls qos srr-queue input dscp-map queue 2 threshold 2 49 50 51 52 53 54 55 56&lt;BR /&gt;mls qos srr-queue input dscp-map queue 2 threshold 2 57 58 59 60 61 62 63&lt;BR /&gt;mls qos srr-queue input dscp-map queue 2 threshold 3 24 25 26 27 28 29 30 31&lt;BR /&gt;mls qos srr-queue input dscp-map queue 2 threshold 3 40 41 42 43 44 45 46 47&lt;BR /&gt;mls qos srr-queue output cos-map queue 1 threshold 3 5&lt;BR /&gt;mls qos srr-queue output cos-map queue 2 threshold 3 3 6 7&lt;BR /&gt;mls qos srr-queue output cos-map queue 3 threshold 3 2 4&lt;BR /&gt;mls qos srr-queue output cos-map queue 4 threshold 2 1&lt;BR /&gt;mls qos srr-queue output cos-map queue 4 threshold 3 0&lt;BR /&gt;mls qos srr-queue output dscp-map queue 1 threshold 3 40 41 42 43 44 45 46 47&lt;BR /&gt;mls qos srr-queue output dscp-map queue 2 threshold 3 24 25 26 27 28 29 30 31&lt;BR /&gt;mls qos srr-queue output dscp-map queue 2 threshold 3 48 49 50 51 52 53 54 55&lt;BR /&gt;mls qos srr-queue output dscp-map queue 2 threshold 3 56 57 58 59 60 61 62 63&lt;BR /&gt;mls qos srr-queue output dscp-map queue 3 threshold 3 16 17 18 19 20 21 22 23&lt;BR /&gt;mls qos srr-queue output dscp-map queue 3 threshold 3 32 33 34 35 36 37 38 39&lt;BR /&gt;mls qos srr-queue output dscp-map queue 4 threshold 1 8&lt;BR /&gt;mls qos srr-queue output dscp-map queue 4 threshold 2 9 10 11 12 13 14 15&lt;BR /&gt;mls qos srr-queue output dscp-map queue 4 threshold 3 0 1 2 3 4 5 6 7&lt;BR /&gt;mls qos queue-set output 1 threshold 1 138 138 92 138&lt;BR /&gt;mls qos queue-set output 1 threshold 2 138 138 92 400&lt;BR /&gt;mls qos queue-set output 1 threshold 3 36 77 100 318&lt;BR /&gt;mls qos queue-set output 1 threshold 4 20 50 67 400&lt;BR /&gt;mls qos queue-set output 2 threshold 1 149 149 100 149&lt;BR /&gt;mls qos queue-set output 2 threshold 2 118 118 100 235&lt;BR /&gt;mls qos queue-set output 2 threshold 3 41 68 100 272&lt;BR /&gt;mls qos queue-set output 2 threshold 4 42 72 100 242&lt;BR /&gt;mls qos queue-set output 1 buffers 10 10 26 54&lt;BR /&gt;mls qos queue-set output 2 buffers 16 6 17 61&lt;BR /&gt;mls qos&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mode pvst&lt;BR /&gt;spanning-tree portfast default&lt;BR /&gt;spanning-tree extend system-id&lt;BR /&gt;!&lt;BR /&gt;vlan internal allocation policy ascending&lt;BR /&gt;!&lt;BR /&gt;vlan 5&lt;BR /&gt;&amp;nbsp;name outside&lt;BR /&gt;!&lt;BR /&gt;vlan 10&lt;BR /&gt;&amp;nbsp;name domain&lt;BR /&gt;!&lt;BR /&gt;vlan 20&lt;BR /&gt;&amp;nbsp;name guest&lt;BR /&gt;!&lt;BR /&gt;vlan 30&lt;BR /&gt;&amp;nbsp;name ftp&lt;BR /&gt;!&lt;BR /&gt;vlan 40&lt;BR /&gt;&amp;nbsp;name voice&lt;BR /&gt;!&lt;BR /&gt;vlan 99&lt;BR /&gt;&amp;nbsp;name blackhole&lt;BR /&gt;lldp run&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/1&lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 10,20,30,40&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/2&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/3&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/4&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/5&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;switchport voice vlan 40&lt;BR /&gt;&amp;nbsp;srr-queue bandwidth share 10 10 60 20&lt;BR /&gt;&amp;nbsp;queue-set 2&lt;BR /&gt;&amp;nbsp;priority-queue out&lt;BR /&gt;&amp;nbsp;mls qos trust cos&lt;BR /&gt;&amp;nbsp;auto qos voip trust&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/6&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/7&lt;BR /&gt;&amp;nbsp;switchport access vlan 99&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/8&lt;BR /&gt;&amp;nbsp;switchport access vlan 99&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/9&lt;BR /&gt;&amp;nbsp;switchport access vlan 99&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/10&lt;BR /&gt;&amp;nbsp;switchport access vlan 10&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/11&lt;BR /&gt;&amp;nbsp;switchport access vlan 99&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/12&lt;BR /&gt;&amp;nbsp;switchport access vlan 99&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/13&lt;BR /&gt;&amp;nbsp;switchport access vlan 99&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/14&lt;BR /&gt;&amp;nbsp;switchport access vlan 99&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/15&lt;BR /&gt;&amp;nbsp;switchport access vlan 99&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/16&lt;BR /&gt;&amp;nbsp;switchport access vlan 99&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/17&lt;BR /&gt;&amp;nbsp;switchport access vlan 99&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/18&lt;BR /&gt;&amp;nbsp;switchport access vlan 99&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/19&lt;BR /&gt;&amp;nbsp;switchport access vlan 99&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/20&lt;BR /&gt;&amp;nbsp;switchport access vlan 99&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/21&lt;BR /&gt;&amp;nbsp;switchport trunk encapsulation dot1q&lt;BR /&gt;&amp;nbsp;switchport trunk native vlan 10&lt;BR /&gt;&amp;nbsp;switchport trunk allowed vlan 10,20&lt;BR /&gt;&amp;nbsp;switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/22&lt;BR /&gt;&amp;nbsp;switchport access vlan 30&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/23&lt;BR /&gt;&amp;nbsp;switchport access vlan 5&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0/24&lt;BR /&gt;&amp;nbsp;switchport access vlan 5&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan10&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.8 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ip default-gateway 192.168.0.1&lt;BR /&gt;ip classless&lt;BR /&gt;ip http server&lt;BR /&gt;ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;no cdp run&lt;BR /&gt;no cdp tlv location&lt;BR /&gt;no cdp tlv app&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;line vty 0 4&lt;BR /&gt;&amp;nbsp;login local&lt;BR /&gt;&amp;nbsp;length 0&lt;BR /&gt;&amp;nbsp;transport input telnet ssh&lt;BR /&gt;line vty 5 15&lt;BR /&gt;&amp;nbsp;login&lt;BR /&gt;!&lt;BR /&gt;ntp clock-period 36028833&lt;BR /&gt;ntp server 97.107.129.217&lt;BR /&gt;end&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 10:01:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3787087#M7771</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2019-01-24T10:01:49Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3787558#M7775</link>
      <description>&lt;P&gt;Evening Chris,&lt;BR /&gt;See below for the QoS config on the switch connected to the ISP router (check I've got the right ISP switchport).&lt;BR /&gt;You will also need to determine the public IP of your VOIP provider and update the VOICE_TRAFFIC ACL as required.&lt;BR /&gt;We are only interested in picking up the incoming VOIP traffic, everything else will be caught in the 'class-default' class map.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;!
int gi1/0/23
desc ISP_LINK
service-policy input VOIP_MARK
!
ip access-list extended VOICE_TRAFFIC
permit ip host &amp;lt;your_VOIP_provider_public_ip&amp;gt; any
!
class-map CM_VOIP
match access-group name VOICE_TRAFFIC
exit
!
policy-map VOIP_MARK
class CM_VOIP
set dscp ef
exit
!&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;Also make sure you have the following configured on every trunk port (at both ends of the link) between your switches:&lt;/P&gt;
&lt;PRE&gt;!
int gi1/0/x
  srr-queue bandwidth share 10 10 60 20
  mls qos trust dscp
!&lt;/PRE&gt;
&lt;P&gt;...and lastly, please mark helpful posts &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;BR /&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 20:40:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3787558#M7775</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-01-24T20:40:22Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3787586#M7779</link>
      <description>&lt;P&gt;Thanks for all&amp;nbsp;your help on this so far.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So it seems that were using the L3 switch as a router to handle QoS and leaving the ASA blissfully ignorant of the whole thing. Is that about the size of it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do have one follow-up question on the access list. I'm not sure of VoIP provider's IP address that I need to include in the ACL. The closest thing I can find on that is a networking document they put together, but&amp;nbsp; it doesn't have any specifi IPs. Under section 7 ringcentral supernets, it lists the supernets they use for communications, but that's it. Do I need to add them all to the ACL and if so, what is the syntax to add an entire subnet?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;&lt;A href="https://success.ringcentral.com/articles/en_US/RC_Knowledge_Article/9233#4.6" target="_blank"&gt;https://success.ringcentral.com/articles/en_US/RC_Knowledge_Article/9233#4.6&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 21:31:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3787586#M7779</guid>
      <dc:creator>Chris Mickle</dc:creator>
      <dc:date>2019-01-24T21:31:22Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3787614#M7782</link>
      <description>&lt;P&gt;The ASA is aware of the markings and can prioritise the traffic as you desire (check the link in a previous post), it just can't adjust the markings.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just keep in mind that unless you are experiencing congestion on your links the QoS controls have no effect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;OK we have two options either mark all traffic from your providers public subnet as EF :&lt;/P&gt;
&lt;PRE&gt;!
ip access-list extended VOICE_TRAFFIC
  permit ip &amp;lt;public_VOIP_subnet_id&amp;gt; &amp;lt;netmask&amp;gt; any
!&lt;/PRE&gt;
&lt;P&gt;...or we specifically mark traffic on known VOIP ports specified as used by the deskphone in your link:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;!
ip access-list extended VOICE_TRAFFIC
  permit udp any any range 20000 39999
  permit udp any any range 40000 49999
  permit udp any any eq 5090
  permit tcp any any eq 5090
  permit tcp any any eq 5096
!&lt;/PRE&gt;
&lt;P&gt;...but depending on the features you are using, the tables in the linked webpage go on and on!&lt;/P&gt;
&lt;P&gt;I would suggest you monitor the connection table (&lt;STRONG&gt;sh conn&lt;/STRONG&gt;) on the ASA and determine what IPs and ports the phones are using, and tweak the VOICE_TRAFFIC ACL to suit.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;BR /&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 22:09:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3787614#M7782</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-01-24T22:09:25Z</dc:date>
    </item>
    <item>
      <title>Re: New Client, New Setup Help</title>
      <link>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3787616#M7784</link>
      <description>&lt;P&gt;Sorry, missed the supernet bit. Here's the ACL:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;!
ip access-list extended VOICE_TRAFFIC
  permit ip 80.81.128.0 255.255.240.0 any
  permit ip 103.44.68.0 255.255.252.0 any
  permit ip 104.245.56.0 255.255.248.0 any
  permit ip 185.23.248.0 255.255.252.0 any
  permit ip 192.209.24.0 255.255.248.0 any
  permit ip 199.68.212.0 255.255.252.0 any
  permit ip 199.255.120.0 255.255.252.0 any
 permit ip 208.87.40.0 255.255.252.0 any
!&lt;/PRE&gt;
&lt;P&gt;...I'd use that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jan 2019 22:14:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/new-client-new-setup-help/m-p/3787616#M7784</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-01-24T22:14:38Z</dc:date>
    </item>
  </channel>
</rss>

