<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Voice through ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902892#M959828</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;Only three voice lines.&lt;/P&gt;&lt;P&gt;The CPU looks fine.&lt;/P&gt;&lt;P&gt;Policy - no clue - using DEFAULT.  I AM concerned about that 'cause I'm thinking inspection may 'need' to be off?  All else is plain vanilla... Ideas please &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; ??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 29 Nov 2007 01:02:05 GMT</pubDate>
    <dc:creator>netsec123</dc:creator>
    <dc:date>2007-11-29T01:02:05Z</dc:date>
    <item>
      <title>Voice through ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902890#M959826</link>
      <description>&lt;P&gt;This may be a general VOICE ISSUE with something I need to change with inspection, ... but, ...&lt;/P&gt;&lt;P&gt;Hi.  Currently, we have two ASA 5505s terminating a tunnel between NY and NM.  All is fine except for the fact when VOICE traffic traverses the link, the policy drops go WAY UP and response time goes to almost nothing!!  We have one Quintum Voice unit in NY, a Tenor DX 4048 and two in NM; a Tenor AXG 2400. SOMEBODY please HELP!!!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:36:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902890#M959826</guid>
      <dc:creator>netsec123</dc:creator>
      <dc:date>2019-03-11T11:36:20Z</dc:date>
    </item>
    <item>
      <title>Re: Voice through ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902891#M959827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My first thought is itty bitty firewall asked to be a big one, perhaps its not the right box for the job.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But yet cisco says it can.... so&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how much voice are you putting on the box? can it handle it? what does the cpu look like? what about your policy is it configured correctly? Can you share it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2007 20:53:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902891#M959827</guid>
      <dc:creator>whisperwind</dc:creator>
      <dc:date>2007-11-28T20:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: Voice through ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902892#M959828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;Only three voice lines.&lt;/P&gt;&lt;P&gt;The CPU looks fine.&lt;/P&gt;&lt;P&gt;Policy - no clue - using DEFAULT.  I AM concerned about that 'cause I'm thinking inspection may 'need' to be off?  All else is plain vanilla... Ideas please &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; ??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 01:02:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902892#M959828</guid>
      <dc:creator>netsec123</dc:creator>
      <dc:date>2007-11-29T01:02:05Z</dc:date>
    </item>
    <item>
      <title>Re: Voice through ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902893#M959829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tend to use one policy to match the voice traffic and apply this globally then use another policy to inspect all other required traffic types and apply this to the internal  interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not had any problems doing it that way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 12:04:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902893#M959829</guid>
      <dc:creator>andyjames</dc:creator>
      <dc:date>2007-11-29T12:04:57Z</dc:date>
    </item>
    <item>
      <title>Re: Voice through ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902894#M959830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi and thank you!!!&lt;/P&gt;&lt;P&gt;What I did was delete the global inspection policy.  Although setting up quite a few ASAa, NEVER have I ventured into the policy and inspection areas.  If I may, how did you do this and would you be able to give me a brief example as I would GREATLY appreciate it.&lt;/P&gt;&lt;P&gt;THANKS SO MUCH!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 12:31:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902894#M959830</guid>
      <dc:creator>netsec123</dc:creator>
      <dc:date>2007-11-29T12:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: Voice through ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902895#M959831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a good guide here - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/partner/docs/security/asa/asa72/configuration/guide/qos.html#wp1043440" target="_blank"&gt;http://www.cisco.com/en/US/partner/docs/security/asa/asa72/configuration/guide/qos.html#wp1043440&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how i do it - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map Voice1&lt;/P&gt;&lt;P&gt; match access-list Voice_Map&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map Voice&lt;/P&gt;&lt;P&gt; match dscp ef &lt;/P&gt;&lt;P&gt; match tunnel-group #Name of group#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map qos&lt;/P&gt;&lt;P&gt; class Voice&lt;/P&gt;&lt;P&gt;  priority&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;service-policy qos global&lt;/P&gt;&lt;P&gt;service-policy csc_out_policy interface Inside_VLAN_1000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is matching against dscp values, an access-list and a vpn tunnel group. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second service policy is for CSC modules but can be the default if needed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 13:17:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902895#M959831</guid>
      <dc:creator>andyjames</dc:creator>
      <dc:date>2007-11-29T13:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: Voice through ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902896#M959832</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you so much.  I will try this today and post within 24 hours!!  Thank you SO much!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Nov 2007 13:24:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902896#M959832</guid>
      <dc:creator>netsec123</dc:creator>
      <dc:date>2007-11-29T13:24:25Z</dc:date>
    </item>
    <item>
      <title>Re: Voice through ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902897#M959833</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am almost ready to cry here.  I am pasting the config without IPs ---- does this prioritize by voice correctly? &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;PLEASE HELP....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password &lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.252 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!             &lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd &lt;/P&gt;&lt;P&gt;boot system disk0:/asa802-k8.bin&lt;/P&gt;&lt;P&gt;boot system disk0:/asa722-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;access-list OUTBOUND extended permit udp any any eq domain &lt;/P&gt;&lt;P&gt;access-list OUTBOUND extended permit tcp any any eq https &lt;/P&gt;&lt;P&gt;access-list OUTBOUND extended permit tcp any any eq www &lt;/P&gt;&lt;P&gt;access-list OUTBOUND extended permit ip any 192.168.23.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip 192.168.1.0 255.255.255.0 192.168.23.0 255.255.255.0 log &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.23.0 255.255.255.0 log &lt;/P&gt;&lt;P&gt;access-list OUTBOUNG extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging monitor debugging&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-602.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group OUTBOUND in interface inside&lt;/P&gt;&lt;P&gt;access-group INBOUND in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 63.148.22.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication serial console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sysopt noproxyarp inside&lt;/P&gt;&lt;P&gt;sysopt noproxyarp outside&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set pfs &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer aaaa&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set phase1-mode aggressive &lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map Voice&lt;/P&gt;&lt;P&gt; match dscp ef &lt;/P&gt;&lt;P&gt; match tunnel-group aaaa&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map qos&lt;/P&gt;&lt;P&gt; class Voice  &lt;/P&gt;&lt;P&gt;  priority&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group aaaa type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group aaaa ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Nov 2007 16:52:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902897#M959833</guid>
      <dc:creator>netsec123</dc:creator>
      <dc:date>2007-11-30T16:52:09Z</dc:date>
    </item>
    <item>
      <title>Re: Voice through ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902898#M959834</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Viewing the config on a phone so I could be wrong but I can't see the policy applied anywhere. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you apply that as the global policy it should work. The only problem you may get is if the dscp field is stripped out when trunked to the ASA. If you are not using VLAN'S it shouldn't matter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Nov 2007 18:24:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902898#M959834</guid>
      <dc:creator>andyjames</dc:creator>
      <dc:date>2007-11-30T18:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: Voice through ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902899#M959835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried to apply it [I think] and it did not take ... I am probably doing it wrong.  Apply how - forgive the ignorance ...&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Nov 2007 19:19:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902899#M959835</guid>
      <dc:creator>netsec123</dc:creator>
      <dc:date>2007-11-30T19:19:31Z</dc:date>
    </item>
    <item>
      <title>Re: Voice through ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902900#M959836</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is the error I get...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# service-policy voice interface inside &lt;/P&gt;&lt;P&gt;ERROR: Class Voice has 'priority' set without 'priority-queue' in any interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Nov 2007 19:39:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902900#M959836</guid>
      <dc:creator>netsec123</dc:creator>
      <dc:date>2007-11-30T19:39:58Z</dc:date>
    </item>
    <item>
      <title>Re: Voice through ASA</title>
      <link>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902901#M959837</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK, forgot to apply the priority queue. If yo do priority-queue outside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then do service-policy qos global. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should apply the policy. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Dec 2007 10:16:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/voice-through-asa/m-p/902901#M959837</guid>
      <dc:creator>andyjames</dc:creator>
      <dc:date>2007-12-03T10:16:25Z</dc:date>
    </item>
  </channel>
</rss>

