12-01-2016 05:56 AM - edited 03-17-2019 08:50 AM
On the 3850 ....a trunked stack to a main core stack....what are the interface commands for trusting packet markings
The portchannel has two connections to the core.. read in the manual not to apply it to the portchannel interface itself yet it took the trust cos command on it but no policy map commands.
If I check the policy map on the GI interfaces themselves they seem to placing packets in the correct ques....is this config okay?
interface Port-channel1
switchport trunk allowed vlan 209,509
switchport mode trunk
trust cos
storm-control broadcast level 0.50
storm-control multicast level 0.50
storm-control action trap
interface GigabitEthernet1/0/48
switchport trunk allowed vlan 209,509
switchport mode trunk
trust cos
storm-control broadcast level 0.50
storm-control multicast level 0.50
storm-control action trap
channel-group 1 mode active
service-policy input AutoQos-4.0-CiscoPhone-Input-Policy
service-policy output AutoQos-4.0-Output-Policy
interface GigabitEthernet6/0/48
switchport trunk allowed vlan 209,509
switchport mode trunk
trust cos
storm-control broadcast level 0.50
storm-control multicast level 0.50
storm-control action trap
channel-group 1 mode active
service-policy input AutoQos-4.0-CiscoPhone-Input-Policy
service-policy output AutoQos-4.0-Output-Policy
Solved! Go to Solution.
12-01-2016 06:33 AM
Hi Yes your good , ios-xe trust packets by default too so once source is marking it right it will carry it so you don't need it on the port-channel itself and you have enabled the physical members so your good , I would remove the trust cos doubt you need it with the auto qos in place really
another check to show its working , ignore the 0 after it i was informed by TAC that's for future development
xxxxxxx#sh platform qos dscp-cos counters gigabitEthernet 1/0/4 | i DSCP48
Ingress DSCP48 0 0
Egress DSCP48 26628242 0
12-01-2016 06:33 AM
Hi Yes your good , ios-xe trust packets by default too so once source is marking it right it will carry it so you don't need it on the port-channel itself and you have enabled the physical members so your good , I would remove the trust cos doubt you need it with the auto qos in place really
another check to show its working , ignore the 0 after it i was informed by TAC that's for future development
xxxxxxx#sh platform qos dscp-cos counters gigabitEthernet 1/0/4 | i DSCP48
Ingress DSCP48 0 0
Egress DSCP48 26628242 0
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide