cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
194
Views
0
Helpful
1
Replies

S2S phones keeps getting disconnected.

chamille38
Level 1
Level 1

Hi Guys,

We have several S2S sites but we have one particular site where the phone (Cisco 7942) keep getting disconnected. I tried several qos/cos but still getting the same result. I'm new to Cisco voice maybe someone can point me to the right direction. Our monitoring software detects the site is up but phone will disconnect and re-register 

Cisco 7942 > 3550 > 2811 > S2S > ASA5510

2811 config:

!
no aaa new-model
!
!
dot11 syslog
ip source-route
!
!
ip cef
!
ip dhcp excluded-address 10.0.112.1 10.0.112.99
ip dhcp excluded-address 10.0.114.1 10.0.114.99
ip dhcp excluded-address 10.0.114.151 10.0.114.254
ip dhcp excluded-address 10.0.112.151 10.0.112.254
!
ip dhcp pool ***LAN***
network 10.0.112.0 255.255.255.0
default-router 10.0.112.1
domain-name domain.com
netbios-name-server 172.18.80.2
dns-server 172.18.80.2 4.2.2.2 75.75.75.75
lease 7
!
ip dhcp pool ***VOICE***
network 10.0.114.0 255.255.255.0
default-router 10.0.114.1
domain-name domain.com
option 150 ip 172.18.82.10
netbios-name-server 172.18.80.2
!
!
ip domain name domain.com
ip name-server 172.18.80.2
ip name-server 4.2.2.2
ip multicast-routing
no ipv6 cef
!
multilink bundle-name authenticated
!
!
!
!
!
!
!
!
!
!
!
voice-card 0
!
crypto pki token default removal timeout 0
!
crypto pki trustpoint TP-self-signed-2618142280
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2618142280
revocation-check none
rsakeypair TP-self-signed-2618142280
!
!
crypto pki certificate chain TP-self-signed-2618142280
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32363138 31343232 3830301E 170D3135 31313036 31393434
32355A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 36313831
34323238 3030819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100E044 35584301 2826C372 7CAD01D5 76D14CA1 3A13AFB5 3B4CF350 BD321021
4E8F1FD3 1DF55BC6 78719765 41D493C0 B7841442 D4CF8C67 B79BAD54 4D1A27EA
8D129AD1 B3FF3102 4BA8AF1F 35A7EDBD 9ABF133B DDFBDFA7 FEE2AAB5 3AB9172E
3776F8F4 C6482147 B978975E 33A17F1A 0779EC9D EE265D4C F8F2575D F94F60A8
736F0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 141F201E 41C78970 7E40D7FA E0FA2811 2355B3B4 E2301D06
03551D0E 04160414 1F201E41 C789707E 40D7FAE0 FA281123 55B3B4E2 300D0609
2A864886 F70D0101 05050003 8181001F 960B980C 92BD5FC4 9D16326A 574FB056
DB8866FE 98EB4153 9CCC21B2 8F4C858A 23235C68 D0ACB75A 18DE407D 34171FD1
79193AF0 D5BBA294 DA6D4DA7 A032016A B9F632DE 3334111C 392AEA65 C6EBBFD4
803AFD0F 1D428AEE 05C224F2 E80BB3B4 6B1B83BE 9101EE3B 356079A8 BE6060B9
67F779B4 01DD011F 1F2FBE77 E820B0
quit
!
!
license udi pid CISCO2811 sn FTX1124A5G9
!
redundancy
!
!
ip ssh version 2
!
class-map match-any VOIP_SIGNALING
match dscp cs3
match dscp af31
match ip precedence 3
class-map match-any VOIP_RTP
match dscp ef
match precedence 5
match dscp af41
match dscp cs4
class-map match-any VOIP_SIP
match dscp cs3
match dscp af31
match ip precedence 3
!
!
policy-map WAN_QOS
class VOIP_RTP
priority 256
class VOIP_SIGNALING
priority 64
class class-default
fair-queue
!
!
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
!
crypto isakmp policy 2
encr aes
authentication pre-share
group 2
crypto isakmp key password address 1.2.3.4
crypto isakmp keepalive 10
!
crypto ipsec security-association idle-time 86400
!
crypto ipsec transform-set WKGAN-TSET esp-aes esp-sha-hmac
!
crypto map WKGAN_CMAP 1 ipsec-isakmp
description Tunnel to1.2.3.4
set peer 1.2.3.4
set transform-set WKGAN-TSET
match address 100
!
!
!
!
!
!
interface FastEthernet0/0
description ***S2S-to-LV & INT-GW***
ip address 1.2.3.4
ip access-group 105 in
ip flow ingress
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
crypto map WKGAN_CMAP
service-policy output WAN_QOS
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
!
interface FastEthernet0/1.1
description ***LAN_TO_SWITCH3550***
encapsulation dot1Q 10 native
ip address 10.0.112.1 255.255.255.0
ip access-group 102 in
ip pim sparse-mode
ip nat inside
ip virtual-reassembly in
!
interface FastEthernet0/1.20
description ***VOICE_GATEWAY***
encapsulation dot1Q 20
ip address 10.0.114.1 255.255.255.0
ip pim sparse-mode
!
ip forward-protocol nd
ip http server
ip http access-class 2
ip http authentication local
ip http secure-server
!
!
ip nat inside source route-map WKGAN_RMAP interface FastEthernet0/0 overload
ip route 0.0.0.0 0.0.0.0 x.x.x.x
!
access-list 1 permit 10.0.112.0 0.0.0.255
access-list 2 permit 10.0.112.0 0.0.0.255
access-list 10 permit 172.18.87.20
access-list 100 permit ip 10.0.112.0 0.0.0.255 172.18.80.0 0.0.0.255
access-list 100 permit ip 10.0.112.0 0.0.0.255 172.18.60.0 0.0.0.255
access-list 100 permit ip 10.0.112.0 0.0.0.255 172.18.66.0 0.0.0.255
access-list 100 permit ip 10.0.112.0 0.0.0.255 172.18.83.0 0.0.0.255
access-list 100 permit ip 10.0.112.0 0.0.0.255 172.18.90.0 0.0.0.255
access-list 100 permit ip 10.0.112.0 0.0.0.255 10.0.0.0 0.0.0.255
access-list 100 permit ip 10.0.112.0 0.0.0.255 10.0.10.0 0.0.0.255
access-list 100 permit ip 10.0.112.0 0.0.0.255 10.0.100.0 0.0.0.255
access-list 100 permit ip 10.0.112.0 0.0.0.255 10.0.104.0 0.0.0.255
access-list 100 permit ip 10.0.112.0 0.0.0.255 10.0.118.0 0.0.0.255
access-list 100 permit ip 10.0.112.0 0.0.0.255 10.0.116.0 0.0.0.255
access-list 100 permit ip 10.0.112.0 0.0.0.255 10.0.124.0 0.0.0.255
access-list 100 permit ip 10.0.112.0 0.0.0.255 10.0.20.0 0.0.0.255
access-list 100 permit ip 10.0.112.0 0.0.0.255 10.0.210.0 0.0.0.255
access-list 100 permit ip 10.0.112.0 0.0.0.255 10.0.220.0 0.0.0.255
access-list 100 permit ip 10.0.112.0 0.0.0.255 10.0.224.0 0.0.0.255
access-list 100 permit ip 10.0.112.0 0.0.0.255 10.0.30.0 0.0.0.255
access-list 100 permit ip 10.0.112.0 0.0.0.255 172.18.82.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 172.18.62.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 172.18.68.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 172.18.82.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 172.18.92.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 10.0.2.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 10.0.12.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 10.0.102.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 10.0.106.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 10.0.110.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 10.0.118.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 10.0.126.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 10.0.22.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 10.0.212.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 10.0.222.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 10.0.226.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 10.0.32.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 172.51.51.0 0.0.0.255
access-list 100 permit ip 10.0.114.0 0.0.0.255 172.18.87.0 0.0.0.255
access-list 101 deny ip 10.0.112.0 0.0.0.255 172.18.80.0 0.0.0.255
access-list 101 deny ip 10.0.112.0 0.0.0.255 172.18.83.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 172.18.62.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 172.18.68.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 172.18.82.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 172.18.92.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 10.0.2.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 10.0.12.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 10.0.102.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 10.0.106.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 10.0.110.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 10.0.118.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 10.0.126.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 10.0.22.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 10.0.212.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 10.0.222.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 10.0.226.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 10.0.32.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 172.51.51.0 0.0.0.255
access-list 101 deny ip 10.0.114.0 0.0.0.255 172.18.87.0 0.0.0.255
access-list 101 permit ip 10.0.112.0 0.0.0.255 any
access-list 102 permit tcp 10.0.112.0 0.0.0.255 host 10.0.112.1 eq telnet
access-list 102 permit tcp 10.0.112.0 0.0.0.255 host 10.0.112.1 eq 22
access-list 102 permit tcp 10.0.112.0 0.0.0.255 host 10.0.112.1 eq www
access-list 102 permit tcp 10.0.112.0 0.0.0.255 host 10.0.112.1 eq 443
access-list 102 permit tcp 10.0.112.0 0.0.0.255 host 10.0.112.1 eq cmd
access-list 102 deny tcp any host 10.0.112.1 eq telnet
access-list 102 deny tcp any host 10.0.112.1 eq 22
access-list 102 deny tcp any host 10.0.112.1 eq www
access-list 102 deny tcp any host 10.0.112.1 eq 443
access-list 102 deny tcp any host 10.0.112.1 eq cmd
access-list 102 deny udp any host 10.0.112.1 eq snmp
access-list 102 permit ip any any
access-list 103 permit ip 172.18.80.0 0.0.0.255 any
access-list 103 permit ip host 1.2.3.4 any
access-list 103 permit ip 10.0.112.0 0.0.0.255 any
access-list 104 permit ip 172.18.80.0 0.0.0.255 any
access-list 104 permit ip host 1.2.3.4 any
access-list 104 permit ip 10.0.112.0 0.0.0.255 any
access-list 105 permit tcp 172.18.80.0 0.0.0.255 host x.x.x.x eq telnet
access-list 105 permit tcp host 1.2.3.4 host x.x.x.x eq telnet
access-list 105 permit tcp 172.18.80.0 0.0.0.255 host x.x.x.x eq 22
access-list 105 permit tcp host 1.2.3.4 host x.x.x.x eq 22
access-list 105 deny tcp any host x.x.x.x eq telnet
access-list 105 deny tcp any host x.x.x.x eq 22
access-list 105 deny tcp any host x.x.x.x eq www
access-list 105 deny tcp any host x.x.x.x eq 443
access-list 105 deny tcp any host x.x.x.x eq cmd
access-list 105 deny udp any host x.x.x.x eq snmp
access-list 105 permit ip any any
!
!
!
!
route-map WKGAN_RMAP permit 1
match ip address 101
!
!
!
control-plane
!
!
!
!
mgcp profile default
!
!
!
!
!
!
line con 0
exec-timeout 0 0
privilege level 15
logging synchronous
line aux 0
line vty 0 4
access-class 104 in
exec-timeout 30 0
privilege level 15
logging synchronous
login local
transport input telnet ssh
line vty 5 15
access-class 103 in
privilege level 15
logging synchronous
no login
transport input telnet ssh
!
scheduler allocate 20000 1000
end

3550 Config:

!
boot-start-marker
boot-end-marker
!
!
!
no aaa new-model
system mtu routing 1500
vtp domain vtp.domain.com
vtp mode transparent
ip domain-name domain.com
!
!
!
mls qos map policed-dscp 0 10 18 24 46 to 8
mls qos map cos-dscp 0 8 16 24 32 46 48 56
mls qos srr-queue input bandwidth 70 30
mls qos srr-queue input threshold 1 80 90
mls qos srr-queue input priority-queue 2 bandwidth 30
mls qos srr-queue input cos-map queue 1 threshold 2 3
mls qos srr-queue input cos-map queue 1 threshold 3 6 7
mls qos srr-queue input cos-map queue 2 threshold 1 4
mls qos srr-queue input dscp-map queue 1 threshold 2 24
mls qos srr-queue input dscp-map queue 1 threshold 3 48 49 50 51 52 53 54 55
mls qos srr-queue input dscp-map queue 1 threshold 3 56 57 58 59 60 61 62 63
mls qos srr-queue input dscp-map queue 2 threshold 3 32 33 40 41 42 43 44 45
mls qos srr-queue input dscp-map queue 2 threshold 3 46 47
mls qos srr-queue output cos-map queue 1 threshold 3 4 5
mls qos srr-queue output cos-map queue 2 threshold 1 2
mls qos srr-queue output cos-map queue 2 threshold 2 3
mls qos srr-queue output cos-map queue 2 threshold 3 6 7
mls qos srr-queue output cos-map queue 3 threshold 3 0
mls qos srr-queue output cos-map queue 4 threshold 3 1
mls qos srr-queue output dscp-map queue 1 threshold 3 32 33 40 41 42 43 44 45
mls qos srr-queue output dscp-map queue 1 threshold 3 46 47
mls qos srr-queue output dscp-map queue 2 threshold 1 16 17 18 19 20 21 22 23
mls qos srr-queue output dscp-map queue 2 threshold 1 26 27 28 29 30 31 34 35
mls qos srr-queue output dscp-map queue 2 threshold 1 36 37 38 39
mls qos srr-queue output dscp-map queue 2 threshold 2 24
mls qos srr-queue output dscp-map queue 2 threshold 3 48 49 50 51 52 53 54 55
mls qos srr-queue output dscp-map queue 2 threshold 3 56 57 58 59 60 61 62 63
mls qos srr-queue output dscp-map queue 3 threshold 3 0 1 2 3 4 5 6 7
mls qos srr-queue output dscp-map queue 4 threshold 1 8 9 11 13 15
mls qos srr-queue output dscp-map queue 4 threshold 2 10 12 14
mls qos queue-set output 1 threshold 1 100 100 50 200
mls qos queue-set output 1 threshold 2 125 125 100 400
mls qos queue-set output 1 threshold 3 100 100 100 400
mls qos queue-set output 1 threshold 4 60 150 50 200
mls qos queue-set output 1 buffers 15 25 40 20
mls qos
!
crypto pki trustpoint TP-self-signed-1473330560
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1473330560
revocation-check none
rsakeypair TP-self-signed-1473330560
!
!
crypto pki certificate chain TP-self-signed-1473330560
certificate self-signed 01
30820250 308201B9 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31343733 33333035 3630301E 170D3933 30333031 30303031
32345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 34373333
33303536 3030819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100CB3D 23D48541 66CCB1A6 436C453C CE50FDF8 2169B9BD B4D0C02A 58A4283B
08C703CC EB484371 5E792F8A F2078C9C 38CFF5FF 45C35C71 9C2A5DCB 349D42C0
BD5F7713 DA8BD813 B9654484 7B43FB4D 47B48689 CEF61BA7 41B18385 B732E095
8D0C4967 D1E037E0 F6FE7209 06DAFE94 AE884AC4 FC300483 42CDE386 DD3296F4
957D0203 010001A3 78307630 0F060355 1D130101 FF040530 030101FF 30230603
551D1104 1C301A82 18574B47 414E3335 36302E67 6C656E6C 65726E65 722E636F
6D301F06 03551D23 04183016 8014459A C017C7D9 9DDB0F3F D82303AC 16E7BB9B
2CAD301D 0603551D 0E041604 14459AC0 17C7D99D DB0F3FD8 2303AC16 E7BB9B2C
AD300D06 092A8648 86F70D01 01040500 03818100 69C0B085 0CAB75C2 94CF5A13
E3B28EA9 9FB78727 01C8A1A6 649BB43C 7B963307 8B001066 763AE879 42972213
E7F5CDBD C6DA1230 1A409465 C280785B 080D46F0 EF3A6F57 BA3F89CB 2E19314E
78BBBCEC 2E80B768 17039BDC 4B8D9084 ADAB91AF 4FB3731F DB3B7EB9 FCE60E43
D0865902 2F43F6DC 8DF1B76C 1BC2CCF1 72A9C9D4
quit
auto qos srnd4
!
!
!
spanning-tree mode pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
vlan 10
name DATA
!
vlan 20
name VOICE
!
ip ssh version 2
!
class-map match-all AUTOQOS_VOIP_DATA_CLASS
match ip dscp ef
class-map match-all AUTOQOS_DEFAULT_CLASS
match access-group name AUTOQOS-ACL-DEFAULT
class-map match-all AUTOQOS_VOIP_SIGNAL_CLASS
match ip dscp cs3
!
!
policy-map AUTOQOS-SRND4-CISCOPHONE-POLICY
class AUTOQOS_VOIP_DATA_CLASS
set dscp ef
police 128000 8000 exceed-action policed-dscp-transmit
class AUTOQOS_VOIP_SIGNAL_CLASS
set dscp cs3
police 32000 8000 exceed-action policed-dscp-transmit
class AUTOQOS_DEFAULT_CLASS
set dscp default
police 10000000 8000 exceed-action policed-dscp-transmit
!
!
!
interface FastEthernet0/1
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/2
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/3
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/4
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/5
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/6
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/7
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/8
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/9
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/10
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/11
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/12
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/13
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/14
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/15
switchport access vlan 10
switchport mode access
switchport voice vlan 20
srr-queue bandwidth share 1 30 35 5
priority-queue out
mls qos trust device cisco-phone
mls qos trust cos
auto qos voip cisco-phone
spanning-tree portfast
service-policy input AUTOQOS-SRND4-CISCOPHONE-POLICY
!
interface FastEthernet0/16
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/17
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/18
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/19
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/20
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/21
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/22
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/23
switchport access vlan 10
switchport mode access
switchport voice vlan 20
mls qos trust device cisco-phone
mls qos trust cos
spanning-tree portfast
!
interface FastEthernet0/24
description ***TRUNK_TO_2811***
switchport trunk encapsulation dot1q
switchport trunk native vlan 10
switchport trunk allowed vlan 10,20
switchport mode trunk
auto qos trust
!
interface GigabitEthernet0/1
switchport mode access
shutdown
!
interface GigabitEthernet0/2
switchport mode access
shutdown
!
interface Vlan1
no ip address
no ip route-cache
no ip mroute-cache
shutdown
!
interface Vlan10
ip address 10.0.112.2 255.255.255.0
no ip route-cache
no ip mroute-cache
!
ip default-gateway 10.0.112.1
no ip classless
ip http server
ip http authentication local
ip http secure-server
!
ip access-list extended AUTOQOS-ACL-DEFAULT
permit ip any any
!
logging source-interface Vlan10
access-list 10 permit 172.18.87.20
snmp-server community zabbix RO 10
snmp-server host 172.18.87.20 zabbix
!
!
line con 0
exec-timeout 30 0
privilege level 15
logging synchronous
login local
line vty 0 4
privilege level 15
logging synchronous
login local
transport input telnet ssh
line vty 5 15
login
!
end

1 Reply 1

as this traffic goes thru the internet is the connection stable?

can you do a "sh policy-map interface fa0/0" to see if you are getting hits on your policy map.

you have only shown one site, can you share the ASA configuration, as more data is likely to be coming from your ASA as I take it that is the main office.