09-07-2011 06:39 AM - edited 03-04-2019 01:31 PM
I have a problem that I think QOS may help resolve. A T1 at a site is bursting and causing Citrix clients to drop. There is an existing QOS policy for voip giving 70% bandwidth for EF packets. On the core router where the Citrix servers reside I created an ACL to mark the servers with DSCP 46 and applied it to the policy. This part is working, however, I dont think return packets from the clients will get marked properly.
If I create an ACL on the client side routers source client network destination host server IP, will the packet be tagged properly for just packets destined for those servers, or will the internal IP's get tagged then for all traffic?
I ran into a problem recently trying to do this for NAT, and found that once an IP is NAT it then NAT's everything. Will I see the same results?
09-07-2011 07:11 AM
Marking with this acl is fine
But make sure it will not get changed in path
With nat if if you are applying the acl in the inside interface of the nat then no issue as in this case the acl and policy map of qos will be done before the nat
HTH
If helpful rate
Sent from Cisco Technical Support iPhone App
09-07-2011 07:13 AM
Since we control all the network between sites the tags will remain, and this one isn't in a NAT environment, the NAT was an example of somethgin that didn't work as I had thought it would .
I'll give this a try and see how it goes.
09-07-2011 10:04 AM
Disclaimer
The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
Liability Disclaimer
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
Posting
As Marwanshawi already noted, the ACL should work fine.
However, strongly suggest you don't place Citrix class into same queue as VoIP (LLQ?). It would be better to define another class for it with an adequate bandwidth allocation.
(NB: Cisco recommends not using more than about a 1/3 of a link's bandwidth for VoIP, this to allow sufficient bandwidth for other traffic. I.e., you might want to review the 70% bandwidth allocation for VoIP.)
BTW, Citrix supports more than just "screen scraping". Later versions of NBAR can identify the different Citrix traffic types (if using the later Citrix protocol) allowing you to only give precedence to the "screen scraping" traffic.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: