01-14-2020 02:13 PM
I have a stack of 2960Xs that currently has QoS configured for voice traffic based on dscp. I have been asked to extend this to a few IoT devices that are having issues w/ audio quality when traffic goes to internet. I configured this on the stack:
mac access-list extended IoTTrustedDevices
permit host 0001.0001.0005 any
permit host 0001.0001.0006 any
class-map match-any IoTTrustedDevices_CM
match access-group name IoTTrustedDevices
policy-map IoTTrustedDevices_PM
class IoTTrustedDevices_CM
set dscp ef
class class-default
interface GigabitEthernet4/0/7
description Connection to Phone or PC
switchport access vlan 123
switchport mode access
switchport voice vlan 126
srr-queue bandwidth share 1 30 35 5
priority-queue out
mls qos trust cos
auto qos trust
spanning-tree portfast edge
service-policy input IoTTrustedDevices_PM
I then have the upstream ASA set w/ priority queue and set to prioritize dscp ef but I'm getting reports that users are still having issues. And when i issue a "show policy-map interface Gi4/0/7" I get the following as if it's not being hit at all.
GigabitEthernet4/0/7
Service-policy input: IoTTrustedDevices_PM
Class-map: IoTTrustedDevices_CM (match-any)
0 packets, 0 bytes
5 minute offered rate 0000 bps, drop rate 0000 bps
Match: access-group name IoTTrustedDevices
0 packets, 0 bytes
5 minute rate 0 bps
Class-map: class-default (match-any)
0 packets, 0 bytes
5 minute offered rate 0000 bps, drop rate 0000 bps
Match: any
Just wanted to know what i'm doing wrong in this case.
01-14-2020 07:01 PM
Hi @mumbles202 ,
To manually match voice IP traffic, try using a standard or extended IP ACL in your class map, instead of the MAC ACL. MAC ACL would be for non ip traffic matching.
Configuration guide reference below:
Hope this helps!
Regards
Rob
01-15-2020 03:00 PM
Thanks. I updated the configuration like this:
access-list 50 permit 192.168.123.134
access-list 50 permit 192.168.123.166
access-list 50 permit 192.168.123.165
access-list 50 permit 192.168.123.169
access-list 50 permit 192.168.123.168
class-map match-any IoTTrustedDevices_CM_2
match access-group 50
!
policy-map IoTTrustedDevices_PM
class IoTTrustedDevices_CM
set dscp ef
class IoTTrustedDevices_CM_2
set dscp ef
class class-default
But noticed i'm still not getting any increments on the counters. I left the same service-policy in place on the interface since I just added the class to the existing policy-map.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide