10-04-2018 01:27 AM - edited 03-08-2019 04:18 PM
Hello,
How can I verify that QOS marking is working ?
and packets are tagged ?
I want to be sure that voice traffic ( dscp value 46 ) is marked ......
// Switch2960X
Thank you for your Help
10-04-2018 01:59 AM
Hello
class-map dscp46
match ip dscp 46
policy-map dcsp
class dscp46
intx/x
Service-policy input dscp
end
sh policy-map interface x/x
10-04-2018 07:11 AM
Thanks paul for you prompt answer !!!
I would like to add these dscp values ( for skype for business ) :
Skype for Business Signaling, DSCP 28, source port TCP 5060:5079
Skype for Business Audio, DSCP 46, source port TCP/UDP 50020:50039
Skype for Business Video, DSCP 34, source port TCP/UDP 58000:58019
Skype for Business Application Sharing, DSCP 24, source port TCP/UDP 42000:42019
Skype for Business File Transfer, DSCP 14, source port TCP/UDP 42020:42059
This is my run config :
SWBETCBB09#sh run
Building configuration...
Current configuration : 33446 bytes
!
! Last configuration change at 10:17:44 gmt Thu Oct 4 2018 by A-HSERH
! NVRAM config last updated at 18:34:40 gmt Thu Apr 5 2018 by a-dbaek
!
version 15.0
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SWBETCBB09
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$aNWH$1c89JfNBHD59YCIjI/XS8.
!
username guest privilege 5 password 7 04682E253A33455A10
username netteam privilege 15 secret 5 $1$auRd$c2zZQy9m.45f47X.xf2bo.
aaa new-model
!
!
aaa group server radius ISE
server name XEMAIFP22A
server name XEMAIFP23A
!
aaa authentication login userAuthentication group radius local
aaa authentication dot1x default group ISE
aaa authorization exec userAuthorization group radius local
aaa authorization network default group ISE
aaa accounting dot1x default start-stop group ISE
!
!
!
!
!
aaa server radius dynamic-author
client 10.50.16.22 server-key Rt4hP9qerG73LMPb8kbB
client 10.50.16.23 server-key Rt4hP9qerG73LMPb8kbB
!
aaa session-id common
clock timezone gmt 1 0
clock summer-time gmt recurring last Sun Mar 2:00 last Sun Oct 3:00
switch 1 provision ws-c2960s-24ps-l
authentication mac-move permit
!
!
ip dhcp snooping vlan 1-111
no ip dhcp snooping information option
ip dhcp snooping
vtp domain SWBETCBB09
vtp mode off
!
mls qos map cos-dscp 0 8 16 24 32 46 48 56
mls qos srr-queue output cos-map queue 1 threshold 3 4 5
mls qos srr-queue output cos-map queue 2 threshold 1 2
mls qos srr-queue output cos-map queue 2 threshold 2 3
mls qos srr-queue output cos-map queue 2 threshold 3 6 7
mls qos srr-queue output cos-map queue 3 threshold 3 0
mls qos srr-queue output cos-map queue 4 threshold 3 1
mls qos srr-queue output dscp-map queue 1 threshold 3 32 33 40 41 42 43 44 45
mls qos srr-queue output dscp-map queue 1 threshold 3 46 47
mls qos srr-queue output dscp-map queue 2 threshold 1 16 17 18 19 20 21 22 23
mls qos srr-queue output dscp-map queue 2 threshold 1 26 27 28 29 30 31 34 35
mls qos srr-queue output dscp-map queue 2 threshold 1 36 37 38 39
mls qos srr-queue output dscp-map queue 2 threshold 2 24
mls qos srr-queue output dscp-map queue 2 threshold 3 48 49 50 51 52 53 54 55
mls qos srr-queue output dscp-map queue 2 threshold 3 56 57 58 59 60 61 62 63
mls qos srr-queue output dscp-map queue 3 threshold 3 0 1 2 3 4 5 6 7
mls qos srr-queue output dscp-map queue 4 threshold 1 8 9 11 13 15
mls qos srr-queue output dscp-map queue 4 threshold 2 10 12 14
mls qos queue-set output 1 threshold 1 100 100 50 200
mls qos queue-set output 1 threshold 2 125 125 100 400
mls qos queue-set output 1 threshold 3 100 100 100 400
mls qos queue-set output 1 threshold 4 60 150 50 200
mls qos queue-set output 1 buffers 15 25 40 20
mls qos
!
crypto pki trustpoint TP-self-signed-76133760
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-76133760
revocation-check none
rsakeypair TP-self-signed-76133760
!
crypto pki trustpoint TP-self-signed-3226598784
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3226598784
revocation-check none
rsakeypair TP-self-signed-3226598784
!
!
crypto pki certificate chain TP-self-signed-76133760
certificate self-signed 01
30820227 30820190 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
2F312D30 2B060355 04031324 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 37363133 33373630 301E170D 30363031 30323030 30313438
5A170D32 30303130 31303030 3030305A 302F312D 302B0603 55040313 24494F53
2D53656C 662D5369 676E6564 2D436572 74696669 63617465 2D373631 33333736
3030819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281 8100D5C4
03B4EA9B DED04E09 95855B68 D76CA181 77C4A2C6 D0E58FA4 1CAE4775 C5802D9C
52640BE8 A8F1EA30 EE857B97 821174A5 BB8351ED 21D9931E CE33B3D0 753F0EA2
B195CF35 7AFE5316 28E1615F 2B987371 20652243 5CD47C7C 84D7C73F D658A6E2
0D4C7D1F 4CB70C49 DD063B7A 2FC1EECD 63BA5723 CBD3C51F 87305977 16B90203
010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603 551D2304
18301680 144E84FF 144C1B16 7EEB91BB 160478D2 1A369585 17301D06 03551D0E
04160414 4E84FF14 4C1B167E EB91BB16 0478D21A 36958517 300D0609 2A864886
F70D0101 05050003 8181003C 92C6BDB1 AC3BF38E 48A13AF4 2189F3DF 918E04ED
54216FB1 91EB87FA A8570200 19097D88 6D50F5D2 CDDA63F4 00743647 33B80847
A76782B2 22B5CA43 84FEA160 F5C179E6 3EF5BAFA 0B7211E0 2481653D AAF38279
BBFA349B 03297024 464B07F7 1CA60F25 95DC057B 2BE0D307 8CDBFC0D C87CEE3D
014B0356 4CED47C6 B6922E
quit
crypto pki certificate chain TP-self-signed-3226598784
dot1x system-auth-control
!
spanning-tree mode pvst
spanning-tree extend system-id
spanning-tree uplinkfast
!
!
!
!
!
!
!
!
!
vlan internal allocation policy ascending
!
vlan 2
name Temp-WIFI
!
vlan 5
name IP-Video
!
vlan 9
name VoIP
!
vlan 32
name Ground-Floor
!
vlan 33
name Fifth-Floor
!
vlan 34
name Sixth-Floor
!
vlan 35
name Seventh-Floor
!
vlan 50
name Technical-Services
!
vlan 66
name Printers
!
vlan 90
name MPLS-LAN
!
vlan 98
!
vlan 99
name Network-Management
!
vlan 110
name TG-Wifi
!
vlan 111
name TG-Wifi-Guest
!
vlan 500
name VXRAIL-TEST
!
vlan 900
name Native-Vlan
!
vlan 999
name RSPAN-Vlan
!
vlan 1000
name Parking-vlan
!
!
class-map match-all VOICE-HIGHPRIO
!
policy-map QOS
class VOICE-HIGHPRIO
set dscp ef
!
!
!
!
!
!
!
!
!
!
!
interface FastEthernet0
no ip address
shutdown
!
interface GigabitEthernet1/0/1
description Meeting Room
switchport access vlan 35
switchport mode access
switchport voice vlan 9
load-interval 30
srr-queue bandwidth share 1 30 35 5
priority-queue out
authentication control-direction in
authentication event fail action next-method
authentication event server dead action authorize vlan 35
authentication event server dead action authorize voice
authentication event server alive action reinitialize
authentication host-mode multi-auth
authentication open
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
authentication periodic
authentication timer reauthenticate 28800
authentication violation restrict
mab
mls qos trust device cisco-phone
mls qos trust dscp
dot1x pae authenticator
dot1x timeout tx-period 10
dot1x max-reauth-req 1
auto qos trust dscp
storm-control broadcast level pps 1k
storm-control multicast level pps 2k
storm-control action trap
spanning-tree portfast
service-policy input QOS
ip verify source
ip dhcp snooping limit rate 100
!
........
Could you please verify and tell me what is wrong ?
If anyone can help , it will be great !!
Regards,
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide