Passing Voice VLAN through a non-Cisco switch

Hi All,
Will a non-Cisco switch (no 802.1q support) that is putted beetween Cisco IP Telephone and Cisco Catalyst switch (which is configured with auxilary Voice Vlan) pass voice vlan frames and CDP?

Any switch should pass on either ISL(which is cisco properitary and hence not supported on non-Cisco) or IEEE 802.1Q frames or else it cannot support voice vlan support . And non-Cisco switches do not support CDP as it is once again Cisco proprietary protocol.

Similar Messages

  • SIP 7960 to non-Cisco Switch

    Does anyone know if a 7960 (SIP) phone can connect to a non-Cisco switch and separate the Voice traffic from the access port traffic?
    I tried connecting a 7960 to a baystack 450T, configuring the switchport as a "tagged trunk", and then changing the Admin Vlan ID on the phone to the desired voice vlan. It looks as though the switch wants the access port traffic to be tagged as well.
    Any help would be greatly appreciated!
    Thanks,
    Darin

    Hi !
    You need to configure a 802.1q trunk on your non-cisco switch. The 802.1q native vlan should be the one the PC is in. The voice vlan will be tagged.
    Configure all parameters (like voice-vlan-id etc) on the phone manually (obviously CDP does not work). I have done it and it works fine (but i never tried on the switch you mentioned).
    Inline Power will also not work because the 7960 is not 802.3af compliant (yet).
    Mike

  • Ce 500 non-cisco switch

    How should I configure the smartport on a catalyst express 500 switch if I am connecting a non-cisco switch like a small linksys. I dont think I can make the smartport a switch because it tries to trunk?? right??
    And if I leave it as a PC it complains abouting having to many devices connected to it.
    Would having it configured as something like an access point work??

    Now, I noticed something very odd, I kept the switch option selected on the port on the ce 500 that the linksys was plugged in to and the devices plugged in downstream behind the linksys all kept the correct VLAN assignment. Phones were in the voice vlan and PC's were in the data vlan. Does not really make sense to me how this is working??

  • Non Cisco Switches

    Dear ALL,
    I am an IT Potfessional, Doing Network + . I have a questions:
    1) Do Non Cisco Switches have Access and Trunk ports. What i mean is do non cisco switches distinguish between ethernet prots as trunk and access.
    2) Do we need Cross talk cable for Connectine two non cisco switches preferably D-Link . Also How to interconnect a Cisco switch wioth non cisco switch.
    Regards
    Haseeb

    Disclaimer
    The   Author of this posting offers the information contained within this   posting without consideration and with the reader's understanding that   there's no implied or expressed suitability or fitness for any purpose.   Information provided is for informational purposes only and should not   be construed as rendering professional advice of any kind. Usage of  this  posting's information is solely at reader's own risk.
    Liability Disclaimer
    In   no event shall Author be liable for any damages whatsoever (including,   without limitation, damages for loss of use, data or profit) arising  out  of the use or inability to use the posting's information even if  Author  has been advised of the possibility of such damage.
    Posting
    As Daniel noted "decent" switches, i.e. manageable and supporting VLANs, will generally support VLAN tagging ports using the 801.2q standard.  (NB: this standard allows VLAN tagging between different vendors.)  Switches that support VLANs will distinguish between untagged (edge) ports (e.g. Cisco access) and the tagged ports (e.g. a Cisco trunk), but as Daniel also noted, their terminology might be different.
    As Leo noted, many switches offer auto MDI/MDI-X.  Surprisingly, this feature was often seen on unmanageable switches before it was seen on manageable switches.  Also on older unmanageable switches, you might find a pair of physical ports that are the same logical port, one wired MDI and other wired MDI-X or you might find some button to change one port's MDI to/from MDI-X.  Such "special" ports are often the "uplink" port.  (NB: the purpose of the "uplink" port was to allow connecting it to another switch whether you had a straight through or cross over cable.)
    If you do have a switch supporting auto MDI/MDI-X, or one with the earlier physical MDI/MDI-X options, you only need one switch, not both with such a feature, to support either a straight through or cross over cable.  Of course, both switches might have such an option, which is fine too.  Only if both switches are "hard wired", you'll need a cross over cable for a switch to switch connection.

  • Interconnecting cisco switches with non-cisco switches

    I need help concerning interconnecting two Cisco switches (3550’s) using a non-Cisco switch or hub on the LAN. I have noticed that the two Cisco switches connected using a non-Cisco switch are able to communicate well, however a PC connected to the non-Cisco switch/hub can not ping any device on the LAN. The non-Cisco device is a working one. When the two Cisco switches are connected using a Cisco switch, PCs connected to the interconnecting switch are able to ping. What’s the explanation? Please help.

    Building configuration...
    Current configuration : 3342 bytes
    ! No configuration change since last restart
    version 12.1
    no service pad
    service timestamps debug uptime
    service timestamps log uptime
    no service password-encryption
    clock timezone GMT -2
    ip subnet-zero
    ip rcmd rcp-enable
    ip rcmd remote-username cwuser
    spanning-tree mode pvst
    spanning-tree extend system-id
    interface FastEthernet0/1
    switchport mode dynamic desirable
    interface FastEthernet0/2
    switchport mode dynamic desirable
    interface FastEthernet0/3
    switchport mode dynamic desirable
    interface FastEthernet0/4
    switchport mode dynamic desirable
    interface FastEthernet0/5
    switchport mode dynamic desirable
    interface FastEthernet0/6
    switchport mode dynamic desirable
    interface FastEthernet0/7
    switchport mode dynamic desirable
    interface FastEthernet0/8
    switchport mode dynamic desirable
    interface FastEthernet0/9
    switchport mode dynamic desirable
    interface FastEthernet0/10
    switchport mode dynamic desirable
    interface FastEthernet0/11
    switchport mode dynamic desirable
    interface FastEthernet0/12
    switchport mode dynamic desirable
    interface FastEthernet0/13
    switchport mode dynamic desirable
    interface FastEthernet0/14
    switchport mode dynamic desirable
    interface FastEthernet0/15
    switchport mode dynamic desirable
    interface FastEthernet0/16
    switchport mode dynamic desirable
    interface FastEthernet0/17
    switchport mode dynamic desirable
    interface FastEthernet0/18
    switchport mode dynamic desirable
    interface FastEthernet0/19
    switchport mode dynamic desirable
    interface FastEthernet0/20
    switchport mode dynamic desirable
    interface FastEthernet0/21
    switchport mode dynamic desirable
    interface FastEthernet0/22
    switchport mode dynamic desirable
    interface FastEthernet0/23
    switchport mode dynamic desirable
    interface FastEthernet0/24
    switchport mode dynamic desirable
    interface GigabitEthernet0/1
    switchport mode dynamic desirable
    interface GigabitEthernet0/2
    switchport mode dynamic desirable
    interface Vlan1
    ip address
    ip default-gateway
    ip classless
    ip http server
    snmp-server community
    snmp-server community
    snmp-server location
    snmp-server system-shutdown
    snmp-server enable traps snmp authentication warmstart linkdown linkup coldstart
    snmp-server enable traps config
    snmp-server enable traps entity
    snmp-server enable traps flash insertion removal
    snmp-server enable traps bridge
    snmp-server enable traps stpx
    snmp-server enable traps rtr
    snmp-server enable traps port-security
    snmp-server enable traps vtp
    snmp-server enable traps vlancreate
    snmp-server enable traps vlandelete
    snmp-server enable traps envmon fan shutdown supply temperature status
    snmp-server enable traps MAC-Notification
    snmp-server enable traps hsrp
    snmp-server enable traps cluster
    snmp-server enable traps copy-config
    snmp-server enable traps syslog
    snmp-server enable traps vlan-membership
    line con 0
    line vty 0 4
    login
    line vty 5 15
    login
    ntp clock-period 17180064
    end

  • VLAN trunk to non Cisco

    we have two 4503 switches configured with secondary interfaces and running RIP.
    There are no vlans configured on the switch.
    I have a 3com switch on a subnet not yet configured on the 4500 switches.
    I want to create a trunk from the 3com to the 4500.
    I have the vlan configured with the IP address I want, but I am not sure how to associate the trunk port to it.
    I have the 3com connected to port g2/40 but the vlan interface does not come up unless I configure:
    switchport mode access
    interface GigabitEthernet2/40
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 6
    switchport mode trunk
    interface Vlan6
    ip address 10.250.250.250 255.255.255.0
    I can find anything specific on how this should be done.

    Hi Rich,
    Have you also configured trunk on 3com switch which I believe is not? Also if you have configured trunk on 3com switch is it showing you up and working. I believe your 3com switch por tconnected to cisco switch port is only configured for access vlan 6.
    On cisco switch for any logical interface like vlan interface in your case to be up and up you need to have one physical interface attached to that vlan or you need ot have trunk interface allowing that vlan which is true in your case but if 3com switch port is not acting as trunk then trunk on cisco switch will be down and is the reason your logical interface will show you line protocol down.
    because I believe your 3com switch is configured only for vlan 6 and is the reason when you configure switchport mode access on cisco switchport that physical interface get binded with that vlan and your logical interface comes up.
    So cheked the port and trunk settings on 3com switch as config is fine on cisco switch end.
    HTH
    Ankur

  • ISE web auth for non-cisco switch(D-link 3528)

    Is it possible to use ISE(inline posture node) to redirect the wired users to ISE guest portal ?
    And the wired users will get full network access after they pass the web auth.

    you can use ISE ln-line posture node with 3rd part switches
    RADIUS access device must supply the following RADIUS attributes:
        Calling-Station-Id (for MAC_ADDRESS)
        User-Name
        NAS-Port-Type
        RADIUS accounting message must have the Framed-IP-Address attribute
    VLAN, DACL features can be used  but again it depends on switch models let us know  specific switch  models . Certain advanced use cases, such as those that involve posture assessment, profiling, and web authentication, are not consistently available with non-Cisco devices or may provide limited functionality,

  • Stacking a non-Cisco Switch with a Catalyst Express 500 switch

    We are using a Cisco Catalyst Express 500 Ethernet switch and need to add another switch to get a few more ports. Is is possible to stack a Catalyst Express 500 Ethernet switch with a non-Cisco Ethernet switch. If so, is there any Cisco documentation telling how to do this?

    If by stack, you mean connect the two switches via Ethernet ports, yes you should be able to do that. Depending on the port capabilities of the switches, and whether they have any special uplink ports, you might need to use a different Ethernet connecting cable (cross-over vs. straight thru).

  • WLC4402 connect to non-cisco switch?

    I have 2 WLC4402-50 connected to an Extreme Black Diamond chassis, using GLC-T. I have configured LAG on the controllers to support the number of AP's needed and I have configured the ports on the switch to use LaCP aggregation because that is what is available. Is this a supported configuration or do I just need to leave those ports as non-LaCP ports?

    just to help out anyone else using extreme, here is how I got it to work
    first I define the src-dst ip load sharing like this
    Switch#. configure sharing address-based L2_L3_CHK_SUM
    and then I configure sharing on the ports (the port number between the sharing and grouping is just the master port number for the share)
    Switch#. enable sharing 3:26 grouping 3:26, 3:56 algorithm address-based
    Switch#. enable sharing 3:28 grouping 3:28, 3:58 algorithm address-based
    and then I do the vlan config like
    Switch#. create vlan "Wireless"
    Switch#. configure vlan Wireless tag 250
    Switch#. config vlan "default" add ports 3:26, 3:28 untagged
    Switch#. config vlan "Wireless" add ports 3:26, 3:58 tag

  • Multiple VLANs through to layer 2 switch

    So long as each switch supports VLANing (which most manageable switches do), then yes. Some model numbers on the switches would help here though to be sure.
    Also, keep in mind that assigning VLANs is a layer 2 function, not layer 3. So long as you tag the VLANs you need to pass between the switches on the feed ports between them, you should be able to have them running without issue.
    Could you provide a little more detail as to what you're trying to accomplish so that we can better advise you how to proceed?

    Hello,
    Is it possible to send multiple vlans across a layer 3 dell powerconnect to a Meraki layer 2 switch and configure the ports to access the different vlans? 
    Is it also multiple vlans across a layer 3 dell powerconnect to a layer 2 dell powerconnect switch and configure the ports to access the different vlans? 
    I've been playing aound with this and I can't seem to get it done.
    Thanks for any help in advance.
    This topic first appeared in the Spiceworks Community

  • Using FCoE connection to non Cisco switches

    Hello,
    does anyone know what port configuration needs to be configured on a Nexus switch that is connected to say Brocade switch or any other vendor that supports FCoE. I have created VLAN to VSAN mapping, i assume next step is to create a vfc device ? Since this is not connection to an initiator or a target but another FCoE capable switch, how do i need to configure this vfc ?  Any tips ?
    Thanks

    Hi,
    Looks like from the document that you referenced that this switch runs in NPV mode for FCoE:
    FCoE features
    Fibre Channel over Ethernet (FCoE*)
    FIP & FCoE packets are all forwarded when DCB is configured
    * FCoE frames as defined by T11 Committee
    So, I would configure the Cisco Nexus switch for FCoE and NPIV
    Configure the Nexus 5000 for FCoE and NPIV
    There are several procedures that are required in order to configure the Nexus 5000 for FCoE and NPIV:
        Enable Feature FCoE
        Enable N Port Identifier Virtualization (NPIV) on the Nexus 5000
        Enable Nexus 5000 Quality of Service (QoS) for FCoE
        Enable Link Layer Discovery Protocol (LLDP)
        Configure VLAN
        Configure VSAN
        Map the VLAN to VSAN
    Example:
    feature lldp
    feature fcoe
    feature npiv
    interface vfc130
      bind interface Ethernet1/30
      switchport mode F
      no shutdown
    interface Ethernet1/30
      switchport mode trunk
      switchport trunk allowed vlan 1,100
      spanning-tree port type edge trunk
    vsan database
      vsan 100 interface vfc130
    vlan 100
      fcoe vsan 100
    Example of QOS:
     system qos
      service-policy type qos input fcoe-default-in-policy
      service-policy type queuing input fcoe-default-in-policy
      service-policy type queuing output fcoe-default-out-policy
      service-policy type network-qos fcoe-default-nq-policy
    Best regards,
    Jim

  • Cisco Layer 3, Voice, & VLAN

    I have a vSphere 5.5 install and I'm in the process of a network upgrade in preparation for a VOIP implementation.  The Switch hardware I'm using is a stack of Cisco 3850 Layer 3 switches and I've been going in circles on getting vlan traffic to work correctly.  Hopefully someone can point me in the right direction.
    I have one NIC connected to the switch (10GB fiber) that will handle all traffic for the esxi host (except for management).  VLAN ID is set to None (0) and load balancing is set to Route based on originating virtual port.
    I have 2 subnets, 10.1.0.0/16 (data & management, VLAN 1) and 10.10.1.0/24 (Voice, VLAN 10)
    On the host I have a Win 2012 R2 server that will be a VOIP PBX host.  It must be able to communicate with the IP phones (VLAN 10) and other servers (VLAN 1).
    The switches will do the intervlan routing.
    Finally my question - Can anyone give me some hints on how to set up the interface on the Cisco for the 10GB fiber connection from my host?  Actual port settings would be extremely helpful.  Anything I'm doing at the vmware end that I should be doing differently?

    In case anyone comes across this in a search, here's what I ended up with, 1st the Cisco switch:
    switchport trunk allowed vlan 1,10
    switchport mode trunk
    switchport nonegotiate
    switchport voice vlan 10
    macro description cisco-switch
    spanning-tree portfast
    spanning-tree link-type point-to-point
    The virtual switch I set to all vlan IDs and Route based on originating virtual port.

  • 802.1x, voice vlan and IP phone

    Hi, I reviewed many posts here, and I still need the clarification how 802.1x on the switch works with non-Cisco IP phone (not supporting CDP) and PC connected to the PC port. If I configure 802.1x on a switch port, along with access and voice vlan, next I configure the static voice vlan on the non-Cisco phone, will it be possible to authenticate the user on the PC and bypass authentication for IP phone? Is CDP required in such scenario - (non-Cisco IP phone doesn't support it)?
    Regards,
    Krzysztof

    You need CDP for touchless interop. CDP can of course be spoofed though, so proceed with caustion anyway.
    You need multi-domain authentication to appropriately deal with non-Cisco phones and port-based access-control. See here to get started:
    <http://www.cisco.com/en/US/products/ps7077/products_configuration_guide_chapter09186a008077a284.html#wp1231964>
    Hope this helps,

  • 802.1x and Voice VLAN

    I had read articles on cco, and I believed for the same switch port we can have 802.1x configure and the voice vlan configure. It mean the IP phone is connect to the switch port with 802.1x configured, but the phone will not autheticate, only the workstation connect to phone data port will get authenticate.
    I had configured 802.1x and test with notebook logon and able to access the network. Now I would like to test the notebook attached to IP phone data port, and the phone connect to switch port configure with 802.1x. But I failed to add voice vlan commmand. Why ?
    interface GigabitEthernet9/48
    description temporary port
    switchport
    switchport access vlan 12
    switchport mode access
    no ip address
    dot1x port-control auto
    spanning-tree portfast
    CIG01-ENT-SW1(config-if)#switchport voice vlan 14
    Command rejected: Gi9/48 is Dot1x enabled port.

    Using IEEE 802.1x Authentication with Voice VLAN Ports
    A voice VLAN port is a special access port associated with two VLAN identifiers:
    ?VVID to carry voice traffic to and from the IP phone. The VVID is used to configure the IP phone connected to the port.
    ?PVID to carry the data traffic to and from the workstation connected to the switch through the IP phone. The PVID is the native VLAN of the port.
    In single-host mode, only the IP phone is allowed on the voice VLAN. In multiple-hosts mode, additional clients can send traffic on the voice VLAN after a supplicant is authenticated on the PVID. When multiple-hosts mode is enabled, the supplicant authentication affects both the PVID and the VVID.
    A voice VLAN port becomes active when there is a link, and the device MAC address appears after the first CDP message from the IP phone. Cisco IP phones do not relay CDP messages from other devices. As a result, if several Cisco IP phones are connected in series, the switch recognizes only the one directly connected to it. When IEEE 802.1x authentication is enabled on a voice VLAN port, the switch drops packets from unrecognized Cisco IP phones more than one hop away.
    When IEEE 802.1x authentication is enabled on a port, you cannot configure a port VLAN that is equal to a voice VLAN.
    Waht kind of switch do you have? In 3550 I can configure the port for both vvid and pvid:
    interface FastEthernet0/1
    switchport access vlan 3
    switchport mode access
    switchport voice vlan 2
    no ip address
    dot1x port-control auto
    spanning-tree portfast
    end
    Nevertheless, as the statement above indicates, the port will need to be configured for multi-host in order the PC behind the phone get autehntication:
    under the interface configure "dot1x host-mode multi-host"
    Nevermind, I just realized that you might have a 5600 running native, checking the configuration guide and realese notes it does not looks like dot1x and vvlan can play together in that platform.

  • Any one ever worked on 6500 series Cisco switches QOS or 6503 or 6524 QOS(Urgent help needed)

    Hi All,
    I am having issue specifally doing QOS configuration on 6503 or 6524 or 6509 switches. I am unable to match any EF(voice) traffic for eompls(vlan based) on 6503 cisco switch. If i use any other router as 2811 or 2821 my QOS configuration works perfect but if i put 6503 as PE2 it does not work.i am using vlan based eompls.
    Below is the scenario & configuration which i am having issue.
    CE1(2821 router)(dot1Q)--------->PE1(2821 router)------->P(6524 switch)-------->PE2(6503 switch)------->(dot1Q)(2821 switch)CE2.
    On CE1 i can match ip-precedence 5 traffic and mark that traffic to cos5 on outbound port.On PE1 i can match cos5 packet and mark with mpls exp top5 on inbound port, on outbound port i can match mpls exp 5. 
    On PE2(6503) i am unable to match that mpls exp5 packet on inbound port. none of the configuration worked on 6500 series switches with mls qos, ,mls qos trust dscp,mls qos trust cos etc. Although i can match cos5 traffic on CE2 on inbound interface.i can not match mpls exp 5 traffic on 6503 and all i can see traffic as default-class on 6503 switch. I tried many things and many configurations on 6503 but nothing worked.If i put 2821 router as PE2 instead of 6503 my qos configuration works. but why if i put 6503 my same qos configuration does not work? 
    ---match means=classification or classify
    Can anyone tell me how qos works on 6500 series switches or where i am having issue in my scenario.
    i am using this ios on 6503: s72033-advipservicesk9_wan-mz.122-33.SXI3.bin.
    below r my questions for 6503 qos:
    1.do i need to use some other map tables,am i  using correct map tables on 6503 as cos-dscp,dscp-cos,exp-dscp etc.
    2.any other configutaion of qos needed on 6503?
    3.i am unable to match anything on outbound port of 6503.
    4.on 6503 i am using sup720 and PFC3BXL.any specific configuration needed for PFC3bxl.
    5. 6503 not allowing me to match qos-group on inbound interface, not allowing me to set cos5 on outbound interface. not allowing me to set cos5 as an inbound interface.
    CE1(2821) config:
    class-map match-any EF
     match ip precedence 5
    class-map match-any data
     match ip precedence 3
    policy-map ip2mpls
     class EF
      set cos 5
     class data
      set cos 3
    interface FastEthernet0/0
     no ip address
     duplex auto
     speed auto
    interface FastEthernet0/0.455
     encapsulation dot1Q 455
     ip address 172.16.15.1 255.255.255.252
     service-policy output EF
    PE1(2821) config:
    mls qos map cos-dscp 0 8 16 24 32 40 48 56
    class-map match-all exp_3
     match mpls experimental topmost 3
    class-map match-all mpls_exp
     match mpls experimental topmost 5
    class-map match-any cos3
     match cos  3
    class-map match-any LOO1
     match cos  5
    policy-map EF
     class LOO1
      set mpls experimental imposition 5
     class cos3
      set mpls experimental imposition 3
    policy-map QOS_G_5
     class mpls_exp
      priority
     class exp_3
      bandwidth 500
    interface Loopback0
     ip address 3.3.3.3 255.255.255.255
    interface FastEthernet0/0
     ip address 192.168.23.2 255.255.255.0
     ip ospf network point-to-point
     duplex auto
     speed auto
     mpls ip
     service-policy output QOS_G_5
    interface FastEthernet0/1.455
     encapsulation dot1Q 455
     xconnect 5.5.5.5 455 encapsulation mpls
     service-policy input EF
    PE2(6503 qos):
    R1#show module
    Mod Ports Card Type                              Model              Serial No.
      1    4  CEF720 4 port 10-Gigabit Ethernet      WS-X6704-10GE      SAL09401U2L
      2   48  CEF720 48 port 10/100/1000mb Ethernet  WS-X6748-GE-TX     SAL114247YN
      3   16  16 port 1000mb GBIC ethernet           WS-X6416-GBIC      SAL0712AM69
      4   24  CEF720 24 port 1000mb SFP              WS-X6724-SFP       SAL10019J4N
      5    2  Supervisor Engine 720 (Hot)            WS-SUP720-3BXL     SAD102805VM
      6    2  Supervisor Engine 720 (Active)         WS-SUP720-BASE     SAD0846060F
    Mod  Sub-Module                  Model              Serial       Hw     Status
      1  Distributed Forwarding Card WS-F6700-DFC3BXL   SAD102504EF  5.3    Ok
      2  Centralized Forwarding Card WS-F6700-CFC       SAD111300PD  3.1    Ok
      4  Centralized Forwarding Card WS-F6700-CFC       SAL1004BQ2A  2.0    Ok
      5  Policy Feature Card 3       WS-F6K-PFC3BXL     SAD10270189  1.8    Ok
      5  MSFC3 Daughterboard         WS-SUP720          SAD102801G5  2.5    Ok
      6  Policy Feature Card 3       WS-F6K-PFC3BXL     SAL1415FE95  1.11   Ok
      6  MSFC3 Daughterboard         WS-SUP720          SAD08440794  2.4    Ok
    R1#show mls qos maps
       Normal Burst Policed-dscp map:                                  (dscp= d1d2)
         d1 :  d2 0  1  2  3  4  5  6  7  8  9
          0 :    01 01 02 03 04 05 06 07 08 09
          1 :    10 11 12 13 14 15 16 17 18 19
          2 :    20 21 22 23 24 25 26 27 28 29
          3 :    30 31 32 33 34 35 36 37 38 39
          4 :    40 41 42 43 44 45 01 47 48 49
          5 :    50 51 52 53 54 55 56 57 58 59
          6 :    60 61 62 63
       Maximum Burst Policed-dscp map:                                  (dscp= d1d2)
         d1 :  d2 0  1  2  3  4  5  6  7  8  9
          0 :    00 01 02 03 04 05 06 07 08 09
          1 :    10 11 12 13 14 15 16 17 18 19
          2 :    20 21 22 23 24 25 26 27 28 29
          3 :    30 31 32 33 34 35 36 37 38 39
          4 :    40 41 42 43 44 45 46 47 48 49
          5 :    50 51 52 53 54 55 56 57 58 59
          6 :    60 61 62 63
       Dscp-cos map:                                  (dscp= d1d2)
         d1 :  d2 0  1  2  3  4  5  6  7  8  9
          0 :    00 00 00 00 00 00 00 00 01 01
          1 :    01 01 01 01 01 01 02 02 02 02
          2 :    02 02 02 02 03 03 03 03 03 03
          3 :    03 03 04 04 04 04 04 04 04 04
          4 :    05 05 05 05 05 05 05 05 06 06
          5 :    06 06 06 06 06 06 07 07 07 07
          6 :    07 07 07 07
       Dscp-exp map:                                  (dscp= d1d2)
         d1 :  d2 0  1  2  3  4  5  6  7  8  9
          0 :    00 00 00 00 00 00 00 00 01 01
          1 :    01 01 01 01 01 01 02 02 02 02
          2 :    02 02 02 02 03 03 03 03 03 03
          3 :    03 03 04 04 04 04 04 04 04 04
          4 :    05 05 05 05 05 05 05 05 06 06
          5 :    06 06 06 06 06 06 07 07 07 07
          6 :    07 07 07 07
    Cos-dscp map:
             cos:   0  1  2  3  4  5  6  7
            dscp:   0 10 18 24 34 46 48 56
       IpPrecedence-dscp map:
          ipprec:   0  1  2  3  4  5  6  7
            dscp:   0  8 16 24 32 40 48 56
       Exp-dscp map:
             exp:   0  1  2  3  4  5  6  7
            dscp:   0  8 16 24 32 40 48 56
    mls netflow interface
    mls qos map cos-dscp 0 10 18 24 34 46 48 56
    mls qos
    class-map match-all exp_3
     match mpls experimental topmost 3
    class-map match-all EXP_5
     match mpls experimental topmost 5
    class-map match-all QOS_GROUP_5
     match qos-group 5
    class-map match-all prec5
     match ip precedence 5
    class-map match-all cos5
     match cos  5
    policy-map mpls2ip
    class QOS_GROUP_5
     set cos 5
    policy-map IN_FROM_R3
     class EXP_5
      set qos-group 5
    interface Loopback0
     ip address 5.5.5.5 255.255.255.255
    interface GigabitEthernet2/2
     mls qos trust cos 
    or <------------ (tried both individually but none worked)
     mls qos trust dscp
    interface GigabitEthernet2/2.455
     encapsulation dot1Q 455
     xconnect 3.3.3.3 455 encapsulation mpls
     service-policy output mpls2ip
    interface GigabitEthernet2/1
     ip address 192.168.34.4 255.255.255.0
     ip ospf network point-to-point
     mls qos trust cos 
    or <------------ (tried both individually but none worked)
     mls qos trust dscp
     mpls ip
     service-policy input IN_FROM_R4
    Thanks & regards,
    Ahsan Rasheed

    Hi All,.
    I am still having issue on 6503 or 6524 Cisco Switch. 
    " Can any one give me any sample of 6524 or 6503 QOS working configuration, i would be really thankful "
    As i have mentioned in my prevoius post of configuration of 6503. I am unable to match mpls exp 5 packet on 6503. My qos configuration on PE1(2811 router) is working perfectly. I am unable to classify mpls ex5 or mpls exp3 on 6503 switch. Am i missing something on configuration?
    PE2 config:"6503 switch"
    class-map match-all mpls_exp
     match mpls experimental topmost 5
    policy-map EF
    class mpls_exp
    R!#mls qos
    int Gi2/4
    service-policy input EF
    mls qos trust cos
        dscp:   0 10 18 24 34 46 48 56
       Exp-dscp map:
             exp:   0  1  2  3  4  5  6  7
            dscp:   0 10 18 24 34 46 48 56
    Thanks,
    Ahsan Rasheed

Maybe you are looking for

  • How to handle RunTime Faults which doesn't list under System Faults?

    Hi, I have a doubt regarding runtime faults in BPEL 1.1.In BPEL 1.1 some of the run time faults are categorised as system faults.So we can handle those run time faults using the faultname or namespace(http://schemas.oracle.com/bpel/extension) of syst

  • Conversion to txinj to taxinn -urgent

    Hi experts, Could any one tell me the procedure to convert Taxinj to Taxinn My client wants to shift from formula based to condition based help me,

  • Add Fields in CUP Request - SAP GRC Access Control 5.3

    Dear Friends, I am wondering on how to add fields value in CUP (Compliant User Provisioning) SAP GRC AC 5.3. Currently i'm leading 9 SAP Security Coordinators in Indonesia and i want to create Performance Metrics on how long the CUP Requests is proce

  • Consolidation Method

    Are there default consolidation methods in HFM? or do we have to write consolidation methods for every type of ownership?

  • 3 SATA and 1 PATA config problem

    I have been using 2 non-RAID SATA drives and 1 DVD drive and now want to add an additional SATA drive.   No matter what I change in the BIOS for the SATA/PATA config, I can not get this 3rd SATA to be seen. Any suggestions? TIA, Rick