QOS for inbound traffic on 3560

Just to clarify what I'm asking.... I would like to make the congestion happen on our end and not on the ISP's equipment that I have no control over traffic shaping etc... I can't limit the bandwidth on the aggregate port that the metro e connects to (3750) because it would limit it for all locations and not just one. I think my only option is to limit the bandwidth on the switch at the location in question but I guess it would have to be on the ingress side, but then will it still drop packets according to dscp priority during congestion?  

I have a little problem I hope you guys can help me with. We have a location that has a metro e hand off from our ISP. The same metro e also serves other locations and the aggregate point is at our main office which goes to a Cisco 3750 stack. The location in question has a single Cisco 3560 switch. We need to apply QOS for both inbound and outbound traffic to this location. I can tag the traffic to and from there but how do I make it so that the 3560 (or 3750) gets saturated and not the ISP connection for incoming traffic (so we decide what packets get dropped)? srr-queue bandwidth limit can't be used on the metro e port on the 3750 because this would limit all locations and not just the one.Should I put another small switch and put it in from of the 3560? This way I could use srr-queue and apply QOS to the egress queue.I hope this...
This topic first appeared in the Spiceworks Community

Similar Messages

  • QoS for CEM traffic

    I have two 3750ME switches connecting two ends of a LES100. On each switch, i have 3845 routers with the NM-CEM-4SER modules, plus direct to switch internet traffic. My complete setup is as shown in the attached PDF.
    My problem is that with the default QoS settings, i have lots of drops in the Txqueue of the switches.
    The CEM's send traffic as EF, which is trusted throughout the switch setup. Other traffic that comes into the switch is marked down to best effort. Thus, most of the traffic the switches handle is EF,(about 70%, 20MB for now). How do i tune the QoS parameters on the switch to handle this amount and more of EF traffic?

    Regaring the QOS, I think we should implement this on the 3750 . It is worth advising you to first upgrade the IOS on this device. The following URL will help you:
    http://www.cisco.com/en/US/docs/switches/lan/catalyst3750/software/release/12.2_25_sec/configuration/guide/swqos.html
    As you are unable to specify the "bandwidth/priority" on 3750 cli, you will need to use the Queuing and Scheduling (SRR) section from the config guide. So basically you enable the expidite queue for the CEM traffic egreesing the 3750. However I believe you cannot classify the traffic via acl to assign it to queues, so you will need to mark it.

  • Putting QOS for voice traffic in switches.

    Hi All,
    does anybody know how to prioritize the voice traffic over data in the 2960 SW, in a scenario in which ethernet cable coming to ipphone & from IPphone to PC.

    Disclaimer
    The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
    Liability Disclaimer
    In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
    Posting
    Yes, I do.
    laugh - I was temped to stop with the above, as it directly answers your question, but I assume you want to know how.
    In principle, you recognize the VoIP traffic as being different from data traffic and provide it "special" egress treatment.  Normally you would enable QoS, and for egress, enable PQ, direct VoIP bearer traffic to that queue.  You might also direct VoIP signalling traffic to a queue that insures it's not unduly delayed or dropped.  You might also set rate caps on ingress VoIP traffic.
    Recognition of VoIP traffic can be done in different ways.  Your phones might support L2 CoS or L3 ToS marking, your switch might "analyze" ingress traffic, your switch might trust a Cisco VoIP phone, your switch and VoIP phones might use a dedicated VLAN.  Basically, there's lots of variables dealing with ingress.
    Unfortunately, you've provided insufficient information for specific recommendations.
    PS:
    BTW, your 2960 might also support auto-QoS, which may, or may not, be all you need to enable.

  • Cascade Catalyst 3560 switch for loaded traffic

    I have a layer 3 Catalyst switch 3560 with 24 FE interfaces.
    I need to pump traffic from traffic generator into port 1 and propagate it to other ports; the last port will be connected back to the traffic generator.
    I suppose that I need to cascade some of the switchports but how do I configure the catalyst switch for this setup? Is it making use of routed port and static routing?

    Hi Ankur,
    Thanks for the reply.
    The traffic generator are layer 3 interfaces which I can assign IP address.
    You mentioned that I do not need any routing, but I require traffic coming from the traffic generator(e.g FE1) going into switchport 1 to traverse through the rest of the switchports before exiting from the last switchport back to the traffic generator(e.g FE2). Therefore, I need advice on how to setup the catalyst switch to achieve this.If I assign ip address for this traffic to end at the traffic generator-FE2, the generated traffic will enter the switch at switchport 1 and directly exit from the last switchport without any traversing done. Btw, do I need to cascade my switch with cross cable in this aspect?
    Thanks in advance for your advice.
    Regards,
    Raymond

  • QoS config for Video Traffic

    Hello all,
    I have a campus network with several remote sites, at the campus I have a 6509 at the core and 3560 and 3750 switches at the access layer. I do have QoS enable on the 6509 and I am using auto QoS on the 3560 and 3750 switches and all seems to be working fine with my existing VOIP environment. But now as I am in the middle of rolling out a video conferencing solution with the existing QoS config I am experiencing a noticeable delay between audio and video. Example like during a video call I can tell that the voice and the lips of the person speaking are not in synch.
    Has anyone run into this issue ? can someone provide me a sample QoS config for the 6509 and 3560/3750 switches ?
    P.S. I am using a Tandberg/Codian solution for video conferencing with Tandberg/Codian MCU, IP Gateway, ISDN Gateway and Tandberg endpoints. And both the endpoints and the back-end infrastructure devices and are set for IP Precedence 5.
    Thank you very much in advance !!!
    Danny

    The main concern with configuring your back-end infrastructure devices with IP Precedence value 5 is that the 3560/3750 auto-qos will map this value to Q1 which is ordinarily the strict priority Q.
    In most cases auto-qos will also configure or map Video to Q3, you can see this as a majority SRR bandwidth is assigned to the Q.
    In order to use the strict priority queue, it has to be enabled on the interface 'priority-queue out', without it Q1 will not be emptied before the others. It will be serviced according to the weight.
    With auto-qos Q1 will not have enough bandwidth as it will be assigned to Q3. Therefore you could initially enable priority-queue if not already enabled so that Q1 is emptied first, or you increase the weight.
    The next question is whether you are using egress scheduling within the Core? and this conforms to your edge classification for Video?
    HTH.
    Allan

  • VoIP QoS for Site-to-Site Tunnel

    Hi all,
    I need some help with setting up QoS for VoIP between two Cisco ASA 5505 with Site-to-Site VPN.
    There is no need for bandwith reservation, only DSCP 46 (EF) should be highest and DSCP 26 second highest queue and the rules should only apply to a site-to-site VPN.
    Usually i try to configure the ASAs via ASDM and found out in the Cisco Documentations how to setup QoS for the DSCP bits with a Service Policy and how to set up QoS for a Site-to-Site VPN (Service Policy Rule -> Traffic Match). But how do i configure the QoS for a DSCP bit to only apply to a Site-to-Site Tunnel? And how do i configure different priorities for the two DSCP bits, is this defined by the order of Service Policies?
    The QoS has to be enabled on both ASAs for the inside interface?
    Thanks in advance
    Tobias

    Hi Collin,
    ok so from the document i think this has to be added on both ASAs to prioritize DSCP 46. Could you have a quick look if this is all i need?
    class-map voice_traffic
    match dscp ef
    class-map data
    match tunnel-group <Tunnel Name>
    match flow ip destination-address
    policy-map voice_policy
    class voice_traffic
      priority
    class Data
     police output 200000 37500
    service-policy voice_policy interface outside
    But there is still the question how two configure another DSCP bit for priority 2, I could not find out how this is done, neither CLI nor ASDM. Any ideas?
    BR
    Tobias

  • To configure a QoS for the attached topolgy

    Dear friends,
    I have to configure QoS for the attached topology with the following requirements, can any one please help me to do the same.
    The minimum requirements are that 4 simultaneous VoIP calls need to be supported across the backbone, as well as a dedicated 10MBs of http traffic. Of the remainder of the bandwidth ftp traffic should be given a high priority. Make sure routing protocols are given a suitable priority level.
    Thanks and expecting replies

    Here are some questions that you'll need to answer, to get started.
    What does the HTTP requirement mean? It is not possible to get 10 Megabytes per second on a 1.544 Megabit per second line.
    What voice codec will be used on the IP Phones? This will determine how much bandwidth you need to allocate.
    Next, read the following link:
    http://www.cisco.com/en/US/docs/ios/qos/configuration/guide/12_4t/qos_12_4t_book.html
    It's all in there. Unfortunately, it's a big topic, so there is a lot there.

  • QoS for IPTV WS-C4948E / WS-C6506-E / WS-C2960S-48LPS-L

    I need your help to understand how best to apply QoS settings to an IPTV service. 
    Service is delivered by ISP Router -> 4948E -> WS-C6506-E -> WS-C2960S-48LPS-L
    I prepared this template, but I think this does not run.
    I have questions about enabling qos in WS-C4948E and WS-C6506-E, And if it requires something extra.
    I hope your support...
    Best Regards! 
    Joan Rozas
    (Attachment Topology).
    Sw_Serv_C4948-1_Dehesa
    ip access-list extended ACL_IPTV
      permit ip 10.1.154.0 0.0.0.255 any
    class-map CLASS_IPTV
     match access-group name ACL_IPTV
    policy-map setDSCP
     description Mark DSCP values for ingress traffic
     class CLASS_IPTV
       set dscp cs5
    int G1/5
     service-policy input setDSCP
    int po5
     mls qos trust dscp
    VSS_DEHESA
    int po241
     mls qos trust dscp
    int po301
     mls qos trust dscp
    SW_ACC_P_4B_DEHESA
    mls qos
    int po5
     mls qos trust dscp
    int G1/0/35
     mls qos trust dscp

    I met similiar problem on C4500.
    Try to remove etherchannel configuration by taking ports to it's defaults and also interface Port-channel68.
    Then create port channel interface by first issuing :
    interface GigabitEthernet1/3/10
     description SAC88
     channel-group 68 mode active
    interface GigabitEthernet2/3/10
      description ECM DELEJ02SAC88-D20
      channel-group 68 mode active
    Then configure all stuff around switchport under interface Port-channel68.

  • Per session QoS for LNS

    We have some LNSs running 12.4 SP Services, running with the following config (qos specific lines and currently not working):
    class-map match-all voice-signaling
    match access-group 101
    class-map match-all voice-traffic
    match access-group 102
    policy-map sub-policy
    class voice-traffic
    priority 240
    class voice-signaling
    bandwidth 16
    policy-map XXX_qos-voice
    class class-default
    shape average 256000
    fair-queue
    service-policy sub-policy
    interface Virtual-Template1
    ip unnumbered Loopback0
    ip mroute-cache
    no peer default ip address
    ppp authentication chap
    no clns route-cache
    access-list 101 remark -- SCCP/H323/MGCP/SIP --
    access-list 101 permit tcp any any range 2000 2002
    access-list 101 permit tcp any any eq 1720
    access-list 101 permit tcp any any range 11000 11999
    access-list 101 permit udp any any eq 2427
    access-list 101 permit udp any any eq 4569
    access-list 101 permit udp any any eq 5036
    access-list 101 permit udp any any eq 5060
    access-list 102 remark -- RTP Traffic --
    access-list 102 permit udp any any range 16384 32767
    in the feature set for the IOS currently running it suggests this configuration should work, however it will not apply the policy via the Cisco-AVPair command (the command is visible via the debug AAA per user so radius is working, even when we test it by applying the service-policy to the actual virtual-template it errors saying it will only work on an MPL bundle. From what I have read it is suggested that even though this feature is supposed to work, it does not in practice and an upgrade to a feature set which includes QoS:per session shaping and queueing on LNS is needed.
    If anyone has any experience of the or has any suggestion of if we can achieve our QoS for voice per session with the current IOS that would be great.

    This feature is not related to the NPE type. This feature is performance impacting so you should do some tests to see if your NPE-400 can support the number of L2TP tunnels you want with this feature enabled. If it's not the case, you will have to upgrade your NPE.
    HTH
    Laurent.

  • RV110W Blocks all inbound traffic

    I have a RV110W that's been in service since Dec 2012. All Everything is working fine except every month or so the firewall starts blocking all inbound traffic. It does not respond to remote management access. If I reboot the firewall (pwr off/on) everything works correctly for the next month or so and then it begins blocking all inbound traffic again. Local access to the Internet and VPN tunneling are not affected. When it's working, all my rules and port forwarding work correctly. Anybody seen this before?

    Hi David,
    Please call the Small Business Support Center and speak with an engineer. The phone numbers for the support center is located here: https://www.cisco.com/en/US/support/tsd_cisco_small_business_support_center_contacts.html
    Regards,
    Cindy Toy
    Cisco Small Business Community Manager
    for Cisco Small Business Products
    www.cisco.com/go/smallbizsupport
    twitter: CiscoSBsupport

  • Inbound traffic alert (ESET) - Application: System

    I have a MacBook Pro (Retina, 15-inch, Mid 2014) running OS X Yosemite 10.10.2
    I have installed ESET Cyber Security Pro a while ago, and an inbound traffic alert just popped up. "A remote computer is attempting to communicate with an application running on this computer. Do you wish to allow this communication?"
    The application involved is "System", local port is TCP 8770. The remote computer is fe80::4c8d:97ff:feb4:5d8d, remote port is 56398.
    I am still new to Mac, and therefore I'm not sure if I should allow or block. I thought that it might be system updates, but not too sure about that so I'd rather wait for an answer before proceeding.

    Port 8770 is used for the Digital Photo Access Protocol, which in the case of a Mac means sharing of photos. I'm not sure exactly how this port is used in Yosemite, but you can bet this is just another Mac or iOS device on your local network querying your Mac to see if it is sharing any photos. It is very unlikely that you have a network configuration that would even allow a truly "remote" computer to connect to yours over the internet.
    ESET is wasting your time here. Uninstall it, and see my Mac Malware Guide for more information about protecting yourself from malware.
    (Fair disclosure: I may receive compensation from links to my sites, TheSafeMac.com and AdwareMedic.com.)

  • Nexus1000v local SPAN can't capture inbound traffic

    hi all,
    I just configured local SPAN on nexus1000v (version 1.3d).
    local SPAN source and destination is on same VEM.
    my config is like below:
    monitor session 3
      source interface Vethernet13 both
      destination interface Vethernet170
      destination interface Vethernet36
      no shut
    SPAN session is up.
    But we can't see any inbound traffic to the source VM.
    (10.16.185.4,5,6 is the IPs of SPAN source)
    [root@davidzhangRHEL ~]# tcpdump -i eth1
    tcpdump: WARNING: eth1: no IPv4 address assigned
    tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
    listening on eth1, link-type EN10MB (Ethernet), capture size 96 bytes
    11:46:07.644551 IP 10.16.185.3.hsrp > 224.0.0.2.hsrp: HSRPv0-hello 20: state=sta                                                ndby group=1 addr=10.16.185.1
    11:46:07.654771 IP 10.16.185.2.hsrp > 224.0.0.2.hsrp: HSRPv0-hello 20: state=act                                                ive group=1 addr=10.16.185.1
    11:46:07.961735 IP 10.16.185.6.https > 10.16.184.196.50254: S 3897896960:3897896                                                960(0) ack 1838046824 win 8192 <mss 1460,nop,wscale 8,sackOK,timestamp 74329579                                                 2654766205>
    11:46:07.962955 IP 10.16.185.6.https > 10.16.184.196.50254: R 1:1(0) ack 2 win 0
    11:46:10.644950 IP 10.16.185.3.hsrp > 224.0.0.2.hsrp: HSRPv0-hello 20: state=sta                                                ndby group=1 addr=10.16.185.1
    11:46:10.657615 IP 10.16.185.2.hsrp > 224.0.0.2.hsrp: HSRPv0-hello 20: state=act                                                ive group=1 addr=10.16.185.1
    11:46:11.081231 IP 10.16.185.5.https > 10.16.184.197.58538: S 1850399261:1850399                                                261(0) ack 3055844595 win 8192 <mss 1460,nop,wscale 8,sackOK,timestamp 74329891                                                 2654662655>
    11:46:11.081970 IP 10.16.185.5.https > 10.16.184.197.58538: R 1:1(0) ack 2 win 0
    11:46:11.957381 IP 10.16.185.5.https > 10.16.184.196.42161: S 1862096740:1862096                                                740(0) ack 970410175 win 8192 <mss 1460,nop,wscale 8,sackOK,timestamp 74329978 2                                                654770202>
    11:46:11.958705 IP 10.16.185.5.https > 10.16.184.196.42161: R 1:1(0) ack 2 win 0
    11:46:12.089401 IP 10.16.185.6.https > 10.16.184.197.45604: S 2733719434:2733719                                                434(0) ack 3290215780 win 8192 <mss 1460,nop,wscale 8,sackOK,timestamp 74329992                                                 2654663683>
    11:46:12.090735 IP 10.16.185.6.https > 10.16.184.197.45604: R 1:1(0) ack 2 win 0
    11:46:12.956018 IP 10.16.185.6.https > 10.16.184.196.50302: S 2275642708:2275642                                                708(0) ack 3286673454 win 8192 <mss 1460,nop,wscale 8,sackOK,timestamp 74330078                                                 2654771200>
    11:46:12.956838 IP 10.16.185.6.https > 10.16.184.196.50302: R 1:1(0) ack 2 win 0
    11:46:13.552716 IP 10.16.185.4.61913 > 10.2.222.111.5723: P 3867141198:386714222                                                3(1025) ack 4146771556 win 508
    11:46:13.645770 IP 10.16.185.3.hsrp > 224.0.0.2.hsrp: HSRPv0-hello 20: state=sta                                                ndby group=1 addr=10.16.185.1
    11:46:13.654427 IP 10.16.185.2.hsrp > 224.0.0.2.hsrp: HSRPv0-hello 20: state=act                                                ive group=1 addr=10.16.185.1
    11:46:13.817143 IP 10.16.185.4.61913 > 10.2.222.111.5723: . ack 180 win 508
    1000v# module vem 12 execute vemcmd show span
    VEM SOURCE IP NOT CONFIGURED.
    HW SSN ID            DST LTL/IP  ERSPAN ID  HDR VER
            0                    68      local
    1000v# show monitor internal errors
    1) Event:E_DEBUG, length:96, at 163774 usecs after Thu Sep 22 15:12:17 2011
        [102] eth_span_phy_if_init_runtime_info(1051): im_get_ifindex_span_mode_list returned 0x40e30005
    2) Event:E_DEBUG, length:96, at 684704 usecs after Thu Sep 22 15:12:04 2011
        [102] eth_span_phy_if_init_runtime_info(1051): im_get_ifindex_span_mode_list returned 0x40e30005
    anybody any suggestion. Your help is highly appreciated.

    Hi Michael,
    Thanks. You are correct. We are able to see outbound traffic from SPAN source but not inbound traffic to SPAN source.
    Note: I have done vmotion for the SPAN source and SPAN destination virtual machines.
    Please see the below output which you requested.
    1000v# show monitor session 1
       session 1
    type              : local
    state             : up
    source intf       :
        rx            : Veth13
        tx            : Veth13
        both          : Veth13
    source VLANs      :
        rx            :
        tx            :
        both          :
    filter VLANs      : filter not specified
    destination ports : Veth170   Veth36
    1000v#
    show monitor internal info session 1
    Session 1 info:
    FSM state: SESSION_STATE_OPER_ACTIVE
    State reason: 0
    *** ADMIN DATA ***
    Session state: NO SHUT
    Ingress sources
    phy if: Veth13
    port ch:
    vlans:
    Egress sources
    phy if: Veth13
    port ch:
    vlans:
    Destinations:
    Veth170, Veth36
    PSS source list:
    Veth13
    PSS destination list:
    Veth170, Veth36
    *** RUNTIME DATA ***
    hw_ssn_id: 0
    destination index: 0x4fa3 (multicast di)
    oper rx: Veth13
    oper tx: Veth13
    oper dest: Veth170, Veth36
    oper dest for di: Veth170, Veth36
    programmed rx: Veth13
    programmed tx: Veth13
    programmed dest: Veth170, Veth36
    programmed dest for di: Veth170, Veth36
    programmed filter rx:1500
    programmed filter tx:
    Lock Info: resource [Session ID(0x1)]
      type[0] p_gwrap[(nil)]
          FREE @ 97236 usecs after Sun Sep 25 12:14:25 2011
      type[1] p_gwrap[(nil)]
          FREE @ 580143 usecs after Tue Sep 27 01:53:06 2011
      type[2] p_gwrap[(nil)]
          FREE @ 520203 usecs after Sun Sep 25 12:48:23 2011
    0x1
    Use lock event history for more details
    1000v# terminal length 0
    1000v# show monitor internal info interface vethernet 13
    Interface info:
    if_index: 1c0000c0
    source for ssn 1, src_dir 3
    state: up
    layer: 2
    mode: access
    Access vlan: 1500
    Interface is not in switchport monitor mode
    No Entries in SDB for if_index 0x1c0000c0
    1000v# show monitor internal info interface vethernet 36
    Interface info:
    if_index: 1c000230
    destination for ssn 1
    state: up
    layer: 2
    mode: access
    Access vlan: 1500
    Interface is not in switchport monitor mode
    The port is MISCONFIGURED, being not span destination but used as such
    No Entries in SDB for if_index 0x1c000230
    1000v# show monitor internal info interface vethernet 170
    Interface info:
    if_index: 1c000a90
    destination for ssn 1
    state: up
    layer: 2
    mode: access
    Access vlan: 1500
    Interface is not in switchport monitor mode
    The port is MISCONFIGURED, being not span destination but used as such
    No Entries in SDB for if_index 0x1c000a90
    1000v# show interface virtual | egrep "(13|36|170)"
    Veth13      Net Adapter 1  VM451             11  esx905
    Veth36      Net Adapter 4  VM510             11  esx905
    Veth113     Net Adapter 2  VM808             12  esx902
    Veth130     Net Adapter 1  VMSDE449          12  esx902
    Veth131     Net Adapter 3  VM809             10  esx904
    Veth132     Net Adapter 2  VMSDE449          12  esx902
    Veth134     Net Adapter 2  VM510             11  esx905
    Veth135     Net Adapter 2  VM511             8   esx901
    Veth136     Net Adapter 2  VM465             9   esx903
    Veth137     Net Adapter 1  VM472             11  esx905
    Veth138     Net Adapter 3  VM470             10  esx904
    Veth139     Net Adapter 3  VM472             11  esx905
    Veth151     Net Adapter 1  VMSDE436          11  esx905
    Veth152     Net Adapter 2  VMSDE436          11  esx905
    Veth170     Net Adapter 2  RHEL5             11  esx905
    1000v# module vem 11 execute vemcmd show port
      LTL    IfIndex   Vlan    Bndl  SG_ID Pinned_SGID  Type  Admin State  CBL Mode   Name
        8          0   3969       0     32          32  VIRT     UP    UP    4 Access
        9          0   3969       0     32          32  VIRT     UP    UP    4 Access
       10          0   1513       0     32           7  VIRT     UP    UP    4 Access
       11          0   3968       0     32          32  VIRT     UP    UP    4 Access
       12          0   1514       0     32           8  VIRT     UP    UP    4 Access
       13          0      1       0     32          32  VIRT     UP    UP    0 Access
       14          0   3971       0     32          32  VIRT     UP    UP    4 Access
       15          0   3971       0     32          32  VIRT     UP    UP    4 Access
       16   1a0a0000   1600 T   307      0          32  PHYS     UP    UP    4  Trunk vmnic0
       18   1a0a0200    616 T   306      2          32  PHYS     UP    UP    4  Trunk vmnic2
       19   1a0a0300      1 T   305      3          32  PHYS     UP    UP    1  Trunk vmnic3
       20   1a0a0400      1 T   305      4          32  PHYS     UP    UP    1  Trunk vmnic4
       21   1a0a0500   1600 T   307      5          32  PHYS     UP    UP    4  Trunk vmnic5
       23   1a0a0700      1 T   304      7          32  PHYS     UP    UP    1  Trunk vmnic7
       24   1a0a0800      1 T   304      8          32  PHYS     UP    UP    1  Trunk vmnic8
       25   1a0a0900    616 T   306      9          32  PHYS     UP    UP    4  Trunk vmnic9
       48   1b0a0000   1500       0     32           3  VIRT     UP    UP    4 Access VM510 ethernet3
       49   1b0a0010    620       0     32           9  VIRT     UP    UP    4 Access VM510 ethernet2
            pvlan isolated 616 620
       50   1b0a0020   1500       0     32           4  VIRT     UP    UP    4 Access VM510 ethernet1
       51   1b0a0030   1620       0     32           0  VIRT     UP    UP    4 Access VM480 ethernet2
            pvlan isolated 1600 1620
       52   1b0a0040    620       0     32           2  VIRT     UP    UP    4 Access VM480 ethernet1
            pvlan isolated 616 620
       53   1b0a0050   1502       0     32           3  VIRT     UP    UP    4 Access VM480 ethernet0
       54   1b0a0060   1509       0     32           4  VIRT     UP    UP    4 Access fiserv-f5 ethernet2
       55   1b0a0070    620       0     32           9  VIRT     UP    UP    4 Access fiserv-f5 ethernet1
            pvlan isolated 616 620
       56   1b0a0080   1512       0     32           7  VIRT     UP    UP    4 Access fiserv-f5.eth0
       57   1b0a0090   1620       0     32           5  VIRT     UP    UP    4 Access VM459 ethernet2
            pvlan isolated 1600 1620
       58   1b0a00a0    620       0     32           2  VIRT     UP    UP    4 Access VM459 ethernet1
            pvlan isolated 616 620
       59   1b0a00b0   1501       0     32           3  VIRT     UP    UP    4 Access VM459 ethernet0
       60   1b0a00c0    620       0     32           2  VIRT     UP    UP    4 Access VM476 ethernet2
            pvlan isolated 616 620
       61   1b0a00d0   1501       0     32           4  VIRT     UP    UP    4 Access VM476 ethernet1
       62   1b0a00e0   1620       0     32           0  VIRT     UP    UP    4 Access VM476 ethernet0
            pvlan isolated 1600 1620
       63   1b0a00f0    620       0     32           2  VIRT     UP    UP    4 Access VM451 ethernet3
            pvlan isolated 616 620
       64   1b0a0100   1620       0     32           5  VIRT     UP    UP    4 Access VM451 ethernet2
            pvlan isolated 1600 1620
       65   1b0a0110   1500       0     32           3  VIRT     UP    UP    4 Access VM451 ethernet0
       66   1b0a0120   1620       0     32           0  VIRT     UP    UP    4 Access VMSDE440 ethernet1
            pvlan isolated 1600 1620
       67   1b0a0130   1508       0     32           4  VIRT     UP    UP    4 Access VMSDE440 ethernet0
       68   1b0a0140   1509       0     32           3  VIRT     UP    UP    4 Access VM501 ethernet0
       72   1b0a0180   1620       0     32           0  VIRT     UP    UP    4 Access VMSDE436 ethernet1
            pvlan isolated 1600 1620
       73   1b0a0190   1508       0     32           3  VIRT     UP    UP    4 Access VMSDE436 ethernet0
       74   1b0a01a0    620       0     32           2  VIRT     UP    UP    4 Access VM477 ethernet3
            pvlan isolated 616 620
       75   1b0a01b0   1620       0     32           5  VIRT     UP    UP    4 Access VM477 ethernet1
            pvlan isolated 1600 1620
       76   1b0a01c0   1501       0     32           3  VIRT     UP    UP    4 Access VM477 ethernet0
       77   1b0a01d0   1620       0     32           0  VIRT     UP    UP    4 Access VMSDE434 ethernet1
            pvlan isolated 1600 1620
       78   1b0a01e0   1508       0     32           4  VIRT     UP    UP    4 Access VMSDE434 ethernet0
       79   1b0a01f0   1620       0     32           5  VIRT     UP    UP    4 Access VM454 ethernet3
            pvlan isolated 1600 1620
       80   1b0a0200    620       0     32           9  VIRT     UP    UP    4 Access VM454 ethernet2
            pvlan isolated 616 620
       81   1b0a0210   1501       0     32           4  VIRT     UP    UP    4 Access VM454 ethernet0
       82   1b0a0220   1620       0     32           0  VIRT     UP    UP    4 Access VM815 ethernet1
            pvlan isolated 1600 1620
       83   1b0a0230   1507       0     32           3  VIRT     UP    UP    4 Access VM815 ethernet0
       87   1b0a0270   1620       0     32           0  VIRT     UP    UP    4 Access VMSDE405 ethernet1
            pvlan isolated 1600 1620
       88   1b0a0280   1509       0     32           3  VIRT     UP    UP    4 Access VMSDE405 ethernet0
       89   1b0a0290   1620       0     32           5  VIRT     UP    UP    4 Access VMSDE424 ethernet1
            pvlan isolated 1600 1620
       90   1b0a02a0   1509       0     32           3  VIRT     UP    UP    4 Access VMSDE424 ethernet0
       91   1b0a02b0    620       0     32           9  VIRT     UP    UP    4 Access VM472 ethernet2
            pvlan isolated 616 620
       92   1b0a02c0   1620       0     32           0  VIRT     UP    UP    4 Access VM472 ethernet1
            pvlan isolated 1600 1620
       93   1b0a02d0   1500       0     32           4  VIRT     UP    UP    4 Access VM472 ethernet0
       94   1b0a02e0   1508       0     32           4  VIRT     UP    UP    4 Access VMSDE431 ethernet1
       95   1b0a02f0   1620       0     32           5  VIRT     UP    UP    4 Access VMSDE431 ethernet0
            pvlan isolated 1600 1620
       96   1b0a0300   1620       0     32           0  VIRT     UP    UP    4 Access VM496 ethernet2
            pvlan isolated 1600 1620
       97   1b0a0310   1501       0     32           3  VIRT     UP    UP    4 Access VM496 ethernet1
       98   1b0a0320   1500       0     32           4  VIRT     UP    UP    4 Access VM496 ethernet0
       99   1b0a0330   1620       0     32           5  VIRT     UP    UP    4 Access VM510 ethernet0
            pvlan isolated 1600 1620
      100   1b0a0340   1500       0     32           4  VIRT     UP    UP    4 Access RHEL5 ethernet1
      101   1b0a0350   1512       0     32           8  VIRT     UP    UP    4 Access RHEL5.eth0
      102   1b0a0360   1620       0     32           0  VIRT     UP    UP    4 Access VM452 ethernet3
            pvlan isolated 1600 1620
      103   1b0a0370    620       0     32           2  VIRT     UP    UP    4 Access VM452 ethernet2
            pvlan isolated 616 620
      104   1b0a0380   1500       0     32           3  VIRT     UP    UP    4 Access VM452 ethernet0
      304   16000028      1 T     0     32          32  VIRT     UP    UP    1  Trunk
      305   16000029      1 T     0     32          32  VIRT     UP    UP    1  Trunk
      306   1600002a    616 T     0     32          32  VIRT     UP    UP    4  Trunk
      307   1600002b   1600 T     0     32          32  VIRT     UP    UP    4  Trunk
    1000v# module vem 11 execute vemcmd show span
    VEM SOURCE IP NOT CONFIGURED.
    HW SSN ID            DST LTL/IP  ERSPAN ID  HDR VER
            0                  4408      local
    1000v#

  • QOS on WAN traffic

    Can anyone help on this below configuration
    Platinum (According to real time class)   
    Voice RTP
    Gold (40% of remaining)
    Voice signalling
    Citrix
    Video conferencing
    Silver (20% of remaining)
    Notes
    Internet browsing
    Bronze (10% of remaining)
    SNMP
    TFTP   
    Best effort   
    Other   

    Ed,
    That is right. QOS and bandwidth profile functionality is for outbound traffic and traffic over VPN, and using QOS you should be able to limit bandwidth for outbound traffic and traffic over Site-to-Site VPN.
    Thanks,
    Nitin

  • AutoQoS for voice traffic settings?

    Hi Everybody, 
    I have enabled auto qos on switch and following are information
    Voice is the most important traffic in network, must ensure voice traffic goes first
    SW# show mls qos map dscp-output-q
       Dscp-outputq-threshold map:
         d1 :d2    0     1     2     3     4     5     6     7     8     9
          0 :    04-03 04-03 04-03 04-03 04-03 04-03 04-03 04-03 04-01 04-02
          1 :    04-02 04-02 04-02 04-02 04-02 04-02 03-03 03-03 03-03 03-03
          2 :    03-03 03-03 03-03 03-03 02-03 02-03 02-03 02-03 02-03 02-03
          3 :    02-03 02-03 03-03 03-03 03-03 03-03 03-03 03-03 03-03 03-03
          4 :    01-03 01-03 01-03 01-03 01-03 01-03 01-03 01-03 02-03 02-03
          5 :    02-03 02-03 02-03 02-03 02-03 02-03 02-03 02-03 02-03 02-03
          6 :    02-03 02-03 02-03 02-03
    SW# show mls qos queue-set
    Queueset: 1
    Queue     :       1       2       3       4
    buffers   :      10      10      26      54
    threshold1:     138     138      36      20
    threshold2:     138     138      77      50
    reserved  :      92      92     100      67
    maximum   :     138     400     318     400
    For the 
    DSCP 46 : it's 01-03 (voice)
    DSCP 0 : it's 04-03 (general traffic)
    From my understanding 
    - 01-03 means queue 1 and threshold3. (by default threshold3 is 100 and hidden)
    - queue-set 1 is enabled by default on all interface and hidden
    According to the above information, 
    - Does the Auto Qos is design for voice goes first?
    - Why the Q1 buffer and maximum are less then Q4? isn't suppose to set more buffer on Q1 for voice traffic? or I have to re-distribute the queue buffer and threshold, etc...
    - or I just use priority-queue out, then those queue setting will be ignored?
    Thanks in advance
    Sam

    udp ports 16384 to 32767 for rtp traffic
    1720 tcp for control (h323 protocol)

  • VLAN prioritization for SAN traffic

    I have a stack of 3750's running two VLANs, one for NFS traffic (id 130) and one for iSCSI traffic (id 150). I have jumbo framing (MTU 9000) on VLAN 150. I'd like to try prioritizing the iSCSI traffic using 802.1p. Can anyone point me to some configuration help? Does anyone have any thoughts or experiences with this idea? Thanks!

    The MDS GE/iSCSI interface can set the DSCP value on outbound IP packets, but that is in the IP header (layer 3). From what I recall, the 802.1p bits are in the Layer 2 field between the MAC addresses and the Ethernet type, and from what I understand, the MDS does not provide any marking at that level.
    You could mark via 802.1p inbound on the Ethernet Switch that the MDS GE port is attached to, but not directly out of the MDS GE port.
    If you are interested in marking iSCSI using DSCP, here is web page describing how you set the iSCSI interface for the desired DSCP value.
    Hope this helps,
    Mike

Maybe you are looking for