العرس الجماعي الماروني | Maronite League

QoS and Zoom/Teams

Hi All,
Just looking for some advice here. I'm trying to setup a router for a friend who needs to prioritize all zoom and teams traffic over other traffic on the networks. We are trying to make sure that business calls on Zoom/Teams are not impacted by other downloads or uploads on the network. I have the below configured in Queues and Mangle. I'm looking for someone to confirm that this is the right way to achieve this, and also if you don't mind running your eyes over the config so I can be sure it's working as expected. It's really hard to test this by myself to generate enough traffic and see if it will impact a zoom call haha. His connection is 50M/10M DSL.

/queue tree
add comment="Download Tree (50M)" max-limit=100M name=QoS_Global_DL parent=\
global queue=default
add limit-at=256k max-limit=50M name="queue1 (service traffic)" packet-mark=\
prio_1_dl parent=QoS_Global_DL priority=1 queue=default
add limit-at=3M max-limit=50M name="queue2 (VoIP Apps)" packet-mark=\
prio_2_dl parent=QoS_Global_DL priority=2 queue=default
add limit-at=512k max-limit=50M name="queue3 (Remote Access)" packet-mark=\
prio_3_dl parent=QoS_Global_DL priority=3 queue=default
add limit-at=4M max-limit=50M name="queue4 (WEB Traffic)" packet-mark=\
prio_4_dl parent=QoS_Global_DL priority=4 queue=default
add limit-at=2500k max-limit=50M name="queue5 other" packet-mark=no-mark \
parent=QoS_Global_DL priority=5 queue=default
add comment="Upload Tree (10M)" max-limit=10M name=QoS_Global_UL parent=\
global queue=default
add limit-at=1M max-limit=10M name="queue6 (Service & WEB traffic)" \
packet-mark=prio_1_ul parent=QoS_Global_UL priority=1 queue=default
add limit-at=9M max-limit=10M name="queue7 (VoIP Apps)" packet-mark=prio_2_ul \
parent=QoS_Global_UL priority=2 queue=default
add limit-at=5M max-limit=10M name="queue8 (Remote Access)" packet-mark=\
prio_3_ul parent=QoS_Global_UL priority=3 queue=default

/ip firewall address-list
add address=3.7.35.0/25 list=Zoom
add address=3.21.137.128/25 list=Zoom
add address=3.22.11.0/24 list=Zoom
add address=3.23.93.0/24 list=Zoom
add address=3.25.41.128/25 list=Zoom
add address=3.25.42.0/25 list=Zoom
add address=3.25.49.0/24 list=Zoom
add address=3.80.20.128/25 list=Zoom
add address=3.96.19.0/24 list=Zoom
add address=3.101.32.128/25 list=Zoom
add address=3.101.52.0/25 list=Zoom
add address=3.104.34.128/25 list=Zoom
add address=3.120.121.0/25 list=Zoom
add address=3.127.194.128/25 list=Zoom
add address=3.208.72.0/25 list=Zoom
add address=3.211.241.0/25 list=Zoom
add address=3.235.69.0/25 list=Zoom
add address=3.235.82.0/23 list=Zoom
add address=3.235.71.128/25 list=Zoom
add address=3.235.72.128/25 list=Zoom
add address=3.235.73.0/25 list=Zoom
add address=3.235.96.0/23 list=Zoom
add address=4.34.125.128/25 list=Zoom
add address=4.35.64.128/25 list=Zoom
add address=8.5.128.0/23 list=Zoom
add address=13.52.6.128/25 list=Zoom
add address=13.52.146.0/25 list=Zoom
add address=18.157.88.0/24 list=Zoom
add address=18.205.93.128/25 list=Zoom
add address=50.239.202.0/23 list=Zoom
add address=50.239.204.0/24 list=Zoom
add address=52.61.100.128/25 list=Zoom
add address=52.81.151.128/25 list=Zoom
add address=52.81.215.0/24 list=Zoom
add address=52.202.62.192/26 list=Zoom
add address=52.215.168.0/25 list=Zoom
add address=64.125.62.0/24 list=Zoom
add address=64.211.144.0/24 list=Zoom
add address=65.39.152.0/24 list=Zoom
add address=69.174.57.0/24 list=Zoom
add address=69.174.108.0/22 list=Zoom
add address=99.79.20.0/25 list=Zoom
add address=101.36.167.0/24 list=Zoom
add address=103.122.166.0/23 list=Zoom
add address=111.33.115.0/25 list=Zoom
add address=111.33.181.0/25 list=Zoom
add address=115.110.154.192/26 list=Zoom
add address=115.114.56.192/26 list=Zoom
add address=115.114.115.0/26 list=Zoom
add address=115.114.131.0/26 list=Zoom
add address=120.29.148.0/24 list=Zoom
add address=129.151.0.0/19 list=Zoom
add address=129.151.40.0/22 list=Zoom
add address=129.151.48.0/20 list=Zoom
add address=129.159.0.0/20 list=Zoom
add address=129.159.160.0/19 list=Zoom
add address=129.159.208.0/20 list=Zoom
add address=130.61.164.0/22 list=Zoom
add address=134.224.0.0/16 list=Zoom
add address=140.238.128.0/24 list=Zoom
add address=140.238.232.0/22 list=Zoom
add address=144.195.0.0/16 list=Zoom
add address=147.124.96.0/19 list=Zoom
add address=149.137.0.0/17 list=Zoom
add address=152.67.20.0/24 list=Zoom
add address=152.67.118.0/24 list=Zoom
add address=152.67.152.0/21 list=Zoom
add address=152.67.168.0/22 list=Zoom
add address=152.67.180.0/24 list=Zoom
add address=152.67.184.0/22 list=Zoom
add address=152.67.240.0/21 list=Zoom
add address=158.101.64.0/24 list=Zoom
add address=158.101.184.0/22 list=Zoom
add address=160.1.56.128/25 list=Zoom
add address=161.189.199.0/25 list=Zoom
add address=161.199.136.0/22 list=Zoom
add address=162.12.232.0/22 list=Zoom
add address=162.255.36.0/22 list=Zoom
add address=165.254.88.0/23 list=Zoom
add address=168.138.16.0/22 list=Zoom
add address=168.138.48.0/24 list=Zoom
add address=168.138.56.0/21 list=Zoom
add address=168.138.72.0/24 list=Zoom
add address=168.138.74.0/25 list=Zoom
add address=168.138.80.0/21 list=Zoom
add address=168.138.96.0/22 list=Zoom
add address=168.138.116.0/22 list=Zoom
add address=168.138.244.0/24 list=Zoom
add address=170.114.0.0/16 list=Zoom
add address=173.231.80.0/20 list=Zoom
add address=192.204.12.0/22 list=Zoom
add address=193.122.16.0/20 list=Zoom
add address=193.122.32.0/20 list=Zoom
add address=193.122.208.0/20 list=Zoom
add address=193.122.224.0/20 list=Zoom
add address=193.122.240.0/20 list=Zoom
add address=193.123.0.0/19 list=Zoom
add address=193.123.40.0/21 list=Zoom
add address=193.123.176.0/20 list=Zoom
add address=193.123.128.0/19 list=Zoom
add address=193.123.168.0/21 list=Zoom
add address=193.123.192.0/19 list=Zoom
add address=198.251.128.0/17 list=Zoom
add address=202.177.207.128/27 list=Zoom
add address=204.80.104.0/21 list=Zoom
add address=204.141.28.0/22 list=Zoom
add address=207.226.132.0/24 list=Zoom
add address=209.9.211.0/24 list=Zoom
add address=209.9.215.0/24 list=Zoom
add address=213.19.144.0/24 list=Zoom
add address=213.19.153.0/24 list=Zoom
add address=213.244.140.0/24 list=Zoom
add address=221.122.88.64/27 list=Zoom
add address=221.122.88.128/25 list=Zoom
add address=221.122.89.128/25 list=Zoom
add address=221.123.139.192/27 list=Zoom
add address=13.107.64.0/18 list=Teams
add address=52.112.0.0/14 list=Teams
add address=15.220.80.0/24 list=Zoom
add address=15.220.81.0/25 list=Zoom
add address=18.254.23.128/25 list=Zoom
add address=18.254.61.0/25 list=Zoom
add address=20.203.158.80/28 list=Zoom
add address=20.203.190.192/26 list=Zoom
add address=64.224.32.0/19 list=Zoom
add address=101.36.170.0/23 list=Zoom
add address=129.151.1.128/27 list=Zoom
add address=129.151.1.192/27 list=Zoom
add address=129.151.2.0/27 list=Zoom
add address=129.151.3.160/27 list=Zoom
add address=129.151.7.96/27 list=Zoom
add address=129.151.11.64/27 list=Zoom
add address=129.151.11.128/27 list=Zoom
add address=129.151.12.0/27 list=Zoom
add address=129.151.13.64/27 list=Zoom
add address=129.151.15.224/27 list=Zoom
add address=129.151.16.0/27 list=Zoom
add address=129.151.31.224/27 list=Zoom
add address=129.151.40.0/25 list=Zoom
add address=129.151.40.160/27 list=Zoom
add address=129.151.40.192/27 list=Zoom
add address=129.151.41.0/25 list=Zoom
add address=129.151.41.192/26 list=Zoom
add address=129.151.42.0/27 list=Zoom
add address=129.151.42.64/27 list=Zoom
add address=129.151.42.128/26 list=Zoom
add address=129.151.42.224/27 list=Zoom
add address=129.151.43.0/27 list=Zoom
add address=129.151.43.64/26 list=Zoom
add address=129.151.48.0/27 list=Zoom
add address=129.151.48.160/27 list=Zoom
add address=129.151.49.0/26 list=Zoom
add address=129.151.49.96/27 list=Zoom
add address=129.151.49.128/27 list=Zoom
add address=129.151.49.192/26 list=Zoom
add address=129.151.50.0/27 list=Zoom
add address=129.151.50.64/27 list=Zoom
add address=129.151.52.128/26 list=Zoom
add address=129.151.53.32/27 list=Zoom
add address=129.151.53.224/27 list=Zoom
add address=129.151.55.32/27 list=Zoom
add address=129.151.56.32/27 list=Zoom
add address=129.151.57.32/27 list=Zoom
add address=129.151.60.192/27 list=Zoom
add address=129.159.2.32/27 list=Zoom
add address=129.159.2.192/27 list=Zoom
add address=129.159.3.0/24 list=Zoom
add address=129.159.4.0/23 list=Zoom
add address=129.159.6.0/27 list=Zoom
add address=129.159.6.96/27 list=Zoom
add address=129.159.6.128/26 list=Zoom
add address=129.159.6.192/27 list=Zoom
add address=129.159.160.0/26 list=Zoom
add address=129.159.160.64/27 list=Zoom
add address=129.159.163.0/26 list=Zoom
add address=129.159.163.160/27 list=Zoom
add address=129.159.208.0/21 list=Zoom
add address=129.159.216.0/26 list=Zoom
add address=129.159.216.64/27 list=Zoom
add address=129.159.216.128/26 list=Zoom
add address=132.226.176.0/25 list=Zoom
add address=132.226.176.128/26 list=Zoom
add address=132.226.177.96/27 list=Zoom
add address=132.226.177.128/25 list=Zoom
add address=132.226.178.0/27 list=Zoom
add address=132.226.178.128/27 list=Zoom
add address=132.226.178.224/27 list=Zoom
add address=132.226.179.0/27 list=Zoom
add address=132.226.179.64/27 list=Zoom
add address=132.226.180.128/27 list=Zoom
add address=132.226.183.160/27 list=Zoom
add address=132.226.185.192/27 list=Zoom
add address=150.230.224.0/25 list=Zoom
add address=150.230.224.128/26 list=Zoom
add address=150.230.224.224/27 list=Zoom
add address=152.67.184.32/27 list=Zoom
add address=152.70.0.0/25 list=Zoom
add address=152.70.0.128/26 list=Zoom
add address=152.70.0.224/27 list=Zoom
add address=152.70.1.0/25 list=Zoom
add address=152.70.1.128/26 list=Zoom
add address=152.70.1.192/27 list=Zoom
add address=152.70.2.0/26 list=Zoom
add address=152.70.7.192/27 list=Zoom
add address=152.70.10.32/27 list=Zoom
add address=152.70.224.32/27 list=Zoom
add address=152.70.224.64/26 list=Zoom
add address=152.70.224.160/27 list=Zoom
add address=152.70.224.192/27 list=Zoom
add address=152.70.225.0/25 list=Zoom
add address=152.70.225.160/27 list=Zoom

/ip firewall mangle
add action=mark-connection chain=prerouting comment=\
"Mark connection Zoom TCP" connection-state=new dst-address-list=Zoom \
dst-port=3748,3749,5090,5091,8801-8810,80,443 new-connection-mark=\
zoom_connection passthrough=yes protocol=tcp
add action=mark-connection chain=prerouting comment=\
"Mark connection Zoom UDP" connection-state=new dst-address-list=Zoom \
dst-port=3748,3749,5090,5091,8801-8810 new-connection-mark=\
zoom_connection passthrough=yes protocol=udp
add action=mark-packet chain=forward comment="Prio_1 ICMP Download" \
in-interface-list=WAN new-packet-mark=prio_1_dl passthrough=yes protocol=\
icmp
add action=mark-packet chain=forward comment="Prio_1 ICMP Upload" \
in-interface-list=LAN new-packet-mark=prio_1_ul passthrough=yes protocol=\
icmp
add action=mark-packet chain=forward comment="Prio_1 DNS Download" \
in-interface-list=WAN new-packet-mark=prio_1_dl passthrough=yes port=53 \
protocol=tcp
add action=mark-packet chain=forward comment="Prio_1 DNS Upload" \
in-interface-list=LAN new-packet-mark=prio_1_ul passthrough=yes port=53 \
protocol=tcp
add action=mark-packet chain=forward comment="Prio_1 DNS Download" \
in-interface-list=WAN new-packet-mark=prio_1_dl passthrough=yes port=53 \
protocol=udp
add action=mark-packet chain=forward comment="Prio_1 DNS Upload" \
in-interface-list=LAN new-packet-mark=prio_1_ul passthrough=yes port=53 \
protocol=udp
add action=mark-packet chain=forward comment="Prio_1 ACK packets Download" \
in-interface-list=WAN new-packet-mark=prio_1_dl packet-size=0-123 \
passthrough=yes protocol=tcp tcp-flags=ack
add action=mark-packet chain=forward comment=\
"Prio_1 Other WEB Traffic Upload" in-interface-list=LAN new-packet-mark=\
prio_1_ul passthrough=yes port=80,443 protocol=tcp
add action=mark-packet chain=forward comment=\
"Prio_2 Zoom Standart DSCP (video\$screensharing) Download" dscp=40 \
in-interface-list=WAN new-packet-mark=prio_2_dl passthrough=yes
add action=mark-packet chain=forward comment=\
"Prio_2 Zoom Standart DSCP (video\$screensharing) Upload" dscp=40 \
in-interface-list=LAN new-packet-mark=prio_2_ul passthrough=yes
add action=mark-packet chain=forward comment=\
"Prio_2 Zoom Standart DSCP (audio) Download" dscp=56 in-interface-list=\
WAN new-packet-mark=prio_2_dl passthrough=yes
add action=mark-packet chain=forward comment=\
"Prio_2 Zoom Standart DSCP (audio) Upload" dscp=56 in-interface-list=LAN \
new-packet-mark=prio_2_ul passthrough=yes
add action=mark-packet chain=forward comment="Prio_2 SIP apps Download" \
in-interface-list=WAN new-packet-mark=prio_2_dl passthrough=yes port=\
5060,5061,10000-20000 protocol=udp
add action=mark-packet chain=forward comment="Prio_2 SIP apps Upload" \
in-interface-list=LAN new-packet-mark=prio_2_ul passthrough=yes port=\
5060,5061,10000-20000 protocol=udp
add action=mark-packet chain=forward comment="Prio_2 MS Teams Download" \
dst-address-list=Teams in-interface-list=WAN new-packet-mark=prio_2_dl \
passthrough=yes port=3478,3481 protocol=udp
add action=mark-packet chain=forward comment="Prio_2 MS Teams Upload" \
dst-address-list=Teams in-interface-list=LAN new-packet-mark=prio_2_ul \
passthrough=yes port=3478,3481 protocol=udp
add action=mark-packet chain=forward comment=\
"Prio_2 Zoom IPs And Ports Download" connection-mark=zoom_connection \
in-interface-list=WAN new-packet-mark=prio_2_dl passthrough=yes
add action=mark-packet chain=forward comment=\
"Prio_2 Zoom IPs And Ports Upload" connection-mark=zoom_connection \
in-interface-list=LAN new-packet-mark=prio_2_ul passthrough=yes
add action=mark-packet chain=forward comment="Prio_3 SSH Download" \
dst-address-list=Teams dst-port=22 in-interface-list=WAN new-packet-mark=\
prio_3_dl passthrough=yes protocol=tcp
add action=mark-packet chain=forward comment="Prio_3 SSH Upload" \
dst-address-list=Teams dst-port=22 in-interface-list=LAN new-packet-mark=\
prio_3_ul passthrough=yes protocol=tcp
add action=mark-packet chain=forward comment="Prio_3 RDP Download" \
dst-address-list=Teams dst-port=3389 in-interface-list=WAN \
new-packet-mark=prio_3_dl passthrough=yes protocol=tcp
add action=mark-packet chain=forward comment="Prio_3 RDP Upload" \
dst-address-list=Teams dst-port=3389 in-interface-list=LAN \
new-packet-mark=prio_3_ul passthrough=yes protocol=tcp
add action=mark-packet chain=forward comment=\
"Prio_4 Other WEB Traffic Download" in-interface-list=WAN \
new-packet-mark=prio_4_dl passthrough=yes port=80,443 protocol=tcp
submitted by hbarkernz to mikrotik [link] [comments]

Client stuck in DHCP REQD, not receiving discovery or boot requests?

Although I've seen multiple cases of clients becoming stuck in "DHCP REQD," in my case, it appears from the debug output that there have been no discovery or BOOTREQUEST from the client.
Now that we are using 8.0.152.0, I want to find out if this behavior is due to a bug. Or is there a problem with APs? or do certain parameters need to be checked? Thanks

*apfReceiveTask: Jul 05 20:44:41.675: 00:12:f3:41:64:e4 0.0.0.0 START (0) Initializing policy *apfReceiveTask: Jul 05 20:44:41.675: 00:12:f3:41:64:e4 0.0.0.0 START (0) Change state to AUTHCHECK (2) last state START (0) *apfReceiveTask: Jul 05 20:44:41.675: 00:12:f3:41:64:e4 0.0.0.0 AUTHCHECK (2) Change state to L2AUTHCOMPLETE (4) last state AUTHCHECK (2) *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 Not Using WMM Compliance code qosCap 00 *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 Vlan while overriding the policy = -1 *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 sending to spamAddMobile vlanId -1 aclName = , flexAclId 65535 *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 0.0.0.0 L2AUTHCOMPLETE (4) Plumbed mobile LWAPP rule on AP 00:3a:9a:68:e0:50 vapId 26 apVapId 2 flex-acl-name: *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 0.0.0.0 L2AUTHCOMPLETE (4) Change state to DHCP_REQD (7) last state L2AUTHCOMPLETE (4) *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 apfMsAssoStateInc *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 apfPemAddUser2 (apf_policy.c:353) Changing state for mobile 00:12:f3:41:64:e4 on AP 00:3a:9a:68:e0:50 from AAA Pending to Associated *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 apfPemAddUser2:session timeout forstation 00:12:f3:41:64:e4 - Session Tout 1800, apfMsTimeOut '1800' and sessionTimerRunning flag is 0 *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 Mscb del, deleteImm:no, MS State:3, reasoncode:4 ANCHOR ROLE=0 *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 Scheduling deletion of Mobile Station: (callerId: 49) in 1800 seconds *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 Func: apfPemAddUser2, Ms Timeout = 1800, Session Timeout = 1800 *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 Sending assoc-resp with status 0 station:00:12:f3:41:64:e4 AP:00:3a:9a:68:e0:50-00 on apVapId 2 *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 Sending Assoc Response to station on BSSID 00:3a:9a:68:e0:51 (status 0) ApVapId 2 Slot 0 *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 apfProcessRadiusAssocResp (apf_80211.c:4012) Changing state for mobile 00:12:f3:41:64:e4 on AP 00:3a:9a:68:e0:50 from Associated to Associated *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 Mobility query, PEM State: DHCP_REQD *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 Building Mobile Announce : *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 Building Client Payload: *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 Client Ip: 0.0.0.0 *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 Client Vlan Ip: 192.168.0.10, Vlan mask : 255.255.240.0 *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 Client Vap Security: 262208 *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 Virtual Ip: 1.1.1.1 *apfReceiveTask: Jul 05 20:44:41.676: 00:12:f3:41:64:e4 ssid: adient-guest *apfReceiveTask: Jul 05 20:44:41.677: 00:12:f3:41:64:e4 Building VlanIpPayload. *spamApTask3: Jul 05 20:44:41.677: 00:12:f3:41:64:e4 Successful transmission of LWAPP Add-Mobile to AP 00:3a:9a:68:e0:50 *apfReceiveTask: Jul 05 20:44:43.847: 00:12:f3:41:64:9b 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 172.26.228.62 *apfReceiveTask: Jul 05 20:44:43.848: 00:12:f3:41:64:9b 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED *apfReceiveTask: Jul 05 20:44:43.848: 00:12:f3:41:64:9b 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6227, Adding TMP rule *apfReceiveTask: Jul 05 20:44:43.848: 00:12:f3:41:64:9b 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule type = Airespace AP - Learn IP address on AP 00:3a:9a:68:e0:50, slot 0, interface = 13, QOS = 0 IPv4 ACL ID = 255, IP *apfReceiveTask: Jul 05 20:44:43.848: 00:12:f3:41:64:9b 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 15206, IntfId = 15 Local Bridging Vlan = 689, Local Bridging intf id = 15 *apfReceiveTask: Jul 05 20:44:43.848: 00:12:f3:41:64:9b 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0 *apfReceiveTask: Jul 05 20:44:43.848: 00:12:f3:41:64:9b 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0 *apfReceiveTask: Jul 05 20:44:43.848: 00:12:f3:41:64:9b 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0 *apfReceiveTask: Jul 05 20:44:43.848: 00:12:f3:41:64:9b 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255) *pemReceiveTask: Jul 05 20:44:43.848: 00:12:f3:41:64:9b 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0 *pemReceiveTask: Jul 05 20:44:43.848: 00:12:f3:41:64:9b Sent an XID frame *apfReceiveTask: Jul 05 20:44:44.647: 00:12:f3:41:64:e4 0.0.0.0 DHCP_REQD (7) mobility role update request from Unassociated to Local Peer = 0.0.0.0, Old Anchor = 0.0.0.0, New Anchor = 172.26.228.62 *apfReceiveTask: Jul 05 20:44:44.647: 00:12:f3:41:64:e4 0.0.0.0 DHCP_REQD (7) State Update from Mobility-Incomplete to Mobility-Complete, mobility role=Local, client state=APF_MS_STATE_ASSOCIATED *apfReceiveTask: Jul 05 20:44:44.647: 00:12:f3:41:64:e4 0.0.0.0 DHCP_REQD (7) pemAdvanceState2 6227, Adding TMP rule *apfReceiveTask: Jul 05 20:44:44.648: 00:12:f3:41:64:e4 0.0.0.0 DHCP_REQD (7) Adding Fast Path rule type = Airespace AP - Learn IP address on AP 00:3a:9a:68:e0:50, slot 0, interface = 13, QOS = 0 IPv4 ACL ID = 255, IP *apfReceiveTask: Jul 05 20:44:44.648: 00:12:f3:41:64:e4 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) 802.1P = 0, DSCP = 0, TokenID = 15206, IntfId = 15 Local Bridging Vlan = 689, Local Bridging intf id = 15 *apfReceiveTask: Jul 05 20:44:44.648: 00:12:f3:41:64:e4 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0 *apfReceiveTask: Jul 05 20:44:44.648: 00:12:f3:41:64:e4 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0 *apfReceiveTask: Jul 05 20:44:44.648: 00:12:f3:41:64:e4 0.0.0.0 DHCP_REQD (7) Fast Path rule (contd...) AVC Ratelimit: AppID = 0 ,AppAction = 0, AppToken = 15206 AverageRate = 0, BurstRate = 0 *apfReceiveTask: Jul 05 20:44:44.648: 00:12:f3:41:64:e4 0.0.0.0 DHCP_REQD (7) Successfully plumbed mobile rule (IPv4 ACL ID 255, IPv6 ACL ID 255, L2 ACL ID 255) *pemReceiveTask: Jul 05 20:44:44.648: 00:12:f3:41:64:e4 0.0.0.0 Added NPU entry of type 9, dtlFlags 0x0 *pemReceiveTask: Jul 05 20:44:44.648: 00:12:f3:41:64:e4 Sent an XID frame *apfReceiveTask: Jul 05 20:46:40.847: 00:12:f3:41:64:9b 0.0.0.0 DHCP_REQD (7) DHCP Policy timeout. Number of DHCP Discover 0, DHCP Request 0 from client *apfReceiveTask: Jul 05 20:46:40.847: 00:12:f3:41:64:9b Interface Group was NULL.Number of DHCP Discovery 0 from client *apfReceiveTask: Jul 05 20:46:40.847: 00:12:f3:41:64:9b 0.0.0.0 DHCP_REQD (7) Pem timed out, Try to delete client in 10 secs. *apfReceiveTask: Jul 05 20:46:40.847: 00:12:f3:41:64:9b Mscb del, deleteImm:no, MS State:3, reasoncode:4 ANCHOR ROLE=0 *apfReceiveTask: Jul 05 20:46:40.847: 00:12:f3:41:64:9b Scheduling deletion of Mobile Station: (callerId: 12) in 10 seconds *apfReceiveTask: Jul 05 20:46:41.647: 00:12:f3:41:64:e4 0.0.0.0 DHCP_REQD (7) DHCP Policy timeout. Number of DHCP Discover 0, DHCP Request 0 from client *apfReceiveTask: Jul 05 20:46:41.647: 00:12:f3:41:64:e4 Interface Group was NULL.Number of DHCP Discovery 0 from client *apfReceiveTask: Jul 05 20:46:41.647: 00:12:f3:41:64:e4 0.0.0.0 DHCP_REQD (7) Pem timed out, Try to delete client in 10 secs. *apfReceiveTask: Jul 05 20:46:41.647: 00:12:f3:41:64:e4 Mscb del, deleteImm:no, MS State:3, reasoncode:4 ANCHOR ROLE=0 *apfReceiveTask: Jul 05 20:46:41.647: 00:12:f3:41:64:e4 Scheduling deletion of Mobile Station: (callerId: 12) in 10 seconds 
submitted by 1searching to networking [link] [comments]

Cisco Stratix 5700 Errors

I´'m having this weird behavior on this industrial switch thats cisco based, randomly crashing the links. The clients are PLCs 10/100Mb. (This is used to do NAT translations, I have anotherone that is doing the routing between the vlans, that one rarely has errrors)
Thank you for your time to read this.
Any thoughts about what might be the issue here?
May 8 05:28:23 errors %LINK-3-UPDOWN: Interface FastEthernet1/13, changed state to down May 8 05:54:24 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet1/6, changed state to down May 8 05:54:25 errors %LINK-3-UPDOWN: Interface FastEthernet1/6, changed state to down May 8 05:54:39 errors %LINK-3-UPDOWN: Interface FastEthernet1/6, changed state to up May 8 05:54:40 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet1/6, changed state to up May 8 14:13:39 errors %LINK-3-UPDOWN: Interface FastEthernet1/1, changed state to up May 8 14:13:40 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet1/1, changed state to up May 8 14:25:10 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet1/1, changed state to down May 8 14:25:11 errors %LINK-3-UPDOWN: Interface FastEthernet1/1, changed state to down May 8 16:44:07 errors %LINK-3-UPDOWN: Interface FastEthernet1/1, changed state to up May 8 16:44:08 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet1/1, changed state to up May 8 17:37:16 errors %LINK-3-UPDOWN: Interface FastEthernet1/2, changed state to up May 8 17:37:17 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet1/2, changed state to up May 8 17:37:21 errors %LINK-3-UPDOWN: Interface FastEthernet1/13, changed state to up May 8 17:37:22 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet1/13, changed state to up May 8 17:39:39 errors %LINK-3-UPDOWN: Interface FastEthernet1/3, changed state to up May 8 17:39:40 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet1/3, changed state to up May 8 17:46:23 errors %LINK-3-UPDOWN: Interface FastEthernet1/4, changed state to up May 8 17:46:24 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet1/4, changed state to up May 8 18:00:57 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down May 8 18:00:57 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan26, changed state to down May 8 18:00:57 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan32, changed state to down May 8 18:00:57 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up May 8 18:00:57 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan26, changed state to up May 8 18:00:57 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan32, changed state to up May 8 20:18:30 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down May 8 20:18:30 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan26, changed state to down May 8 20:18:30 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan32, changed state to down May 8 20:18:30 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up May 8 20:18:30 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan26, changed state to up May 8 20:18:30 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan32, changed state to up May 8 21:04:49 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down May 8 21:04:49 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan26, changed state to down May 8 21:04:49 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan32, changed state to down May 8 21:04:49 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up May 8 21:04:49 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan26, changed state to up May 8 21:04:49 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan32, changed state to up May 8 22:29:28 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down May 8 22:29:28 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan26, changed state to down May 8 22:29:28 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan32, changed state to down May 8 22:29:28 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up May 8 22:29:28 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan26, changed state to up May 8 22:29:28 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan32, changed state to up May 8 23:52:06 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down May 8 23:52:06 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan26, changed state to down May 8 23:52:06 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan32, changed state to down May 8 23:52:06 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up May 8 23:52:06 notifications %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan26, changed state to up 
This is The config

! Last configuration change at 19:39:09 UTC Tue Feb 21 2006 ! version 15.2 service nagle no service pad service tcp-keepalives-in service tcp-keepalives-out service timestamps debug datetime msec localtime show-timezone service timestamps log datetime msec localtime show-timezone service password-encryption service unsupported-transceiver no service dhcp ! hostname NAT1 ! boot-start-marker boot-end-marker ! logging buffered 16384 no logging console enable secret level 1 5 $1$0/2D$5uRoUJfqgAlrVCf5Qhngn/ enable secret 5 $1$jkaD$jGXoR.73hA.0tgGlMcg/ ! username admin privilege 15 secret 5 $1$41eU$A8Upzrg871LamGJDMiGZO. no aaa new-model platform config-upgrade 15.2(6)E system mtu routing 1500 no ip source-route ip arp inspection vlan 1000 ip arp inspection vlan 1000 logging dhcp-bindings none ! ! no ip domain-lookup ip device tracking probe auto-source fallback 169.254.1.100 0.0.0.0 override ip device tracking probe delay 15 ip igmp snooping querier vtp mode transparent no profinet ! ! ! ! ! udld aggressive ptp mode forward ! mls qos map policed-dscp 24 27 31 43 46 47 55 59 to 0 mls qos map dscp-cos 9 11 12 13 14 15 to 0 mls qos map dscp-cos 25 26 28 29 30 to 2 mls qos map dscp-cos 40 41 42 44 45 49 50 51 to 4 mls qos map dscp-cos 52 53 54 56 57 58 60 61 to 4 mls qos map dscp-cos 62 63 to 4 mls qos map cos-dscp 0 8 16 27 32 47 55 59 mls qos srr-queue input bandwidth 40 60 mls qos srr-queue input threshold 1 16 66 mls qos srr-queue input threshold 2 34 66 mls qos srr-queue input buffers 40 60 mls qos srr-queue input cos-map queue 1 threshold 2 1 mls qos srr-queue input cos-map queue 1 threshold 3 0 2 mls qos srr-queue input cos-map queue 2 threshold 2 4 mls qos srr-queue input cos-map queue 2 threshold 3 3 5 6 7 mls qos srr-queue input dscp-map queue 1 threshold 2 8 10 mls qos srr-queue input dscp-map queue 1 threshold 3 0 1 2 3 4 5 6 7 mls qos srr-queue input dscp-map queue 1 threshold 3 9 11 12 13 14 15 16 17 mls qos srr-queue input dscp-map queue 1 threshold 3 18 19 20 21 22 23 25 26 mls qos srr-queue input dscp-map queue 1 threshold 3 28 29 30 mls qos srr-queue input dscp-map queue 2 threshold 2 32 33 34 35 36 37 38 39 mls qos srr-queue input dscp-map queue 2 threshold 2 40 41 42 44 45 49 50 51 mls qos srr-queue input dscp-map queue 2 threshold 2 52 53 54 56 57 58 60 61 mls qos srr-queue input dscp-map queue 2 threshold 2 62 63 mls qos srr-queue input dscp-map queue 2 threshold 3 24 27 31 43 46 47 48 55 mls qos srr-queue input dscp-map queue 2 threshold 3 59 mls qos srr-queue output cos-map queue 1 threshold 3 7 mls qos srr-queue output cos-map queue 2 threshold 2 1 mls qos srr-queue output cos-map queue 2 threshold 3 0 2 4 mls qos srr-queue output cos-map queue 3 threshold 3 5 6 mls qos srr-queue output cos-map queue 4 threshold 3 3 mls qos srr-queue output dscp-map queue 1 threshold 3 59 mls qos srr-queue output dscp-map queue 2 threshold 2 8 10 mls qos srr-queue output dscp-map queue 2 threshold 3 0 1 2 3 4 5 6 7 mls qos srr-queue output dscp-map queue 2 threshold 3 9 11 12 13 14 15 16 17 mls qos srr-queue output dscp-map queue 2 threshold 3 18 19 20 21 22 23 25 26 mls qos srr-queue output dscp-map queue 2 threshold 3 28 29 30 32 33 34 35 36 mls qos srr-queue output dscp-map queue 2 threshold 3 37 38 39 40 41 42 44 45 mls qos srr-queue output dscp-map queue 2 threshold 3 49 50 51 52 53 54 56 57 mls qos srr-queue output dscp-map queue 2 threshold 3 58 60 61 62 63 mls qos srr-queue output dscp-map queue 3 threshold 3 43 46 47 48 55 mls qos srr-queue output dscp-map queue 4 threshold 3 24 27 31 mls qos queue-set output 1 buffers 10 25 40 25 mls qos queue-set output 2 buffers 10 25 40 25 no mls qos rewrite ip dscp mls qos ! crypto pki trustpoint TP-self-signed-377936128 enrollment selfsigned subject-name cn=IOS-Self-Signed-Certificate-377936128 revocation-check none rsakeypair TP-self-signed-377936128 ! ! crypto pki certificate chain TP-self-signed-377936128 certificate self-signed 01 nvram:IOS-Self-Sig#5.cer cip security password 04481C0F1B2244 ! spanning-tree mode mst spanning-tree extend system-id errdisable recovery cause udld errdisable recovery cause bpduguard errdisable recovery cause security-violation errdisable recovery cause channel-misconfig errdisable recovery cause pagp-flap errdisable recovery cause dtp-flap errdisable recovery cause link-flap errdisable recovery cause sfp-config-mismatch errdisable recovery cause gbic-invalid errdisable recovery cause psecure-violation errdisable recovery cause port-mode-failure errdisable recovery cause dhcp-rate-limit errdisable recovery cause pppoe-ia-rate-limit errdisable recovery cause mac-limit errdisable recovery cause vmps errdisable recovery cause storm-control errdisable recovery cause inline-power errdisable recovery cause arp-inspection errdisable recovery cause loopback errdisable recovery cause small-frame errdisable recovery cause psp errdisable recovery cause loopdetect errdisable recovery cause mrp-miscabling errdisable recovery interval 30 ! alarm profile defaultPort alarm not-operating syslog not-operating notifies not-operating ! alarm profile ab-alarm alarm link-fault not-forwarding fcs-error syslog link-fault not-forwarding fcs-error notifies link-fault not-forwarding fcs-error relay-major not-forwarding ! alarm facility power-supply rps notifies alarm facility power-supply rps relay major alarm facility temperature secondary notifies alarm facility temperature secondary syslog alarm facility temperature secondary high 90 alarm facility temperature secondary low 0 ! ! vlan 20 name VLAN20 ! vlan 22 name VLAN22 ! vlan 23 name VLAN23 ! vlan 24 name VLAN24 ! vlan 25 name VLAN25 ! vlan 26 name VLAN26 ! vlan 30 name VLAN30 ! vlan 32 name VLAN32 ! vlan 33 name VLAN33 ! vlan 40 name VLAN40 ! vlan 50 name VLAN50 ! vlan 60 name VLAN60 ! vlan 80 name VLAN80 ! ! class-map match-all 1588-PTP-General match access-group 107 class-map match-all 1588-PTP-Event match access-group 106 class-map match-all CIP-Implicit_dscp_any match access-group 104 class-map match-all CIP-Other match access-group 105 class-map match-all voip-data match ip dscp ef class-map match-all voip-control match ip dscp cs3 af31 class-map match-all CIP-Implicit_dscp_43 match access-group 103 class-map match-all CIP-Implicit_dscp_55 match access-group 101 class-map match-all CIP-Implicit_dscp_47 match access-group 102 ! policy-map Voice-Map class voip-data set dscp ef police 320000 8000 exceed-action policed-dscp-transmit class voip-control set dscp cs3 police 32000 8000 exceed-action policed-dscp-transmit policy-map CIP-PTP-Traffic class CIP-Implicit_dscp_55 set ip dscp 55 class CIP-Implicit_dscp_47 set ip dscp 47 class CIP-Implicit_dscp_43 set ip dscp 43 class CIP-Implicit_dscp_any set ip dscp 31 class CIP-Other set ip dscp 27 class 1588-PTP-Event set ip dscp 59 class 1588-PTP-General set ip dscp 47 ! ! l2nat instance VLAN20 instance-id 1 fixup all inside from host 192.168.1.225 to 172.168.20.10 outside from host 172.168.20.10 to 192.168.1.225 outside from host 172.168.1.1 to 192.168.1.254 gateway inside from host 192.168.1.69 to 172.168.20.69 outside from host 172.168.20.69 to 192.168.1.69 l2nat instance VLAN23 instance-id 2 fixup all outside from host 172.168.1.1 to 192.168.1.254 gateway outside from host 172.168.23.10 to 192.168.1.1 inside from host 192.168.1.1 to 172.168.23.10 l2nat instance VLAN24 instance-id 4 fixup all outside from host 172.168.1.1 to 192.168.1.254 gateway inside from host 192.168.1.1 to 172.168.24.10 outside from host 172.168.24.77 to 192.168.0.77 l2nat instance VLAN30 instance-id 5 fixup all inside from host 192.168.80.201 to 172.168.30.10 outside from host 172.168.30.10 to 192.168.80.201 outside from host 172.168.1.1 to 192.168.80.1 gateway l2nat instance VLAN32 instance-id 6 fixup all outside from host 172.168.1.1 to 192.168.80.254 gateway outside from host 172.168.32.10 to 192.168.80.50 inside from host 192.168.80.50 to 172.168.32.10 l2nat instance VLAN33 instance-id 7 fixup all inside from host 192.168.1.1 to 172.168.33.10 outside from host 172.168.33.10 to 192.168.1.1 outside from host 172.168.1.1 to 192.168.1.254 gateway l2nat instance VLAN40 instance-id 8 fixup all inside from host 192.168.1.176 to 172.168.40.176 inside from host 192.168.1.175 to 172.168.40.175 inside from host 192.168.1.131 to 172.168.40.131 inside from host 192.168.1.121 to 172.168.40.121 inside from host 192.168.1.111 to 172.168.40.111 inside from host 192.168.1.212 to 172.168.40.212 outside from host 172.168.40.176 to 192.168.1.176 outside from host 172.168.40.175 to 192.168.1.175 outside from host 172.168.40.131 to 192.168.1.131 outside from host 172.168.40.121 to 192.168.1.121 outside from host 172.168.40.111 to 192.168.1.111 outside from host 172.168.40.212 to 192.168.1.212 outside from host 172.168.1.1 to 192.168.1.254 gateway inside from host 192.168.1.1 to 172.168.40.11 outside from host 172.168.40.11 to 192.168.1.1 l2nat instance VLAN80 instance-id 9 fixup all outside from host 172.168.80.12 to 192.168.80.12 inside from host 192.168.80.12 to 172.168.80.12 outside from host 172.168.80.150 to 192.168.80.150 outside from host 172.168.80.203 to 192.168.80.203 inside from host 192.168.80.203 to 172.168.80.203 inside from host 192.168.80.150 to 172.168.80.150 outside from host 172.168.80.10 to 192.168.80.10 inside from host 192.168.80.10 to 172.168.80.10 inside from host 192.168.80.214 to 172.168.80.214 inside from host 192.168.80.233 to 172.168.80.233 outside from host 172.168.1.1 to 192.168.80.1 gateway outside from host 172.168.80.233 to 192.168.80.233 outside from host 172.168.80.214 to 192.168.80.214 inside from host 192.168.80.50 to 172.168.80.50 outside from host 172.168.80.50 to 192.168.80.50 l2nat instance VLAN25 instance-id 10 fixup all outside from host 172.168.1.1 to 192.168.1.1 gateway outside from host 172.168.25.10 to 192.168.1.10 inside from host 192.168.1.10 to 172.168.25.10 l2nat instance VLAN60 instance-id 12 fixup all outside from host 172.168.60.228 to 192.168.1.228 inside from host 192.168.1.228 to 172.168.60.228 outside from host 172.168.1.1 to 192.168.1.1 gateway l2nat instance VLAN26 instance-id 13 fixup all outside from host 172.168.26.100 to 192.168.0.100 inside from host 192.168.0.100 to 172.168.26.100 outside from host 172.168.1.1 to 192.168.0.1 gateway outside from host 172.168.26.77 to 192.168.0.77 inside from host 192.168.0.77 to 172.168.26.77 l2nat instance VLAN50 instance-id 11 fixup all outside from host 172.168.50.100 to 192.168.0.100 outside from host 172.168.50.130 to 192.168.0.77 outside from host 172.168.1.1 to 192.168.0.1 gateway inside from host 192.168.0.100 to 172.168.50.100 inside from host 192.168.0.77 to 172.168.50.130 l2nat instance VLAN22 instance-id 3 fixup all outside from host 172.168.22.100 to 192.168.0.100 outside from host 172.168.1.1 to 192.168.0.1 gateway inside from host 192.168.0.100 to 172.168.22.100 ! ! ! macro global description ab-global | ab-qos-map-setup | ab-qos-queue-setup | ab-password ! interface FastEthernet1/1 description L1 DESPALETIZADORA switchport access vlan 20 switchport mode access load-interval 30 srr-queue bandwidth share 1 19 40 40 priority-queue out no cdp enable mls qos trust dscp macro description ab-multiport-device alarm profile ab-alarm spanning-tree portfast edge service-policy input CIP-PTP-Traffic ! interface FastEthernet1/2 description L1 TRIBLOCK switchport access vlan 80 switchport mode access load-interval 30 srr-queue bandwidth share 1 19 40 40 priority-queue out no cdp enable mls qos trust dscp macro description ab-multiport-device alarm profile ab-alarm service-policy input CIP-PTP-Traffic ! interface FastEthernet1/3 description L1 ETIQUETADORA switchport access vlan 50 switchport mode access load-interval 30 srr-queue bandwidth share 1 19 40 40 priority-queue out no cdp enable mls qos trust dscp macro description ab-multiport-device alarm profile ab-alarm spanning-tree portfast edge service-policy input CIP-PTP-Traffic ! interface FastEthernet1/4 description L1 ENCARTONADORA A switchport access vlan 23 switchport mode access load-interval 30 srr-queue bandwidth share 1 19 40 40 priority-queue out no cdp enable mls qos trust dscp macro description ab-multiport-device alarm profile ab-alarm spanning-tree portfast edge service-policy input CIP-PTP-Traffic ! interface FastEthernet1/5 description L1 ENCARTONADORA B switchport access vlan 24 switchport mode access load-interval 30 srr-queue bandwidth share 1 19 40 40 priority-queue out no cdp enable mls qos trust dscp macro description ab-multiport-device alarm profile ab-alarm spanning-tree portfast edge service-policy input CIP-PTP-Traffic ! interface FastEthernet1/6 description L2 DESPALETIZADORA switchport access vlan 30 switchport mode access load-interval 30 srr-queue bandwidth share 1 19 40 40 priority-queue out no cdp enable mls qos trust dscp macro description ab-multiport-device alarm profile ab-alarm spanning-tree portfast edge service-policy input CIP-PTP-Traffic ! interface FastEthernet1/7 description L2 TRIBLOCK switchport access vlan 80 switchport mode access load-interval 30 srr-queue bandwidth share 1 19 40 40 priority-queue out no cdp enable mls qos trust dscp macro description ab-multiport-device alarm profile ab-alarm service-policy input CIP-PTP-Traffic ! interface FastEthernet1/8 description _____________________L2 ETIQUETADORA switchport access vlan 32 switchport mode access load-interval 30 srr-queue bandwidth share 1 19 40 40 priority-queue out no cdp enable mls qos trust dscp macro description ab-multiport-device alarm profile ab-alarm spanning-tree portfast edge service-policy input CIP-PTP-Traffic ! interface FastEthernet1/9 description L2 ENCARTONADORA switchport access vlan 33 switchport mode access load-interval 30 srr-queue bandwidth share 1 19 40 40 priority-queue out no cdp enable mls qos trust dscp macro description ab-multiport-device alarm profile ab-alarm spanning-tree portfast edge service-policy input CIP-PTP-Traffic ! interface FastEthernet1/10 description ALMACEN switchport access vlan 40 switchport mode access load-interval 30 srr-queue bandwidth share 1 19 40 40 priority-queue out no cdp enable mls qos trust dscp macro description ab-multiport-device alarm profile ab-alarm spanning-tree portfast edge service-policy input CIP-PTP-Traffic ! interface FastEthernet1/11 description L1 ESTUCHADORA switchport access vlan 25 switchport mode access load-interval 30 srr-queue bandwidth share 1 19 40 40 priority-queue out no cdp enable mls qos trust dscp macro description ab-multiport-device alarm profile ab-alarm spanning-tree portfast edge service-policy input CIP-PTP-Traffic ! interface FastEthernet1/12 description TRANSPORTE CAJAS switchport access vlan 50 switchport mode access load-interval 30 srr-queue bandwidth share 1 19 40 40 priority-queue out no cdp enable mls qos trust dscp macro description ab-multiport-device alarm profile ab-alarm spanning-tree portfast edge service-policy input CIP-PTP-Traffic ! interface FastEthernet1/13 description ALINEADOR L1 switchport access vlan 60 switchport mode access load-interval 30 srr-queue bandwidth share 1 19 40 40 priority-queue out no cdp enable mls qos trust dscp macro description ab-multiport-device alarm profile ab-alarm spanning-tree portfast edge service-policy input CIP-PTP-Traffic ! interface FastEthernet1/14 switchport access vlan 50 switchport mode access switchport port-security maximum 2 switchport port-security aging time 2 switchport port-security aging type inactivity macro description vm-desktop-automation alarm profile ab-alarm spanning-tree portfast edge spanning-tree bpduguard enable service-policy input CIP-PTP-Traffic ! interface FastEthernet1/15 switchport access vlan 26 switchport mode access switchport port-security maximum 2 switchport port-security aging time 2 switchport port-security aging type inactivity macro description vm-desktop-automation alarm profile ab-alarm spanning-tree portfast edge spanning-tree bpduguard enable service-policy input CIP-PTP-Traffic ! interface FastEthernet1/16 switchport access vlan 40 switchport mode access switchport port-security maximum 2 switchport port-security aging time 2 switchport port-security aging type inactivity macro description vm-desktop-automation alarm profile ab-alarm spanning-tree portfast edge spanning-tree bpduguard enable service-policy input CIP-PTP-Traffic ! interface FastEthernet1/17 alarm profile ab-alarm service-policy input CIP-PTP-Traffic ! interface FastEthernet1/18 alarm profile ab-alarm service-policy input CIP-PTP-Traffic ! interface GigabitEthernet1/1 switchport mode trunk media-type rj45 srr-queue bandwidth share 1 19 40 40 priority-queue out mls qos trust cos macro description switch-automation l2nat VLAN22 22 l2nat VLAN50 50 l2nat VLAN26 26 l2nat VLAN24 24 l2nat VLAN60 60 l2nat VLAN32 32 l2nat VLAN25 25 l2nat VLAN23 23 l2nat VLAN20 20 l2nat VLAN30 30 l2nat VLAN33 33 l2nat VLAN40 40 l2nat VLAN80 80 alarm profile ab-alarm spanning-tree portfast edge trunk spanning-tree link-type point-to-point service-policy input CIP-PTP-Traffic ! interface GigabitEthernet1/2 switchport mode access switchport port-security maximum 2 switchport port-security aging time 2 switchport port-security aging type inactivity macro description vm-desktop-automation alarm profile ab-alarm spanning-tree portfast edge spanning-tree bpduguard enable service-policy input CIP-PTP-Traffic ! interface Vlan1 ip address 172.168.1.2 255.255.255.0 cip enable ! interface Vlan20 no ip address ! interface Vlan22 no ip address ! interface Vlan23 no ip address ! interface Vlan24 no ip address ! interface Vlan25 no ip address ! interface Vlan26 no ip address ! interface Vlan30 no ip address ! interface Vlan32 no ip address ! interface Vlan33 no ip address ! interface Vlan40 no ip address ! interface Vlan50 no ip address ! interface Vlan60 no ip address ! interface Vlan80 no ip address ! ip default-gateway 172.168.1.1 ip http server ip http authentication local ip http secure-server ip http tls-version TLSv1.2 ip http session-idle-timeout 1200 ! access-list 101 permit udp any eq 2222 any dscp 55 access-list 102 permit udp any eq 2222 any dscp 47 access-list 103 permit udp any eq 2222 any dscp 43 access-list 104 permit udp any eq 2222 any access-list 105 permit udp any eq 44818 any access-list 105 permit tcp any eq 44818 any access-list 106 permit udp any eq 319 any access-list 107 permit udp any eq 320 any snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart snmp-server enable traps transceiver all snmp-server enable traps call-home message-send-fail server-fail snmp-server enable traps tty snmp-server enable traps license snmp-server enable traps auth-framework sec-violation snmp-server enable traps cluster snmp-server enable traps config-copy snmp-server enable traps config snmp-server enable traps config-ctid snmp-server enable traps pki snmp-server enable traps trustsec-sxp conn-srcaddr-err msg-parse-err conn-config-err binding-err conn-up conn-down binding-expn-fail oper-nodeid-change binding-conflict snmp-server enable traps energywise snmp-server enable traps fru-ctrl snmp-server enable traps entity snmp-server enable traps event-manager snmp-server enable traps power-ethernet police snmp-server enable traps cpu threshold snmp-server enable traps rep snmp-server enable traps bridge newroot topologychange snmp-server enable traps stpx inconsistency root-inconsistency loop-inconsistency snmp-server enable traps syslog snmp-server enable traps vtp snmp-server enable traps vlancreate snmp-server enable traps vlandelete snmp-server enable traps flash insertion removal snmp-server enable traps port-security snmp-server enable traps envmon fan shutdown supply temperature status snmp-server enable traps bulkstat collection transfer snmp-server enable traps alarms informational snmp-server enable traps errdisable snmp-server enable traps mac-notification change move threshold snmp-server enable traps vlan-membership snmp mib flash cache ! line con 0 login local line vty 0 4 login local transport input ssh line vty 5 15 login local transport input ssh ! ntp server 172.168.80.150 ! end 
submitted by SaveTheWorld998 to Cisco [link] [comments]

QoS (DSCP & ToS) testing on eero

ISP service is cable 300/15 with slightly oversubscribed speeds. Client device is a 2021 MacBook Pro 14", connected wirelessly to the gateway eero. Simultantous ping tests with specified DSCP tags for VoIP, Video/Media, and Low Priority ran with speedtests in the background maxing out the available throughput. Optimize for Conferencing & Gaming (SQM) is enabled.
This proves that eero properly arranges tagged traffic in the driver queues.
ping -z 224 8.8.8.8 # ToS 224 (0xe0) AC_VO
https://www.speedtest.net/result/12868467615
--- 8.8.8.8 ping statistics --- 61 packets transmitted, 61 packets received, 0.0% packet loss round-trip min/avg/max/stddev = 16.214/24.735/66.499/9.860 ms
ping -z 160 8.8.8.8 # ToS 160 (0xa0) AC_VI
https://www.speedtest.net/result/12868475868
--- 8.8.8.8 ping statistics --- 55 packets transmitted, 55 packets received, 0.0% packet loss round-trip min/avg/max/stddev = 16.763/26.258/98.279/16.589 ms
ping -z 96 8.8.8.8 # ToS 96 (0x60) AC_BE
https://www.speedtest.net/result/12868482927
--- 8.8.8.8 ping statistics --- 55 packets transmitted, 52 packets received, 5.5% packet loss round-trip min/avg/max/stddev = 16.536/25.859/72.228/11.976 ms
ping -z 32 8.8.8.8 # ToS 32 (0x20) AC_BK
https://www.speedtest.net/result/12868489955
--- 8.8.8.8 ping statistics --- 55 packets transmitted, 55 packets received, 0.0% packet loss round-trip min/avg/max/stddev = 16.129/26.258/67.996/12.760 ms
submitted by thatsthequy to eero [link] [comments]

HPE Layer 2 Multicast Nightmare.

Hive mind, please help, I am desperate.
I'm banging my head against a wall trying to get a multicast video network to stabilize. Currently have 4x 5510 (JH147A and JH148A) 24 and 48 port switches and a single HPE5940 (JH390A) with roughly 60 encoders running to 30 decoders. I have video flowing and is somewhat stable.... Somewhat being key. There is instability whenever a decoder joins a multicast group, all the decoders will "flash" as a result of lost packets. Switch configs are attached. the 24 and 48 port 5510 switches have 4x10G uplinks to the 5940. Ill take any ideas. I've re-built this network from the ground up 4x in the last 3 days. Firmware is all current. Have a deployment of the same multicast video devices on another switch MFR and no issues.
QoS is configured as per MFR specs, IGMP and IGMP snooping are enabled. Only one querier is defined. All multicast devices are static'd inside vlan100.
Multicast Traffic from Crestron NVX and AES67 Audio
Multicast range is 232.1.X.X
Thank you in advance for any ideas you may have.
5940 Config:
# version 7.1.070, Release 2702P01-US # sysname A2C2 Core # clock timezone Alaska minus 09:00:00 clock summer-time FDT 02:00:00 March second Sunday 02:00:00 November first Sunday 01:00:00 clock protocol none # telnet server enable # irf mac-address persistent timer irf auto-update enable undo irf link-delay irf member 1 priority 1 # igmp-snooping # lldp global enable # system-working-mode standard hardware-resource switch-mode 0 hardware-resource routing-mode ipv6-64 hardware-resource vxlan l2gw fan prefer-direction slot 1 port-to-power password-recovery enable # vlan 1 # vlan 100 igmp-snooping enable igmp-snooping drop-unknown igmp-snooping querier igmp-snooping query-interval 30 igmp-snooping general-query source-ip 192.168.1.1 igmp-snooping special-query source-ip 192.168.1.1 # qos map-table dscp-dot1p import 8 export 5 import 9 export 0 import 10 export 0 import 11 export 0 import 12 export 0 import 13 export 0 import 14 export 0 import 15 export 0 import 16 export 0 import 17 export 0 import 18 export 0 import 19 export 0 import 20 export 0 import 21 export 0 import 22 export 0 import 23 export 0 import 24 export 0 import 25 export 0 import 26 export 5 import 27 export 0 import 28 export 0 import 29 export 0 import 30 export 0 import 31 export 0 import 32 export 6 import 33 export 0 import 34 export 0 import 35 export 0 import 36 export 0 import 37 export 0 import 38 export 0 import 39 export 0 import 40 export 0 import 41 export 0 import 42 export 0 import 43 export 0 import 44 export 0 import 45 export 0 import 46 export 6 import 47 export 0 import 48 export 0 import 49 export 0 import 50 export 0 import 51 export 0 import 52 export 0 import 53 export 0 import 54 export 0 import 55 export 0 import 57 export 0 import 58 export 0 import 59 export 0 import 60 export 0 import 61 export 0 import 62 export 0 import 63 export 0 # stp global enable # interface Bridge-Aggregation3 port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 link-aggregation mode dynamic # interface Bridge-Aggregation4 port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 link-aggregation mode dynamic # interface Bridge-Aggregation5 port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 link-aggregation mode dynamic # interface Bridge-Aggregation6 port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 link-aggregation mode dynamic # interface NULL0 # interface Vlan-interface1 ip address 192.168.0.1 255.255.255.0 dhcp client identifier ascii 4caea3ec1578-VLAN0001 # interface Vlan-interface100 ip address 192.168.1.1 255.255.255.0 igmp enable # interface HundredGigE1/0/49 port link-mode bridge # interface HundredGigE1/0/50 port link-mode bridge # interface HundredGigE1/0/51 port link-mode bridge # interface HundredGigE1/0/52 port link-mode bridge # interface HundredGigE1/0/53 port link-mode bridge # interface HundredGigE1/0/54 port link-mode bridge # interface M-GigabitEthernet0/0/0 dhcp client identifier hex 024caea3ec1578 # interface M-GigabitEthernet0/0/1 dhcp client identifier hex 024caea3ec1578 # interface Ten-GigabitEthernet1/0/1 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 3 # interface Ten-GigabitEthernet1/0/2 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 3 # interface Ten-GigabitEthernet1/0/3 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 3 # interface Ten-GigabitEthernet1/0/4 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 3 # interface Ten-GigabitEthernet1/0/5 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 4 # interface Ten-GigabitEthernet1/0/6 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 4 # interface Ten-GigabitEthernet1/0/7 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 4 # interface Ten-GigabitEthernet1/0/8 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 4 # interface Ten-GigabitEthernet1/0/9 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/10 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/11 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/12 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/13 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 6 # interface Ten-GigabitEthernet1/0/14 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 6 # interface Ten-GigabitEthernet1/0/15 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 6 # interface Ten-GigabitEthernet1/0/16 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 6 # interface Ten-GigabitEthernet1/0/17 port link-mode bridge # interface Ten-GigabitEthernet1/0/18 port link-mode bridge # interface Ten-GigabitEthernet1/0/19 port link-mode bridge # interface Ten-GigabitEthernet1/0/20 port link-mode bridge # interface Ten-GigabitEthernet1/0/21 port link-mode bridge # interface Ten-GigabitEthernet1/0/22 port link-mode bridge # interface Ten-GigabitEthernet1/0/23 port link-mode bridge # interface Ten-GigabitEthernet1/0/24 port link-mode bridge # interface Ten-GigabitEthernet1/0/25 port link-mode bridge # interface Ten-GigabitEthernet1/0/26 port link-mode bridge # interface Ten-GigabitEthernet1/0/27 port link-mode bridge # interface Ten-GigabitEthernet1/0/28 port link-mode bridge # interface Ten-GigabitEthernet1/0/29 port link-mode bridge # interface Ten-GigabitEthernet1/0/30 port link-mode bridge # interface Ten-GigabitEthernet1/0/31 port link-mode bridge # interface Ten-GigabitEthernet1/0/32 port link-mode bridge # interface Ten-GigabitEthernet1/0/33 port link-mode bridge # interface Ten-GigabitEthernet1/0/34 port link-mode bridge # interface Ten-GigabitEthernet1/0/35 port link-mode bridge # interface Ten-GigabitEthernet1/0/36 port link-mode bridge # interface Ten-GigabitEthernet1/0/37 port link-mode bridge # interface Ten-GigabitEthernet1/0/38 port link-mode bridge # interface Ten-GigabitEthernet1/0/39 port link-mode bridge # interface Ten-GigabitEthernet1/0/40 port link-mode bridge # interface Ten-GigabitEthernet1/0/41 port link-mode bridge # interface Ten-GigabitEthernet1/0/42 port link-mode bridge # interface Ten-GigabitEthernet1/0/43 port link-mode bridge # interface Ten-GigabitEthernet1/0/44 port link-mode bridge # interface Ten-GigabitEthernet1/0/45 port link-mode bridge # interface Ten-GigabitEthernet1/0/46 port link-mode bridge # interface Ten-GigabitEthernet1/0/47 port link-mode bridge # interface Ten-GigabitEthernet1/0/48 port link-mode bridge # scheduler logfile size 16 # line class aux authentication-mode scheme user-role network-admin # line class vty user-role network-operator # line aux 0 user-role network-admin # line vty 0 authentication-mode scheme user-role network-operator protocol inbound ssh # line vty 1 62 user-role network-operator # line vty 63 authentication-mode scheme user-role network-operator protocol inbound telnet # ssh server enable ssh user admin service-type stelnet authentication-type password # undo password-control aging enable undo password-control length enable undo password-control composition enable undo password-control history enable password-control login-attempt 3 exceed unlock password-control update-interval 0 password-control login idle-time 0 # radius scheme system user-name-format without-domain # domain system # domain default enable system # role name level-0 description Predefined level-0 role # role name level-1 description Predefined level-1 role # role name level-2 description Predefined level-2 role # role name level-3 description Predefined level-3 role # role name level-4 description Predefined level-4 role # role name level-5 description Predefined level-5 role # role name level-6 description Predefined level-6 role # role name level-7 description Predefined level-7 role # role name level-8 description Predefined level-8 role # role name level-9 description Predefined level-9 role # role name level-10 description Predefined level-10 role # role name level-11 description Predefined level-11 role # role name level-12 description Predefined level-12 role # role name level-13 description Predefined level-13 role # role name level-14 description Predefined level-14 role # user-group system # local-user admin class manage service-type ftp service-type telnet http https ssh terminal authorization-attribute user-profile admin authorization-attribute user-role netowrk-admin authorization-attribute user-role network-admin authorization-attribute user-role network-operator # ssl version ssl3.0 disable # ftp server enable # ip http enable ip https enable # return 
5510 (Front) Config 24X Encoders, 8X Decoders
# version 7.1.070, Release 3507-US # sysname FRONT # telnet server enable # irf mac-address persistent timer irf auto-update enable undo irf link-delay irf member 1 priority 1 # igmp-snooping # lldp global enable # password-recovery enable # vlan 1 # vlan 100 igmp-snooping enable igmp-snooping drop-unknown igmp-snooping query-interval 30 igmp-snooping general-query source-ip 192.168.1.1 igmp-snooping special-query source-ip 192.168.1.1 # qos map-table dscp-dot1p import 8 export 5 import 9 export 0 import 10 export 0 import 11 export 0 import 12 export 0 import 13 export 0 import 14 export 0 import 15 export 0 import 16 export 0 import 17 export 0 import 18 export 0 import 19 export 0 import 20 export 0 import 21 export 0 import 22 export 0 import 23 export 0 import 24 export 0 import 25 export 0 import 26 export 5 import 27 export 0 import 28 export 0 import 29 export 0 import 30 export 0 import 31 export 0 import 32 export 6 import 33 export 0 import 34 export 0 import 35 export 0 import 36 export 0 import 37 export 0 import 38 export 0 import 39 export 0 import 40 export 0 import 41 export 0 import 42 export 0 import 43 export 0 import 44 export 0 import 45 export 0 import 46 export 6 import 47 export 0 import 48 export 0 import 49 export 0 import 50 export 0 import 51 export 0 import 52 export 0 import 53 export 0 import 54 export 0 import 55 export 0 import 57 export 0 import 58 export 0 import 59 export 0 import 60 export 0 import 61 export 0 import 62 export 0 import 63 export 0 # stp global enable # interface Bridge-Aggregation5 port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 link-aggregation mode dynamic # interface NULL0 # interface Vlan-interface1 ip address 192.168.0.5 255.255.255.0 dhcp client identifier ascii 004caea3cd433e-VLAN0001 # interface Vlan-interface100 ip address 192.168.1.5 255.255.255.0 igmp enable # interface GigabitEthernet1/0/1 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/2 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/3 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/4 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/5 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/6 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/7 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/8 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/9 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/10 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/11 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/12 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/13 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/14 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/15 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/16 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/17 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/18 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/19 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/20 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/21 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/22 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/23 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/24 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/25 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/26 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/27 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/28 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/29 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/30 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/31 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/32 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/33 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/34 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/35 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/36 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/37 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/38 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/39 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/40 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/41 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/42 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/43 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/44 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/45 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/46 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/47 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/48 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface M-GigabitEthernet0/0/0 ip address dhcp-alloc dhcp client identifier hex 024caea3cd433e ipv6 address auto ipv6 address dhcp-alloc ipv6 dhcp client duid mac M-GigabitEthernet0/0/0 # interface Ten-GigabitEthernet1/0/49 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/50 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/51 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/52 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # scheduler logfile size 16 # line class aux authentication-mode scheme user-role network-admin # line class vty user-role network-operator # line aux 0 user-role network-admin # line vty 0 authentication-mode scheme user-role network-operator protocol inbound telnet # line vty 1 62 user-role network-operator # line vty 63 authentication-mode scheme user-role network-operator protocol inbound telnet # ssh server enable ssh user admin service-type stelnet authentication-type password # password-control enable undo password-control aging enable undo password-control length enable undo password-control composition enable undo password-control history enable password-control login-attempt 3 exceed unlock password-control update-interval 0 password-control login idle-time 0 # radius scheme system user-name-format without-domain # domain system # domain default enable system # role name level-0 description Predefined level-0 role # role name level-1 description Predefined level-1 role # role name level-2 description Predefined level-2 role # role name level-3 description Predefined level-3 role # role name level-4 description Predefined level-4 role # role name level-5 description Predefined level-5 role # role name level-6 description Predefined level-6 role # role name level-7 description Predefined level-7 role # role name level-8 description Predefined level-8 role # role name level-9 description Predefined level-9 role # role name level-10 description Predefined level-10 role # role name level-11 description Predefined level-11 role # role name level-12 description Predefined level-12 role # role name level-13 description Predefined level-13 role # role name level-14 description Predefined level-14 role # user-group system # local-user admin class manage service-type ftp service-type telnet http https ssh terminal authorization-attribute user-profile admin authorization-attribute user-role netowrk-admin authorization-attribute user-role network-admin authorization-attribute user-role netowrk-operator # ip http enable ip https enable # return 

5510 (Display) Config oX Encoders, 12X Decoders
# version 7.1.070, Release 3507-US # sysname Display # clock timezone Alaska minus 09:00:00 clock summer-time FDT 02:00:00 March second Sunday 02:00:00 November first Sunday 01:00:00 clock protocol none # telnet server enable # irf mac-address persistent timer irf auto-update enable undo irf link-delay irf member 1 priority 1 # igmp-snooping # lldp global enable # password-recovery enable # vlan 1 # vlan 100 igmp-snooping enable igmp-snooping drop-unknown igmp-snooping query-interval 30 igmp-snooping general-query source-ip 192.168.1.1 igmp-snooping special-query source-ip 192.168.1.1 # qos map-table dscp-dot1p import 8 export 5 import 9 export 0 import 10 export 0 import 11 export 0 import 12 export 0 import 13 export 0 import 14 export 0 import 15 export 0 import 16 export 0 import 17 export 0 import 18 export 0 import 19 export 0 import 20 export 0 import 21 export 0 import 22 export 0 import 23 export 0 import 24 export 0 import 25 export 0 import 26 export 5 import 27 export 0 import 28 export 0 import 29 export 0 import 30 export 0 import 31 export 0 import 32 export 6 import 33 export 0 import 34 export 0 import 35 export 0 import 36 export 0 import 37 export 0 import 38 export 0 import 39 export 0 import 40 export 0 import 41 export 0 import 42 export 0 import 43 export 0 import 44 export 0 import 45 export 0 import 46 export 6 import 47 export 0 import 48 export 0 import 49 export 0 import 50 export 0 import 51 export 0 import 52 export 0 import 53 export 0 import 54 export 0 import 55 export 0 import 57 export 0 import 58 export 0 import 59 export 0 import 60 export 0 import 61 export 0 import 62 export 0 import 63 export 0 # stp global enable # interface Bridge-Aggregation5 port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 link-aggregation mode dynamic # interface NULL0 # interface Vlan-interface1 ip address 192.168.0.4 255.255.255.0 # interface Vlan-interface100 ip address 192.168.1.4 255.255.255.0 pim dm igmp enable # interface GigabitEthernet1/0/1 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/2 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/3 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/4 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/5 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/6 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/7 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/8 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/9 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/10 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/11 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/12 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/13 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/14 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/15 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/16 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/17 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/18 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/19 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/20 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/21 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/22 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/23 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/24 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface M-GigabitEthernet0/0/0 ip address dhcp-alloc dhcp client identifier hex 024caea3cd433e ipv6 address auto ipv6 address dhcp-alloc ipv6 dhcp client duid mac M-GigabitEthernet0/0/0 # interface Ten-GigabitEthernet1/0/25 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/26 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/27 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/28 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # scheduler logfile size 16 # line class aux authentication-mode scheme user-role network-admin # line class vty user-role network-operator # line aux 0 user-role network-admin # line vty 0 authentication-mode scheme user-role network-operator protocol inbound telnet # line vty 1 62 user-role network-operator # line vty 63 authentication-mode scheme user-role network-operator protocol inbound telnet # ssh server enable ssh user admin service-type stelnet authentication-type password # password-control enable undo password-control aging enable undo password-control length enable undo password-control composition enable undo password-control history enable password-control login-attempt 3 exceed unlock password-control update-interval 0 password-control login idle-time 0 # radius scheme system user-name-format without-domain # domain system # domain default enable system # role name level-0 description Predefined level-0 role # role name level-1 description Predefined level-1 role # role name level-2 description Predefined level-2 role # role name level-3 description Predefined level-3 role # role name level-4 description Predefined level-4 role # role name level-5 description Predefined level-5 role # role name level-6 description Predefined level-6 role # role name level-7 description Predefined level-7 role # role name level-8 description Predefined level-8 role # role name level-9 description Predefined level-9 role # role name level-10 description Predefined level-10 role # role name level-11 description Predefined level-11 role # role name level-12 description Predefined level-12 role # role name level-13 description Predefined level-13 role # role name level-14 description Predefined level-14 role # user-group system # local-user admin class manage service-type ftp service-type telnet http https ssh terminal authorization-attribute user-profile admin authorization-attribute user-role netowrk-admin authorization-attribute user-role network-admin authorization-attribute user-role netowrk-operator # ip http enable ip https enable # return 
submitted by gcolhogue to networking [link] [comments]

First-time QOS configuration in a Cisco environment

I was wondering if I could get some help with a basic Cisco QOS configuration.
We're getting close to implementing a new VOIP solution on our network and I need to get everything configured. This is a cloud-based VOIP system so everything will be going out our ASA to the internet.
The vendor provided this for me to work off of so if I could get some pointers on where to look or a starting place I would appreciate it.

Information provided from vendor:
- Confirm QoS (Quality of Service) is configured on all the Routers
- Confirm LAN is honoring and prioritizing DSCP 26 for SIP at Layer 3
- Confirm LAN is honoring and prioritizing DSCP 46 for SIP at Layer 3
- Confirm LAN is honoring and prioritizing COS of 5 at Layer 2
There's some additional steps provided as well but this is where I need to start with everything.

Our firewall is a ASA 5516 and our core switch is doing all the layer 3 work, it's a 4500X.
I have a pretty good understanding of networking but QOS is one of those things I've never messed with. Anyone have some sample configs I can look over or some good websites outside of Cisco to get me started?
Thanks
submitted by tim829 to networking [link] [comments]

SG350x buffers

I have a few devices in an SG350X 24MP, with one of the ports being used as a 1G uplink to a 9200. The two main devices are each sending about 100mbit of UDP unicast.
With no DSCP flagging on the streams, I see loss on a downstream span port, and on the "Tail-Dropped Packets" queue
# show queue statistics Interface Queue Tx Packets Tx Bytes Tail-Dropped Tail-Dropped Packets Bytes ------------- ----- ------------ ------------ ------------- -------------- gi1/0/24 1 441855796 11528574147 107478106 26746022894 gi1/0/24 2 0 0 0 0 gi1/0/24 3 0 0 0 0 
If I set one of the streams as DSCP 26, it appears in queue 4. I still see losses in queue 1, but queue 4 is clean
 gi1/0/24 1 140975682 44018659645 1087676 1221720919 gi1/0/24 2 0 0 0 0 gi1/0/24 3 0 0 0 0 gi1/0/24 4 37439156 43151830269 0 0 gi1/0/24 5 0 0 0 0 
However if I set both to DSCP 26 (AF31 iirc), I see losses in queue 4
If I set one to DSCP 46 (EF), that lands in queue 7, which is great, and passes with no loss. Queue 4 still has losses though.
I'm assuming this is due to microbursts and traffic arriving from both devices at the same time (so 800kbit in a millisecond from device 1, and 800kbit in the same millisecond from device 2).
That's fine, I just want a millisecond of delay rather than drops, after all the aggregate bandwidth is only about 200mbit per second.
I think the Cisco only has 12Mb (bits, bytes?) of buffer for the entire switch, which seems crazilly low - from https://www.cisco.com/c/en_in/products/collateral/switches/small-business-smart-switches/data-sheet-c78-737359.html , but even 12mbit of buffer gives me a whole 6ms of both encoders running at 1mbit/millisecond.
Is there something I can do to improve the buffering situation? Tricks like softmax clearly don't work on such a cheap switch. Looking at a spanport there's occasional bursts of upto 800kbit in a millisecond (if you can believe tcpdump timings), but only for one or two milliseconds at a time, so I'm hopeful I'm not overflowing the buffer, and that it's more a misallocation of the buffer in some fashion.
submitted by GrumblingP to Cisco [link] [comments]

VSan Rdma with mellanox nic

Hey all I’ve got dell r740xd vsan ready nodes I’m trying to get RDMA working on with my vsan cluster running vsphere 7.
I’m getting an error in the skyline health section about the NIC not being in IEEE mode for rdma (it’s in CCE mode) I can’t figure out how to switch the mode. Has anyone had this issue and find a solution?
Thanks in advance!


EDIT: After the better part of the month back and forth with VMware and Mellanox I / we have come up with the solution. There are 3 pieces to this puzzle - Switch config, Mellanox config, and ESXi config. Here is what worked for me:

On the Cisco Nexus Switch(es) I set up qos and data center bridging (LLDP/DCBX):
!Enable Data Center Bridging (extension of LLDP)
feature lldp

!qos config for RDMA
class-map type qos match-all ROCE_CLASS
match cos 3
match dscp 26
policy-map type qos ROCE_POLICY
class ROCE_CLASS
set qos-group 3
policy-map type queuing ROCE_QUEUING_OUT
class type queuing c-out-8q-q3
bandwidth remaining percent 50
random-detect minimum-threshold 150 kbytes maximum-threshold 3000 kbytes drop-probability 7 weight 0 ecn
class type queuing c-out-8q-q2
bandwidth percent 0
class type queuing c-out-8q-q1
bandwidth percent 0
class type queuing c-out-8q-q-default
bandwidth remaining percent 50
class-map type network-qos match-any ROCE_NETWORK_CLASS
match qos-group 3
policy-map type network-qos ROCE_NETWORK_POLICY
class type network-qos ROCE_NETWORK_CLASS
pause pfc-cos 3
mtu 9216
class type network-qos c-8q-nq-default
mtu 9216
system qos
service-policy type network-qos ROCE_NETWORK_POLICY

!Run on all interfaces used for vsan/management
int eth
lldp dcbx version ieee
priority-flow-control mode on
priority-flow-control watch-dog-interval on
service-policy type qos input ROCE_POLICY
service-policy type queuing output ROCE_QUEUING_OUT

To configure the Mellanox NIC I needed to install a signed version of the Mellanox MFT and NMST tools on each of the vSan ESXi Hosts. The version that Mellanox told me to install was 4.14.3.3. Once installed, I ran the following commands to enable datacenter bridging and disable CEE mode.
/opt/mellanox/bin/mlxconfig -d mt4117_pciconf0 set LLDP_NB_DCBX_P1=1 LLDP_NB_RX_MODE_P1=2 LLDP_NB_TX_MODE_P1=2 LLDP_NB_DCBX_P2=1 LLDP_NB_RX_MODE_P2=2 LLDP_NB_TX_MODE_P2=2 DCBX_WILLING_P1=1 DCBX_IEEE_P1=1 DCBX_CEE_P1=0 DCBX_WILLING_P2=1 DCBX_IEEE_P2=1 DCBX_CEE_P2=0

/opt/mellanox/bin/mlxconfig -d mt4117_pciconf1 set LLDP_NB_DCBX_P1=1 LLDP_NB_RX_MODE_P1=2 LLDP_NB_TX_MODE_P1=2 LLDP_NB_DCBX_P2=1 LLDP_NB_RX_MODE_P2=2 LLDP_NB_TX_MODE_P2=2 DCBX_WILLING_P1=1 DCBX_IEEE_P1=1 DCBX_CEE_P1=0 DCBX_WILLING_P2=1 DCBX_IEEE_P2=1 DCBX_CEE_P2=0

Finally, enable hardware DCBX mode and force PFC to a value of 3 and DSCP t0 value 26 on the ESXi Host:
esxcli system module parameters set -m nmlx5_core -p dcbx=1
esxcli system module parameters set -m nmlx5_core -p "pfctx=0x08 pfcrx=0x08 trust_state=2 max_vfs=4"
esxcli system module parameters set -m nmlx5_rdma -p "pcp_force=3 dscp_force=26"

This Seemed to work for me, I have some more testing to do, but hope this helps the next guy trying to configure RDMA with vSan. I recommend reading through the mellanox tools user guide to get a understanding of each setting ran.




Here are some references I used:
cisco configs:
https://aboutnetworks.net/rocev2-on-nexus9k/

Enabling DSCP Based PFC:
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.storage.doc/GUID-B764140D-BCF3-4C99-8169-E5B058757518.html

Mellanox Driver settings
https://www.mellanox.com/related-docs/prod_software/Mellanox_MLNX-NATIVE-ESX-ConnectX-4-5_Driver_for_VMware_ESXi_6.7_User_Manual_v4.17.15.16.pdf

Mellanox config tools:
https://docs.mellanox.com/pages/viewpage.action?pageId=28940035

submitted by cirka95 to vmware [link] [comments]

Do i need srr-queue and mls qos trust?

Hi there!

My users are about 90% wireless. On our access switches (configured by a 3rd party before my time), the trunk ports for WAPs (1gb) and uplinks (10gb) have the following configs added:
srr-queue bandwidth share 1 30 35 5
priority-queue out
mls qos trust cos
auto qos trust

Overall mls config:
mls qos map cos-dscp 0 8 16 24 32 46 48 56
mls qos srr-queue output cos-map queue 1 threshold 3 4 5
mls qos srr-queue output cos-map queue 2 threshold 1 2
mls qos srr-queue output cos-map queue 2 threshold 2 3
mls qos srr-queue output cos-map queue 2 threshold 3 6 7
mls qos srr-queue output cos-map queue 3 threshold 3 0
mls qos srr-queue output cos-map queue 4 threshold 3 1
mls qos srr-queue output dscp-map queue 1 threshold 3 32 33 40 41 42 43 44 45
mls qos srr-queue output dscp-map queue 1 threshold 3 46 47
mls qos srr-queue output dscp-map queue 2 threshold 1 16 17 18 19 20 21 22 23
mls qos srr-queue output dscp-map queue 2 threshold 1 26 27 28 29 30 31 34 35
mls qos srr-queue output dscp-map queue 2 threshold 1 36 37 38 39
mls qos srr-queue output dscp-map queue 2 threshold 2 24
mls qos srr-queue output dscp-map queue 2 threshold 3 48 49 50 51 52 53 54 55
mls qos srr-queue output dscp-map queue 2 threshold 3 56 57 58 59 60 61 62 63
mls qos srr-queue output dscp-map queue 3 threshold 3 0 1 2 3 4 5 6 7
mls qos srr-queue output dscp-map queue 4 threshold 1 8 9 11 13 15
mls qos srr-queue output dscp-map queue 4 threshold 2 10 12 14
mls qos queue-set output 1 threshold 1 100 100 50 200
mls qos queue-set output 1 threshold 2 125 125 100 400
mls qos queue-set output 1 threshold 3 100 100 100 400
mls qos queue-set output 1 threshold 4 60 150 50 200
mls qos queue-set output 1 buffers 15 25 40 20
mls qos

Should I remove this from our WAPs and uplinks as we've been experiencing ongoing slowness (speeds get pretty bad) with Wifi for quite sometime. Thoughts? Our routers are 3rd party managed and already have QOS in place for voice, as they host our voip.
FYI---I'm still learning all the ins and outs of srr-queue, so any help would be great!
cross posted
submitted by dmissip to networking [link] [comments]

LLDP, Voice VLAN, and DSCP

I've got a customer using some Netgear switches for their small network and the phones don't seem to consistently be on one VLAN or another. It looks like what it's doing is inspecting the MAC on traffic, matching against an OUI list, and pushing the traffic to the voice VLAN. The phones are totally unaware that the voice VLAN exists, and they retain the values I push from my server for marking DSCP on SIP, RTP, and SRTP, and I see the switch learning the MAC in both VLANs.
If we change the configuration such that the phone learns the VLAN from LLDP, the phones revert all the DSCP settings to 0 for each instead of 26/46/46.
I replicated this on a TPLink switch I have at home both ways. At the very least my switch works consistently, where his sometimes works the first way and sometimes the second way. I referred him to Netgear support since it's not my switch and I'm not spending a lot of time fussing with it.
I am in the office today about to fire up an Extreme 210 and Cisco 4948 switch to see if they do the same thing when having the phone learn the voice VLAN via LLDP.
Is this normal behavior? I couldn't find anything on my switch at home for informing the phone of what DSCP values to use, only how to do mappings from dot1p to DSCP. Since we daisy chain phones, it seems like untrusting the port and marking traffic on the switch wouldn't be the way to go since if I understand right, that would mark traffic from the PC too.
His actual problem on site is very intermittent one way audio, and unless the switch is failing to work one way or the other mid way through calls I'm not thinking this is his actual problem anyway. More something I've noticed and something I'm asking for help understanding, more than happy to do reading if anyone has some links or books to point me towards too. For context I'm the HPBX vendor.
Edit: The DSCP values on the phone being all 0's are misleading. Either a firmware bug or a great design decision by someone. TCPdump right off the phone shows DSCP marked by the phone. Port mirror from the switch shows the same.
submitted by duck__yeah to networking [link] [comments]

Multi Switch Layer 2 multicast config

Hive mind, please help, I am desperate.
I'm banging my head against a wall trying to get a multicast video network to stabilize. Currently have 4x 5510 (JH147A and JH148A) 24 and 48 port switches and a single HPE5940 (JH390A) with roughly 60 encoders running to 30 decoders. I have video flowing and is somewhat stable.... Somewhat being key. There is instability whenever a decoder joins a multicast group, all the decoders will "flash" as a result of lost packets. Switch configs are attached. the 24 and 48 port 5510 switches have 4x10G uplinks to the 5940. Ill take any ideas. I've re-built this network from the ground up 4x in the last 3 days. Firmware is all current. Have a deployment of the same multicast video devices on another switch MFR and no issues.
QoS is configured as per MFR specs, IGMP and IGMP snooping are enabled. Only one querier is defined. All multicast devices are static'd inside vlan100.
Multicast Traffic from Crestron NVX and AES67 Audio
Multicast range is 232.1.X.X
Thank you in advance for any ideas you may have.
5940 Config:
# version 7.1.070, Release 2702P01-US # sysname A2C2 Core # clock timezone Alaska minus 09:00:00 clock summer-time FDT 02:00:00 March second Sunday 02:00:00 November first Sunday 01:00:00 clock protocol none # telnet server enable # irf mac-address persistent timer irf auto-update enable undo irf link-delay irf member 1 priority 1 # igmp-snooping # lldp global enable # system-working-mode standard hardware-resource switch-mode 0 hardware-resource routing-mode ipv6-64 hardware-resource vxlan l2gw fan prefer-direction slot 1 port-to-power password-recovery enable # vlan 1 # vlan 100 igmp-snooping enable igmp-snooping drop-unknown igmp-snooping querier igmp-snooping query-interval 30 igmp-snooping general-query source-ip 192.168.1.1 igmp-snooping special-query source-ip 192.168.1.1 # qos map-table dscp-dot1p import 8 export 5 import 9 export 0 import 10 export 0 import 11 export 0 import 12 export 0 import 13 export 0 import 14 export 0 import 15 export 0 import 16 export 0 import 17 export 0 import 18 export 0 import 19 export 0 import 20 export 0 import 21 export 0 import 22 export 0 import 23 export 0 import 24 export 0 import 25 export 0 import 26 export 5 import 27 export 0 import 28 export 0 import 29 export 0 import 30 export 0 import 31 export 0 import 32 export 6 import 33 export 0 import 34 export 0 import 35 export 0 import 36 export 0 import 37 export 0 import 38 export 0 import 39 export 0 import 40 export 0 import 41 export 0 import 42 export 0 import 43 export 0 import 44 export 0 import 45 export 0 import 46 export 6 import 47 export 0 import 48 export 0 import 49 export 0 import 50 export 0 import 51 export 0 import 52 export 0 import 53 export 0 import 54 export 0 import 55 export 0 import 57 export 0 import 58 export 0 import 59 export 0 import 60 export 0 import 61 export 0 import 62 export 0 import 63 export 0 # stp global enable # interface Bridge-Aggregation3 port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 link-aggregation mode dynamic # interface Bridge-Aggregation4 port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 link-aggregation mode dynamic # interface Bridge-Aggregation5 port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 link-aggregation mode dynamic # interface Bridge-Aggregation6 port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 link-aggregation mode dynamic # interface NULL0 # interface Vlan-interface1 ip address 192.168.0.1 255.255.255.0 dhcp client identifier ascii 4caea3ec1578-VLAN0001 # interface Vlan-interface100 ip address 192.168.1.1 255.255.255.0 igmp enable # interface HundredGigE1/0/49 port link-mode bridge # interface HundredGigE1/0/50 port link-mode bridge # interface HundredGigE1/0/51 port link-mode bridge # interface HundredGigE1/0/52 port link-mode bridge # interface HundredGigE1/0/53 port link-mode bridge # interface HundredGigE1/0/54 port link-mode bridge # interface M-GigabitEthernet0/0/0 dhcp client identifier hex 024caea3ec1578 # interface M-GigabitEthernet0/0/1 dhcp client identifier hex 024caea3ec1578 # interface Ten-GigabitEthernet1/0/1 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 3 # interface Ten-GigabitEthernet1/0/2 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 3 # interface Ten-GigabitEthernet1/0/3 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 3 # interface Ten-GigabitEthernet1/0/4 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 3 # interface Ten-GigabitEthernet1/0/5 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 4 # interface Ten-GigabitEthernet1/0/6 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 4 # interface Ten-GigabitEthernet1/0/7 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 4 # interface Ten-GigabitEthernet1/0/8 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 4 # interface Ten-GigabitEthernet1/0/9 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/10 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/11 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/12 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/13 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 6 # interface Ten-GigabitEthernet1/0/14 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 6 # interface Ten-GigabitEthernet1/0/15 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 6 # interface Ten-GigabitEthernet1/0/16 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 6 # interface Ten-GigabitEthernet1/0/17 port link-mode bridge # interface Ten-GigabitEthernet1/0/18 port link-mode bridge # interface Ten-GigabitEthernet1/0/19 port link-mode bridge # interface Ten-GigabitEthernet1/0/20 port link-mode bridge # interface Ten-GigabitEthernet1/0/21 port link-mode bridge # interface Ten-GigabitEthernet1/0/22 port link-mode bridge # interface Ten-GigabitEthernet1/0/23 port link-mode bridge # interface Ten-GigabitEthernet1/0/24 port link-mode bridge # interface Ten-GigabitEthernet1/0/25 port link-mode bridge # interface Ten-GigabitEthernet1/0/26 port link-mode bridge # interface Ten-GigabitEthernet1/0/27 port link-mode bridge # interface Ten-GigabitEthernet1/0/28 port link-mode bridge # interface Ten-GigabitEthernet1/0/29 port link-mode bridge # interface Ten-GigabitEthernet1/0/30 port link-mode bridge # interface Ten-GigabitEthernet1/0/31 port link-mode bridge # interface Ten-GigabitEthernet1/0/32 port link-mode bridge # interface Ten-GigabitEthernet1/0/33 port link-mode bridge # interface Ten-GigabitEthernet1/0/34 port link-mode bridge # interface Ten-GigabitEthernet1/0/35 port link-mode bridge # interface Ten-GigabitEthernet1/0/36 port link-mode bridge # interface Ten-GigabitEthernet1/0/37 port link-mode bridge # interface Ten-GigabitEthernet1/0/38 port link-mode bridge # interface Ten-GigabitEthernet1/0/39 port link-mode bridge # interface Ten-GigabitEthernet1/0/40 port link-mode bridge # interface Ten-GigabitEthernet1/0/41 port link-mode bridge # interface Ten-GigabitEthernet1/0/42 port link-mode bridge # interface Ten-GigabitEthernet1/0/43 port link-mode bridge # interface Ten-GigabitEthernet1/0/44 port link-mode bridge # interface Ten-GigabitEthernet1/0/45 port link-mode bridge # interface Ten-GigabitEthernet1/0/46 port link-mode bridge # interface Ten-GigabitEthernet1/0/47 port link-mode bridge # interface Ten-GigabitEthernet1/0/48 port link-mode bridge # scheduler logfile size 16 # line class aux authentication-mode scheme user-role network-admin # line class vty user-role network-operator # line aux 0 user-role network-admin # line vty 0 authentication-mode scheme user-role network-operator protocol inbound ssh # line vty 1 62 user-role network-operator # line vty 63 authentication-mode scheme user-role network-operator protocol inbound telnet # ssh server enable ssh user admin service-type stelnet authentication-type password # undo password-control aging enable undo password-control length enable undo password-control composition enable undo password-control history enable password-control login-attempt 3 exceed unlock password-control update-interval 0 password-control login idle-time 0 # radius scheme system user-name-format without-domain # domain system # domain default enable system # role name level-0 description Predefined level-0 role # role name level-1 description Predefined level-1 role # role name level-2 description Predefined level-2 role # role name level-3 description Predefined level-3 role # role name level-4 description Predefined level-4 role # role name level-5 description Predefined level-5 role # role name level-6 description Predefined level-6 role # role name level-7 description Predefined level-7 role # role name level-8 description Predefined level-8 role # role name level-9 description Predefined level-9 role # role name level-10 description Predefined level-10 role # role name level-11 description Predefined level-11 role # role name level-12 description Predefined level-12 role # role name level-13 description Predefined level-13 role # role name level-14 description Predefined level-14 role # user-group system # local-user admin class manage service-type ftp service-type telnet http https ssh terminal authorization-attribute user-profile admin authorization-attribute user-role netowrk-admin authorization-attribute user-role network-admin authorization-attribute user-role network-operator # ssl version ssl3.0 disable # ftp server enable # ip http enable ip https enable # return 
5510 (Front) Config 24X Encoders, 8X Decoders
# version 7.1.070, Release 3507-US # sysname FRONT # telnet server enable # irf mac-address persistent timer irf auto-update enable undo irf link-delay irf member 1 priority 1 # igmp-snooping # lldp global enable # password-recovery enable # vlan 1 # vlan 100 igmp-snooping enable igmp-snooping drop-unknown igmp-snooping query-interval 30 igmp-snooping general-query source-ip 192.168.1.1 igmp-snooping special-query source-ip 192.168.1.1 # qos map-table dscp-dot1p import 8 export 5 import 9 export 0 import 10 export 0 import 11 export 0 import 12 export 0 import 13 export 0 import 14 export 0 import 15 export 0 import 16 export 0 import 17 export 0 import 18 export 0 import 19 export 0 import 20 export 0 import 21 export 0 import 22 export 0 import 23 export 0 import 24 export 0 import 25 export 0 import 26 export 5 import 27 export 0 import 28 export 0 import 29 export 0 import 30 export 0 import 31 export 0 import 32 export 6 import 33 export 0 import 34 export 0 import 35 export 0 import 36 export 0 import 37 export 0 import 38 export 0 import 39 export 0 import 40 export 0 import 41 export 0 import 42 export 0 import 43 export 0 import 44 export 0 import 45 export 0 import 46 export 6 import 47 export 0 import 48 export 0 import 49 export 0 import 50 export 0 import 51 export 0 import 52 export 0 import 53 export 0 import 54 export 0 import 55 export 0 import 57 export 0 import 58 export 0 import 59 export 0 import 60 export 0 import 61 export 0 import 62 export 0 import 63 export 0 # stp global enable # interface Bridge-Aggregation5 port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 link-aggregation mode dynamic # interface NULL0 # interface Vlan-interface1 ip address 192.168.0.5 255.255.255.0 dhcp client identifier ascii 004caea3cd433e-VLAN0001 # interface Vlan-interface100 ip address 192.168.1.5 255.255.255.0 igmp enable # interface GigabitEthernet1/0/1 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/2 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/3 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/4 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/5 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/6 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/7 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/8 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/9 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/10 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/11 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/12 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/13 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/14 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/15 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/16 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/17 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/18 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/19 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/20 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/21 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/22 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/23 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/24 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/25 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/26 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/27 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/28 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/29 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/30 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/31 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/32 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/33 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/34 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/35 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/36 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/37 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/38 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/39 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/40 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port # interface GigabitEthernet1/0/41 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/42 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/43 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/44 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/45 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/46 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/47 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/48 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface M-GigabitEthernet0/0/0 ip address dhcp-alloc dhcp client identifier hex 024caea3cd433e ipv6 address auto ipv6 address dhcp-alloc ipv6 dhcp client duid mac M-GigabitEthernet0/0/0 # interface Ten-GigabitEthernet1/0/49 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/50 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/51 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/52 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # scheduler logfile size 16 # line class aux authentication-mode scheme user-role network-admin # line class vty user-role network-operator # line aux 0 user-role network-admin # line vty 0 authentication-mode scheme user-role network-operator protocol inbound telnet # line vty 1 62 user-role network-operator # line vty 63 authentication-mode scheme user-role network-operator protocol inbound telnet # ssh server enable ssh user admin service-type stelnet authentication-type password # password-control enable undo password-control aging enable undo password-control length enable undo password-control composition enable undo password-control history enable password-control login-attempt 3 exceed unlock password-control update-interval 0 password-control login idle-time 0 # radius scheme system user-name-format without-domain # domain system # domain default enable system # role name level-0 description Predefined level-0 role # role name level-1 description Predefined level-1 role # role name level-2 description Predefined level-2 role # role name level-3 description Predefined level-3 role # role name level-4 description Predefined level-4 role # role name level-5 description Predefined level-5 role # role name level-6 description Predefined level-6 role # role name level-7 description Predefined level-7 role # role name level-8 description Predefined level-8 role # role name level-9 description Predefined level-9 role # role name level-10 description Predefined level-10 role # role name level-11 description Predefined level-11 role # role name level-12 description Predefined level-12 role # role name level-13 description Predefined level-13 role # role name level-14 description Predefined level-14 role # user-group system # local-user admin class manage service-type ftp service-type telnet http https ssh terminal authorization-attribute user-profile admin authorization-attribute user-role netowrk-admin authorization-attribute user-role network-admin authorization-attribute user-role netowrk-operator # ip http enable ip https enable # return 
5510 (Display) Config oX Encoders, 12X Decoders
# version 7.1.070, Release 3507-US # sysname Display # clock timezone Alaska minus 09:00:00 clock summer-time FDT 02:00:00 March second Sunday 02:00:00 November first Sunday 01:00:00 clock protocol none # telnet server enable # irf mac-address persistent timer irf auto-update enable undo irf link-delay irf member 1 priority 1 # igmp-snooping # lldp global enable # password-recovery enable # vlan 1 # vlan 100 igmp-snooping enable igmp-snooping drop-unknown igmp-snooping query-interval 30 igmp-snooping general-query source-ip 192.168.1.1 igmp-snooping special-query source-ip 192.168.1.1 # qos map-table dscp-dot1p import 8 export 5 import 9 export 0 import 10 export 0 import 11 export 0 import 12 export 0 import 13 export 0 import 14 export 0 import 15 export 0 import 16 export 0 import 17 export 0 import 18 export 0 import 19 export 0 import 20 export 0 import 21 export 0 import 22 export 0 import 23 export 0 import 24 export 0 import 25 export 0 import 26 export 5 import 27 export 0 import 28 export 0 import 29 export 0 import 30 export 0 import 31 export 0 import 32 export 6 import 33 export 0 import 34 export 0 import 35 export 0 import 36 export 0 import 37 export 0 import 38 export 0 import 39 export 0 import 40 export 0 import 41 export 0 import 42 export 0 import 43 export 0 import 44 export 0 import 45 export 0 import 46 export 6 import 47 export 0 import 48 export 0 import 49 export 0 import 50 export 0 import 51 export 0 import 52 export 0 import 53 export 0 import 54 export 0 import 55 export 0 import 57 export 0 import 58 export 0 import 59 export 0 import 60 export 0 import 61 export 0 import 62 export 0 import 63 export 0 # stp global enable # interface Bridge-Aggregation5 port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 link-aggregation mode dynamic # interface NULL0 # interface Vlan-interface1 ip address 192.168.0.4 255.255.255.0 # interface Vlan-interface100 ip address 192.168.1.4 255.255.255.0 pim dm igmp enable # interface GigabitEthernet1/0/1 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/2 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/3 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/4 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/5 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/6 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/7 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/8 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/9 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/10 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/11 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/12 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/13 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/14 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/15 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/16 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/17 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/18 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/19 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/20 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/21 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/22 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/23 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface GigabitEthernet1/0/24 port link-mode bridge port access vlan 100 igmp-snooping fast-leave vlan 100 stp edged-port poe enable # interface M-GigabitEthernet0/0/0 ip address dhcp-alloc dhcp client identifier hex 024caea3cd433e ipv6 address auto ipv6 address dhcp-alloc ipv6 dhcp client duid mac M-GigabitEthernet0/0/0 # interface Ten-GigabitEthernet1/0/25 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/26 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/27 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # interface Ten-GigabitEthernet1/0/28 port link-mode bridge port link-type trunk port trunk permit vlan all port trunk pvid vlan 100 port link-aggregation group 5 # scheduler logfile size 16 # line class aux authentication-mode scheme user-role network-admin # line class vty user-role network-operator # line aux 0 user-role network-admin # line vty 0 authentication-mode scheme user-role network-operator protocol inbound telnet # line vty 1 62 user-role network-operator # line vty 63 authentication-mode scheme user-role network-operator protocol inbound telnet # ssh server enable ssh user admin service-type stelnet authentication-type password # password-control enable undo password-control aging enable undo password-control length enable undo password-control composition enable undo password-control history enable password-control login-attempt 3 exceed unlock password-control update-interval 0 password-control login idle-time 0 # radius scheme system user-name-format without-domain # domain system # domain default enable system # role name level-0 description Predefined level-0 role # role name level-1 description Predefined level-1 role # role name level-2 description Predefined level-2 role # role name level-3 description Predefined level-3 role # role name level-4 description Predefined level-4 role # role name level-5 description Predefined level-5 role # role name level-6 description Predefined level-6 role # role name level-7 description Predefined level-7 role # role name level-8 description Predefined level-8 role # role name level-9 description Predefined level-9 role # role name level-10 description Predefined level-10 role # role name level-11 description Predefined level-11 role # role name level-12 description Predefined level-12 role # role name level-13 description Predefined level-13 role # role name level-14 description Predefined level-14 role # user-group system # local-user admin class manage service-type ftp service-type telnet http https ssh terminal authorization-attribute user-profile admin authorization-attribute user-role netowrk-admin authorization-attribute user-role network-admin authorization-attribute user-role netowrk-operator # ip http enable ip https enable # return 
submitted by gcolhogue to techsupport [link] [comments]

Does drops on queueing affect IP SLA icmp-echo?

Hi All,
Is there any possibility that that drops on output queue affects the IP SLA probe when sending icmp-echo? Drop is randomly happening and when I ping point-to-point I'm not able to detect any drops.
LOGS: 05:00:20.847: %TRACK-6-STATE: 11 ip sla 11 reachability Up -> Down 05:00:20.847: %TRACK-6-STATE: 21 ip sla 21 reachability Up -> Down 05:00:20.847: %TRACK-6-STATE: 31 ip sla 31 reachability Up -> Down 05:00:55.899: %TRACK-6-STATE: 21 ip sla 21 reachability Down -> Up 05:01:00.899: %TRACK-6-STATE: 11 ip sla 11 reachability Down -> Up 05:01:00.899: %TRACK-6-STATE: 31 ip sla 31 reachability Down -> Up 06:38:26.360: %TRACK-6-STATE: 11 ip sla 11 reachability Up -> Down 06:38:26.360: %TRACK-6-STATE: 21 ip sla 21 reachability Up -> Down 06:38:26.360: %TRACK-6-STATE: 31 ip sla 31 reachability Up -> Down 06:39:06.408: %TRACK-6-STATE: 11 ip sla 11 reachability Down -> Up 06:39:06.408: %TRACK-6-STATE: 21 ip sla 21 reachability Down -> Up 06:39:06.408: %TRACK-6-STATE: 31 ip sla 31 reachability Down -> Up 11 ip sla 11 reachability Up 00:48:28 21 ip sla 21 reachability Up 00:48:28 31 ip sla 31 reachability Up 00:48:28 #ping 10.1.2.1 source 10.1.2.2 repeat 5000 size 1500 df-bit (cut) !!!!!!!!!!!!!!!!!!!!!!!!!!!!!! Success rate is 100 percent (5000/5000), round-trip min/avg/max = 1/2/32 ms #sh policy-map int g0/1 GigabitEthernet0/1 Service-policy output: etm-GrupoSalinas-Elektra-lima Class-map: class-default (match-any) 261661475791 packets, 146841546500637 bytes 30 second offered rate 11024000 bps, drop rate 0000 bps Match: any Queueing queue limit 4096 packets (queue depth/total drops/no-buffer drops) 0/1011428/0 <--- no inc. as of now (pkts output/bytes output) 261660459030/152073955468691 shape (average) cir 30000000, bc 140000, be 0 target shape rate 30000000 Overhead Accounting Enabled No Congestion at the time that the total drop increased.. Could be bursty traffic.. 
Here's the QOS policy:
Router in question: policy-map parent-policy class class-default shape average 30000000 140000 0 account user-defined 20 queue-limit 4096 packets 
From other site, Nested QOS is being implemented. Should I replicate this on this site and this purpose of this child policy is prioritize the traffic and smoothen the connection?
Working site: policy-map parent-policy class class-default shape average 150000000 600000 0 service-policy child-policy <-- Child ! policy-map child-policy class realtime priority class priority bandwidth remaining percent 40 random-detect dscp-based class missioncritical bandwidth remaining percent 39 random-detect dscp-based class transactional bandwidth remaining percent 16 random-detect dscp-based class general bandwidth remaining percent 1 random-detect dscp-based class class-default bandwidth remaining percent 4 random-detect dscp-based 10 ip sla 10 reachability Up 1w2d <- Stable 
Thank you
submitted by 1searching to networking [link] [comments]

Ports going Up/Down on regulars basis..what could be the cause?

Long story short, I'm a server admin, trying to play network admin right now and solve an ongoing issue. Multiple ports are going up/down all at the same time, knocking devices offline. I originally thought this was some sort of spanning tree related issue, but we disabled spanning tree as a test on this switch, and the issue is still occurring randomly. I'm at a lost what else could be causing this to occur simultaneously across multiple ports. If anyone has any suggestions, I would be grateful!
Log Output:
Jan 20 00:27:41.858: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/8, changed state to up Jan 20 00:27:41.900: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/7, changed state to up Jan 20 15:19:51.368: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/5, changed state to down Jan 20 15:19:51.368: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/6, changed state to down Jan 20 15:19:51.410: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/8, changed state to down Jan 20 15:19:51.452: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/7, changed state to down Jan 20 15:19:52.366: %LINK-3-UPDOWN: Interface FastEthernet2/5, changed state to down Jan 20 15:19:52.374: %LINK-3-UPDOWN: Interface FastEthernet2/6, changed state to down Jan 20 15:19:52.408: %LINK-3-UPDOWN: Interface FastEthernet2/8, changed state to down Jan 20 15:19:52.450: %LINK-3-UPDOWN: Interface FastEthernet2/7, changed state to down Jan 20 15:19:54.707: %LINK-3-UPDOWN: Interface FastEthernet2/5, changed state to up Jan 20 15:19:54.715: %LINK-3-UPDOWN: Interface FastEthernet2/6, changed state to up Jan 20 15:19:54.748: %LINK-3-UPDOWN: Interface FastEthernet2/8, changed state to up Jan 20 15:19:54.790: %LINK-3-UPDOWN: Interface FastEthernet2/7, changed state to up Jan 20 15:19:55.713: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/5, changed state to up Jan 20 15:19:55.722: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/6, changed state to up Jan 20 15:19:55.755: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/8, changed state to up Jan 20 15:19:55.797: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/7, changed state to up Jan 20 15:20:37.237: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/5, changed state to down Jan 20 15:20:37.245: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/6, changed state to down Jan 20 15:20:37.287: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/8, changed state to down Jan 20 15:20:37.329: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/7, changed state to down Jan 20 15:20:38.243: %LINK-3-UPDOWN: Interface FastEthernet2/5, changed state to down Jan 20 15:20:38.243: %LINK-3-UPDOWN: Interface FastEthernet2/6, changed state to down Jan 20 15:20:38.285: %LINK-3-UPDOWN: Interface FastEthernet2/8, changed state to down Jan 20 15:20:38.327: %LINK-3-UPDOWN: Interface FastEthernet2/7, changed state to down Jan 20 15:20:40.584: %LINK-3-UPDOWN: Interface FastEthernet2/5, changed state to up Jan 20 15:20:40.592: %LINK-3-UPDOWN: Interface FastEthernet2/6, changed state to up Jan 20 15:20:40.626: %LINK-3-UPDOWN: Interface FastEthernet2/8, changed state to up Jan 20 15:20:40.668: %LINK-3-UPDOWN: Interface FastEthernet2/7, changed state to up Jan 20 15:20:41.590: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/5, changed state to up Jan 20 15:20:41.599: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/6, changed state to up Jan 20 15:20:41.632: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/8, changed state to up Jan 20 15:20:41.674: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/7, changed state to up Jan 20 19:10:22.815: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/5, changed state to down Jan 20 19:10:23.737: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet2/7, changed state to down Jan 20 19:10:23.813: %LINK-3-UPDOWN: Interface FastEthernet2/5, changed state to down Jan 20 19:10:24.736: %LINK-3-UPDOWN: Interface FastEthernet2/7, changed state to down Jan 20 19:10:26.153: %LINK-3-UPDOWN: Interface FastEthernet2/5, changed state to up Jan 20 19:10:27.085: %LINK-3-UPDOWN: Interface FastEthernet2/7, changed state to up 

Config:

! ! Last configuration change at 13:33:22 MST Mon Jan 18 2021 ! NVRAM config last updated at 13:33:22 MST Mon Jan 18 2021 ! version 12.2 no service pad service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption ! hostname xxxxxxx ! boot-start-marker boot-end-marker ! enable secret 5 xxxxxxxxxxxxxxxxxxxxxxxxxxxx ! ! ! macro global description cisco-global | cisco-ie-global | cisco-ie-qos-map-setup | cisco-ie-qos-queue-setup no aaa new-model clock timezone MST -7 system mtu routing 1500 ptp mode e2etransparent udld aggressive ! ip dhcp pool mgmt_pool network 169.254.0.0 255.255.255.248 default-router 169.254.0.1 dns-server 169.254.0.1 lease 0 0 1 ! ! ip arp inspection vlan 1000 ip arp inspection vlan 1000 logging dhcp-bindings none ip igmp snooping querier ! mls qos map policed-dscp 24 27 31 43 46 47 55 59 to 0 mls qos map dscp-cos 9 11 12 13 14 15 to 0 mls qos map dscp-cos 25 26 28 29 30 to 2 mls qos map dscp-cos 40 41 42 44 45 49 50 51 to 4 mls qos map dscp-cos 52 53 54 56 57 58 60 61 to 4 mls qos map dscp-cos 62 63 to 4 mls qos map cos-dscp 0 8 16 27 32 47 55 59 mls qos srr-queue input bandwidth 40 60 mls qos srr-queue input threshold 1 16 66 mls qos srr-queue input threshold 2 34 66 mls qos srr-queue input buffers 40 60 mls qos srr-queue input cos-map queue 1 threshold 2 1 mls qos srr-queue input cos-map queue 1 threshold 3 0 2 mls qos srr-queue input cos-map queue 2 threshold 2 4 mls qos srr-queue input cos-map queue 2 threshold 3 3 5 6 7 mls qos srr-queue input dscp-map queue 1 threshold 2 8 10 mls qos srr-queue input dscp-map queue 1 threshold 3 0 1 2 3 4 5 6 7 mls qos srr-queue input dscp-map queue 1 threshold 3 9 11 12 13 14 15 16 17 mls qos srr-queue input dscp-map queue 1 threshold 3 18 19 20 21 22 23 25 26 mls qos srr-queue input dscp-map queue 1 threshold 3 28 29 30 mls qos srr-queue input dscp-map queue 2 threshold 2 32 33 34 35 36 37 38 39 mls qos srr-queue input dscp-map queue 2 threshold 2 40 41 42 44 45 49 50 51 mls qos srr-queue input dscp-map queue 2 threshold 2 52 53 54 56 57 58 60 61 mls qos srr-queue input dscp-map queue 2 threshold 2 62 63 mls qos srr-queue input dscp-map queue 2 threshold 3 24 27 31 43 46 47 48 55 mls qos srr-queue input dscp-map queue 2 threshold 3 59 mls qos srr-queue output cos-map queue 1 threshold 3 7 mls qos srr-queue output cos-map queue 2 threshold 2 1 mls qos srr-queue output cos-map queue 2 threshold 3 0 2 4 mls qos srr-queue output cos-map queue 3 threshold 3 5 6 mls qos srr-queue output cos-map queue 4 threshold 3 3 mls qos srr-queue output dscp-map queue 1 threshold 3 59 mls qos srr-queue output dscp-map queue 2 threshold 2 8 10 mls qos srr-queue output dscp-map queue 2 threshold 3 0 1 2 3 4 5 6 7 mls qos srr-queue output dscp-map queue 2 threshold 3 9 11 12 13 14 15 16 17 mls qos srr-queue output dscp-map queue 2 threshold 3 18 19 20 21 22 23 25 26 mls qos srr-queue output dscp-map queue 2 threshold 3 28 29 30 32 33 34 35 36 mls qos srr-queue output dscp-map queue 2 threshold 3 37 38 39 40 41 42 44 45 mls qos srr-queue output dscp-map queue 2 threshold 3 49 50 51 52 53 54 56 57 mls qos srr-queue output dscp-map queue 2 threshold 3 58 60 61 62 63 mls qos srr-queue output dscp-map queue 3 threshold 3 43 46 47 48 55 mls qos srr-queue output dscp-map queue 4 threshold 3 24 27 31 mls qos queue-set output 1 buffers 10 25 40 25 mls qos queue-set output 2 buffers 10 25 40 25 no mls qos rewrite ip dscp mls qos ! ! ! errdisable recovery cause link-flap errdisable recovery interval 60 no mac authentication mac authentication table version 0 ! spanning-tree mode pvst spanning-tree loopguard default spanning-tree extend system-id no spanning-tree vlan 1-1014 ! alarm profile defaultPort alarm 3 syslog 3 notifies 3 ! ! vlan internal allocation policy ascending lldp run ! ! class-map match-all 1588-PTP-General match access-group 107 class-map match-all 1588-PTP-Event match access-group 106 class-map match-all CIP-Implicit_dscp_any match access-group 104 class-map match-all CIP-Other match access-group 105 class-map match-all voip-data match ip dscp ef class-map match-all voip-control match ip dscp cs3 af31 class-map match-all CIP-Implicit_dscp_43 match access-group 103 class-map match-all CIP-Implicit_dscp_55 match access-group 101 class-map match-all CIP-Implicit_dscp_47 match access-group 102 ! ! policy-map Voice-Map class voip-data set dscp ef police 320000 8000 exceed-action policed-dscp-transmit class voip-control set dscp cs3 police 32000 8000 exceed-action policed-dscp-transmit policy-map CIP-PTP-Traffic class CIP-Implicit_dscp_55 set ip dscp 55 class CIP-Implicit_dscp_47 set ip dscp 47 class CIP-Implicit_dscp_43 set ip dscp 43 class CIP-Implicit_dscp_any set ip dscp 31 class CIP-Other set ip dscp 27 class 1588-PTP-Event set ip dscp 59 class 1588-PTP-General set ip dscp 47 ! ! ! interface FastEthernet1/1 switchport mode access ip arp inspection trust spanning-tree portfast ! interface FastEthernet1/2 ! interface FastEthernet1/3 description xxxxxx switchport mode trunk ! interface FastEthernet1/4 ! interface FastEthernet1/5 switchport mode access srr-queue bandwidth share 1 19 40 40 priority-queue out storm-control broadcast level 3.00 1.00 macro description cisco-ethernetip spanning-tree portfast service-policy input CIP-PTP-Traffic ! interface FastEthernet1/6 ! interface FastEthernet1/7 ! interface FastEthernet1/8 ! interface FastEthernet2/1 switchport mode access srr-queue bandwidth share 1 19 40 40 priority-queue out storm-control broadcast level 3.00 1.00 macro description cisco-ethernetip spanning-tree portfast service-policy input CIP-PTP-Traffic ! interface FastEthernet2/2 switchport mode access srr-queue bandwidth share 1 19 40 40 priority-queue out storm-control broadcast level 3.00 1.00 macro description cisco-ethernetip spanning-tree portfast service-policy input CIP-PTP-Traffic ! interface FastEthernet2/3 switchport mode access srr-queue bandwidth share 1 19 40 40 priority-queue out storm-control broadcast level 3.00 1.00 macro description cisco-ethernetip spanning-tree portfast service-policy input CIP-PTP-Traffic ! interface FastEthernet2/4 switchport mode access srr-queue bandwidth share 1 19 40 40 priority-queue out storm-control broadcast level 3.00 1.00 macro description cisco-ethernetip spanning-tree portfast service-policy input CIP-PTP-Traffic ! interface FastEthernet2/5 description xxxxxxx switchport mode access speed 100 duplex full srr-queue bandwidth share 1 19 40 40 priority-queue out storm-control broadcast level 3.00 1.00 macro description cisco-ethernetip spanning-tree portfast service-policy input CIP-PTP-Traffic ! interface FastEthernet2/6 description xxxxxxx switchport mode access speed 100 duplex full srr-queue bandwidth share 1 19 40 40 priority-queue out storm-control broadcast level 3.00 1.00 macro description cisco-ethernetip spanning-tree portfast service-policy input CIP-PTP-Traffic ! interface FastEthernet2/7 description xxxxxxxx switchport mode access speed 100 duplex full srr-queue bandwidth share 1 19 40 40 priority-queue out storm-control broadcast level 3.00 1.00 macro description cisco-ethernetip spanning-tree portfast service-policy input CIP-PTP-Traffic ! interface FastEthernet2/8 description xxxxxxx switchport mode access speed 100 duplex full srr-queue bandwidth share 1 19 40 40 priority-queue out storm-control broadcast level 3.00 1.00 macro description cisco-ethernetip spanning-tree portfast service-policy input CIP-PTP-Traffic ! interface GigabitEthernet1/1 description xxxxxxx switchport mode trunk media-type sfp duplex full srr-queue bandwidth share 1 19 40 40 priority-queue out mls qos trust cos macro description cisco-ie-switch spanning-tree link-type point-to-point service-policy input CIP-PTP-Traffic ! interface GigabitEthernet1/2 description xxxxxxxxx switchport mode trunk media-type sfp duplex full srr-queue bandwidth share 1 19 40 40 priority-queue out mls qos trust cos macro description cisco-ie-switch spanning-tree link-type point-to-point service-policy input CIP-PTP-Traffic ! interface Vlan1 ip address 10.0.133.225 255.255.255.0 no ip route-cache cip enable ! interface Vlan1000 ip address 169.254.0.1 255.255.255.248 no ip route-cache ! ip http server access-list 101 permit udp any eq 2222 any dscp 55 access-list 102 permit udp any eq 2222 any dscp 47 access-list 103 permit udp any eq 2222 any dscp 43 access-list 104 permit udp any eq 2222 any access-list 105 permit udp any eq 44818 any access-list 105 permit tcp any eq 44818 any access-list 106 permit udp any eq 319 any access-list 107 permit udp any eq 320 any no cdp run no cdp tlv location no cdp tlv app end 
submitted by Mental-Minimum7011 to Cisco [link] [comments]

Do i need srr-queue and mls qos trust?

Hi there!
My users are about 90% wireless. On our access switches (configured by a 3rd party before my time), the trunk ports for WAPs (1gb) and uplinks (10gb) have the following configs added:
srr-queue bandwidth share 1 30 35 5
priority-queue out
mls qos trust cos
auto qos trust

Overall mls config:
mls qos map cos-dscp 0 8 16 24 32 46 48 56
mls qos srr-queue output cos-map queue 1 threshold 3 4 5
mls qos srr-queue output cos-map queue 2 threshold 1 2
mls qos srr-queue output cos-map queue 2 threshold 2 3
mls qos srr-queue output cos-map queue 2 threshold 3 6 7
mls qos srr-queue output cos-map queue 3 threshold 3 0
mls qos srr-queue output cos-map queue 4 threshold 3 1
mls qos srr-queue output dscp-map queue 1 threshold 3 32 33 40 41 42 43 44 45
mls qos srr-queue output dscp-map queue 1 threshold 3 46 47
mls qos srr-queue output dscp-map queue 2 threshold 1 16 17 18 19 20 21 22 23
mls qos srr-queue output dscp-map queue 2 threshold 1 26 27 28 29 30 31 34 35
mls qos srr-queue output dscp-map queue 2 threshold 1 36 37 38 39
mls qos srr-queue output dscp-map queue 2 threshold 2 24
mls qos srr-queue output dscp-map queue 2 threshold 3 48 49 50 51 52 53 54 55
mls qos srr-queue output dscp-map queue 2 threshold 3 56 57 58 59 60 61 62 63
mls qos srr-queue output dscp-map queue 3 threshold 3 0 1 2 3 4 5 6 7
mls qos srr-queue output dscp-map queue 4 threshold 1 8 9 11 13 15
mls qos srr-queue output dscp-map queue 4 threshold 2 10 12 14
mls qos queue-set output 1 threshold 1 100 100 50 200
mls qos queue-set output 1 threshold 2 125 125 100 400
mls qos queue-set output 1 threshold 3 100 100 100 400
mls qos queue-set output 1 threshold 4 60 150 50 200
mls qos queue-set output 1 buffers 15 25 40 20
mls qos

Should I remove this from our WAPs and uplinks as we've been experiencing ongoing slowness (speeds get pretty bad) with Wifi for quite sometime. Thoughts? Our routers are 3rd party managed and already have QOS in place for voice, as they host our voip.
FYI---I'm still learning all the ins and outs of srr-queue, so any help would be great!

cross posted
submitted by dmissip to Cisco [link] [comments]

ورقة جديدة تحسم صفقة لاوتارو مارتينيز لبرشلونة✅صفقات عملاقة ريال مدريد يحسم اولوياته●صفقة 135 مليون

في هذا التقرير يرصد «المصري لايت» 26 معلومة عن الفنانة القديرة «شويكار». 26. ولدت يوم 24 نوفمبر 1938. 25. لديها شقيقة ممثلة اسمها «شاهيناز»، كانت تعمل بالفن. 24. 26 ثنائيا تقدموا من مذبح الرب ،ووثقوا رباطهم ب”النعم”امام الكاردينال البطريرك مار بشاره بطرس الراعي الذي ترأس مراسم الاكليل يحوطه الاساقفة ولفيف من رجال الاكليروس. شكل الفنان ناصر القصبي ثنائيا في التمثيل مع و ناصر القصبي واولاده ومن يرغب في معرفة ناصر القصبي وزوجته وصور راكان ناصر القصبي ومن يرغب في الحصول على صور عبدالله السدحان وناصر القصبي ومن يرغب في معرفة هل ناصر القصبي شيع Traductions en contexte de "ثنائياً" en arabe-français avec Reverso Context : ونيوزيلندا ستبقى شريكا ثنائياً ملتزماً، وسنواصل تقديم المساعدة. بكركي كللت 26 ثنائيا في العرس الجماعي الثامن للرابطة المارونية

[index] [5999] [1950] [11103] [11550] [7917] [14447] [6134] [2198] [13242] [1452]

ورقة جديدة تحسم صفقة لاوتارو مارتينيز لبرشلونة✅صفقات عملاقة ريال مدريد يحسم اولوياته●صفقة 135 مليون

ورقة جديدة تحسم صفقة لاوتارو مارتينيز لبرشلونة صفقات عملاقة ريال مدريد يحسم اولوياته صفقة 135 مليون ===== لا ...

#

test2