I'm in the process of setting up QoS and need to mark traffic with DCSP values, specifically Citrix traffic. The DSCP values will be used on the WAN QoS, marking needs to happen before the WAN router.
I've configured the following on the 3750:
Class Map match-all citrix-ica
Match access-group 100
Policy Map mark-citrix
set dscp af31
access-list 100 permit ip any host 10.203.232.41 - Citrix server IP
Port on which Citrix server is connected:
service-policy input mark-citrix
Problem I have is that traffic is not being marked with the DSCP (checked using network monitor) - I've tried changing the access-list but to no avail. I'm sure the problem is with the access-list. Can anyone provide a config whereby traffic is marked based on Citrix i.e. ICA Port 1494
Yes I'm trying to mark switch port that the the Citrix server is connected to. As traffic enters the switch it's marked to DSCP AF31 therefore when it exits the switch then enters the WAN router QoS will be applied based on the DSCP marking.
Tried switching the access-list but doesn't seem to make a difference.
How would you check to see if the packets are indeed being marked?
First you need to see if the access-list is being hit. Use the Show Access-list command to see if the address is being hit by the list. Next see if the policy is hitting the address. Use the Show policy command. This will show you if the policy that is applied to the interface is being hit....
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...