I am wondering if anyone else has come across this issue and may have some insight as to why it is happening?
I have a QOS policy set up beween a core site and a remote site over a 1GB MPLS link which prioritises Citrix traffic from a cluster of servers. We have classifed the traffic captured in an access list and set the dscp value to 34 at each end of the link.
At the remote site the QOS policy is configured on 3560s as Vlan based and works fine and when I take a trace using wireshark I can see the packets from the filtered addresses being marked as DSCP 34.
However at the core the traffic is being captured on a 6509 etherchanneled link to another access layer switch.
Ip access-list extended citrix-acl
Permit ip any host 192.168.XX.X1
Permit ip host 192.168.XX.X1 any
Permit ip any host 192.168.XX.X2
Permit ip host 192.168.109.X2 any
Permit ip any host 192.168.XX.X3
Permit ip host 192.168.XX.X3 any
Class-map match-any citrix-class
Match access-group name citrix-acl
set dscp af41
set dscp default
I have applied the service policy inbound on the portchannel interface?
Then I recommend applying the markings closer to the source.
With 6500s, I recommend going with Vlan based QoS. It seems the trunk is not matching on the IP so the packet is going to the class class-default on which you are setting the dscp to default which is 0.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...