I have a customer who is trying to setup various Class of Services by tagging packets with specific TOS bit patterns. Three CoS precedences are defined: flash, immediate, and routine. Although packets are being marked, the marked TOS fields do not appear to make any kind of sense. A sniffer capture shows the following:
flash ==> TOS 0xC0 ?? (expected 0x60)
immediate ==> TOS 0x08 ?? (expected 0x20)
routine ==> TOS 0x00 (OK)
Here is a snippet of the configuration. Any thoughts?
boot system flash c2600-i-mz.121-14.bin
interface Serial0/0.2 point-to-point
ip policy route-map IPFR
access-list 5 permit 172.21.1.12
access-list 5 permit 172.21.1.15
access-list 5 permit 172.21.12.104
access-list 5 deny any
access-list 6 permit 172.21.12.104
access-list 6 deny any
access-list 10 permit 10.254.251.1
access-list 10 deny any log
access-list 150 permit tcp any eq telnet any
access-list 151 permit tcp any range ftp-data ftp any
Since there has been no response to your post, it appears to be either too complex or too rare an issue for other forum members to assist you. If you don't get a suitable response to your post, you may wish to review our resources at the online Technical Assistance Center (http://www.cisco.com/tac) or speak with a TAC engineer. You can open a TAC case online at http://www.cisco.com/tac/caseopen
If anyone else in the forum has some advice, please reply to this thread.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...