If I understand correctly, the traffic match to the class test and not mark with a specific dscp value will fall into the default (dscp 0). The the policing is going to mark the packet with dscp value to 26, 28 or 30 depends on whether the rate of the traffic. You should see the dscp value changed on your next hop router.
Cisco IOS classifies traffic before policing and shaping. When the packet arrived with dscp 0 will be classified in the default queue and pass to the policer for action, either delivery or drop. The packets marked during the delivery will not put back into the queue to be re-classified. That's why all traffic is shown received in default queue.
obviously you apply your service-policy on output. What does your class-map look like, what do you try to match? Are you sure you do not catch locally generated packets from the router? can you pllease post the complete "show policy-map interface"?
What looks strange is, that you get only 18 packets at all. Can you create more load and f.e. ping through the router and check the result again?
The order of QoS operation on output should be
I agree that your policer should at least mark conforming traffic.
What could also interfere with your expected behaviour is, that packets CEF switched will not show up in the policy-map queueing section. So make sure you overload your interface to get packets in the L3 queueing system.
Thanks for your assistance. Enclosed is the configuration for the class. I have changed the name as this is from a working customer router. There are other classes configured in the ploicy, and the last one has an ACL that catches all IP Packets.
I am confused about your sentence which states that "CEF switched packets not showing in the queueing section". Because if I clear the counters, and watch the policy I can see the AF26 counters increasing with the packets being marked by the interface, and only a small load on teh link. I beliveve for QOS to work we need CEF configured.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :