I have 2 sites (central & remote) with a PBX on each site. Both PBXs are connected via ethernet to the LANs. I have configured dynamic QoS for the IP addresses of the PBXs on each site. The problem is that dynamic bandwidth needs 5 minutes to "give" the configured bandwidth. This means that my voice calls face some (voice) interruptions when the call is established. After a while (when the configured bandwidth is given by the QoS policy) the voice is great.
I was wondering if I can give some dedicated bandwidth for the PBXs (i.e. 50Kbps) and if they need more bandwidth, they could "ask" for more (i.e. 200Kbps).
class-map match-all VoiceBW_cmap match access-group name VoiceBW_list ! policy-map VoiceBW_pmap class VoiceBW_cmap bandwidth 512 class class-default fair-queue ! interface serial0/0/0:0 description #### link to remote side #### service-policy output VoiceBW_pmap ! ip access-list extended VoiceBW_list permit ip any host 192.168.0.90 permit ip host 192.168.0.90 any
class-map match-all VoiceBW_cmap match access-group name VoiceBW_list ! policy-map VoiceBW_pmap class VoiceBW_cmap bandwidth 512 class class-default fair-queue ! interface serial0/0/0:1 description #### link to central site #### service-policy output VoiceBW_pmap ! ip access-list extended VoiceBW_list permit ip any host 192.168.1.90 permit ip host 192.168.1.90 any
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...