Solved

Watchguard XTM22  - QOS for VOIP through site to site VPN

Posted on 2011-02-27
5
3,333 Views
Last Modified: 2012-06-21
Hello Experts - does anyone know if it is possible to prioritise VOIP traffic through an IPSEC site to site VPN between two XTM22 firewalls ?

There is an awful lot of documentation on the Watchguard site but I can't seem to find what we need

thanks

0
Comment
Question by:Brett4567
  • 3
  • 2
5 Comments
 
LVL 13

Expert Comment

by:NarendraG
ID: 34994768
which protocol  you are using for VOIP?
H323?
0
 
LVL 13

Expert Comment

by:NarendraG
ID: 34994797
Try Traffic Management

set minimum guaranteed bandwidth to xxx

Traffic-management.JPG
0
 
LVL 13

Accepted Solution

by:
NarendraG earned 500 total points
ID: 34994804
for the above you have to create BOVPN policy for voip traffic then set the bandwidth limits


hope this will help you,please let me know if any doubts?
Thanks
Narendra
0
 

Author Comment

by:Brett4567
ID: 35000670
thanks will try and let you know
0
 

Author Comment

by:Brett4567
ID: 35024549
haven't had time yet
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Multicast Routing 2 44
google voice, ring two phones 2 54
What to do with Cisco Unified Border Element Enterprise Licenses? 4 67
VOIP System 9 101
Article by: user_n
How Sip Phone (User Agent) works and communicates with sip servers 1.  There is a sip server and a sip registrar.  The sip server and sip registrar can be one server or two different servers. The sip registrar is the server on which it is record…
If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question