• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1602
  • Last Modified:

Cisco 3560 Switch DSCP Marking for RDP

I would like to mark my RDP traffic to 2 particular host as DSCP AF31. However, my config does not seem to work. Anyone can help troubleshoot?

ip access-list extended CLASSIFY-RDPServers
 permit tcp host 192.168.20.80 any eq 3389
 permit tcp host 192.168.20.8 any eq 3389
 permit tcp any host 192.168.20.8 eq 3389
 permit tcp any host 192.168.20.80 eq 3389

class-map match-any CLASSIFY-RDPServers
 match access-group name CLASSIFY-RDPServers
class-map match-all AutoQoS-VoIP-RTP-Trust
 match ip dscp ef
class-map match-all AutoQoS-VoIP-Control-Trust
 match ip dscp cs3  af31
class-map match-all CLASSIFY-Video
 match ip dscp af41

policy-map AutoQoS-Police-CiscoPhone
 class AutoQoS-VoIP-RTP-Trust
  set dscp ef
  police 320000 8000 exceed-action policed-dscp-transmit
 class AutoQoS-VoIP-Control-Trust
  set dscp cs3
  police 32000 8000 exceed-action policed-dscp-transmit
 class CLASSIFY-Video
  set dscp af41
  police 2000000 8000 exceed-action policed-dscp-transmit
 class CLASSIFY-RDPServers
  set dscp af31

Open in new window


From packet captures, I can see that the policy-map works for ef, af41 traffic. But RDP traffic is not marked as af31.
0
frukeus
Asked:
frukeus
3 Solutions
 
Don JohnstonInstructorCommented:
Are you seeing any hits against the ACL  "CLASSIFY-RDPServers"?
0
 
koudryCommented:
I think you need to test the ACL first, by attaching it to the interface, to make sure it is working. If it is not working, try simple IP, e.g.

!
access-list 101 permit ip host 192.168.20.80 any
!
interface x
ip access-group 101 in
!

If this works, use this ACL on a test class map and policy and test again separately away from the other classes.
0
 
mat1458Commented:
Is the RDP traffic using the interfaces on which you have set the service policy? Is RDP using the standard ports on the two systems?

You config looks pretty good, the stuff you have posted should do what you intend to. But for completeness reasons: can you please post the other access lists as well? There might be something in them that erroneusly marks the RDP traffic with some other tag.

If you can post it the pcap file would help as well.
0
 
frukeusAuthor Commented:
Yes, the problem was with the ACL.
It should be
10 permit tcp host 192.168.48.80 eq 3389 any
20 permit tcp host 192.168.48.8 eq 3389 any

to capture the RDP traffic instead of
10 permit tcp host 192.168.48.80 any eq 3389
20 permit tcp host 192.168.48.8 any eq 3389
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Become an IT Security Management Expert

In today’s fast-paced, digitally transformed world of business, the need to protect network data and ensure cloud privacy has never been greater. With a B.S. in Network Operations and Security, you can get the credentials it takes to become an IT security management expert.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now