Solved

Enterasys QoS setup

Posted on 2016-10-04
2
113 Views
Last Modified: 2016-10-10
I have a DR site connected to my corporate office. The DR site is using a older C3G switch which is similar to the C5 Securestack line. The corporate office is using a N7 switch with platinum DFEs. My question is how do I configure QoS. The config guide and feature guide on the Extreme website might as well be in ancient Babylonian. It doesn't make any sense to me. All I'm trying to do is ensure VoIP traffic and my video conference system gets first priority. If the video conference is tagging packets as EF, why can't I just create an access-list in the (router) like this and assign it to a vlan interface.

access-list 100 permit ip any any dscp ef assign-queue 5
access-list 100 permit ip any any assign-queue 4

This should work but I never lose my jitter on the video system and the Enterasys documentation doesn't ever seem to offer this as an example.

P.S. Yes, I know this is rather old hardware. Don't get me started. :)
0
Comment
Question by:joshuamichaelsanders
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 

Author Comment

by:joshuamichaelsanders
ID: 41830569
There has got to be someone on this board who has configured QoS on a C3 (or C5) securestack switch. Bueller? Bueller?
0
 

Accepted Solution

by:
joshuamichaelsanders earned 0 total points
ID: 41837147
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses
Course of the Month4 days, 15 hours left to enroll

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question