Solved

Enterasys QoS setup

Posted on 2016-10-04
2
63 Views
Last Modified: 2016-10-10
I have a DR site connected to my corporate office. The DR site is using a older C3G switch which is similar to the C5 Securestack line. The corporate office is using a N7 switch with platinum DFEs. My question is how do I configure QoS. The config guide and feature guide on the Extreme website might as well be in ancient Babylonian. It doesn't make any sense to me. All I'm trying to do is ensure VoIP traffic and my video conference system gets first priority. If the video conference is tagging packets as EF, why can't I just create an access-list in the (router) like this and assign it to a vlan interface.

access-list 100 permit ip any any dscp ef assign-queue 5
access-list 100 permit ip any any assign-queue 4

This should work but I never lose my jitter on the video system and the Enterasys documentation doesn't ever seem to offer this as an example.

P.S. Yes, I know this is rather old hardware. Don't get me started. :)
0
Comment
Question by:joshuamichaelsanders
  • 2
2 Comments
 

Author Comment

by:joshuamichaelsanders
ID: 41830569
There has got to be someone on this board who has configured QoS on a C3 (or C5) securestack switch. Bueller? Bueller?
0
 

Accepted Solution

by:
joshuamichaelsanders earned 0 total points
ID: 41837147
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question