Book now with code EOY2025
ColbyNA wrote: » The traffic would be marked by the device it originated from (eg Cisco phone), or a router/switch near the source of the traffic.
rakem wrote: » Yep that makes sense... On a router or switch i guess you could do something like the following; RouterA(config)#class-map BLAH RouterA(config-cmap)#match protocol http RouterA(config-cmap)#match protocol ftp RouterA(config-cmap)#match protocol ssh RouterA(config-cmap)#exit RouterA(config)#pol RouterA(config)#policy-map LOL RouterA(config-pmap)#claas RouterA(config-pmap)#clas RouterA(config-pmap)#class BLAH RouterA(config-pmap-c)#set dscp RouterA(config-pmap-c)#set dscp af11 so we have http, ftp and ssh getting marked as AF11, then on a different router you could to something like: RouterB(config)#clas RouterB(config)#class-map ABC RouterB(config-cmap)#match ip dscp af11 RouterB(config-cmap)#ex RouterB(config)#policy-map XYZ RouterB(config-pmap)#class ABC RouterB(config-pmap-c)#police 80000 RouterB(config-pmap-c-police)#exit so router B would police anything marked as Af11.... Is that correct? Or like if your IP phone couldn't set its own DSCP or IP Prec values, you could set it on the switchport which the phone connects to...
Use code EOY2025 to receive $250 off your 2025 certification boot camp!