- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
06-05-2013 10:00 AM
Architecture:
Hub and Spoke, Site to Site Ipsec VPN tunnel
HQ Site:
ASA5520
Call Manager
Cisco IP Phones
Remote:
PA5020
No Call Manager
Cisco IP Phones
Remote users connect to HQ via VPN tunnel between ASA and PA
QOS Policy
src.zone Inside dst.zone Inside to match traffic over the tunnel
apps
rtcp, rtp and sccp
This is working pretty well. Any further advice is welcome.
06-05-2013 02:37 PM
Make sure you have prioritize all apps use by the phones. You can run a report for src=IP of a phone and review all the apps/traffic generated by the phone. If there's any unknown traffic from the phone, you may want to classify the unknown and add it to the QoS policy. Thanks.
06-07-2013 11:55 AM
Also dont forget to prioritize in both directions.
If I recall correctly the QoS is always setup on the outbound (egress) interface.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!