<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: QOS on a ERS switch port in ExtremeSwitching (ERS)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-ers/qos-on-a-ers-switch-port/m-p/120577#M659</link>
    <description>&lt;P&gt;Hi Faiyaaa&lt;BR /&gt;&lt;BR /&gt;Depending on the specifics of what you want to trust or not trust, you can choose to configure port 2/35 as trusted Or untrusted.&lt;BR /&gt;Based on what you have posted the following should work with below minimum config after existing ip-element 1, policy, classifier configured for the very purpose removed.&lt;BR /&gt;&lt;BR /&gt;qos if-group name "Trust_VOIP" class untrusted&lt;BR /&gt;qos if-assign port 2/35 name Trust_VOIP&lt;BR /&gt;qos traffic-profile classifier name "VOIP-POL" addr-type ipv4 ethertype 0x800 update-dscp 46 update-1p 6 eval-order 10&lt;BR /&gt;qos traffic-profile set port 2/35 name "VOIP-POL" track-statistics aggregate&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;You may also need to consider the return packet flow depending on the application requirements. If the return traffic destined to PC is marked with DSCP 46 and is required to be retained across the ERS, then you would need to configure ERS uplink port as trusted.&lt;BR /&gt;&lt;BR /&gt;If the above config does not work for you it may be worth engaging technical support for a deeper look to make sure all of the packet flow requirements on the port are evaluated in detail.&lt;/P&gt;</description>
    <pubDate>Tue, 28 Oct 2025 15:01:44 GMT</pubDate>
    <dc:creator>Shoibsi</dc:creator>
    <dc:date>2025-10-28T15:01:44Z</dc:date>
    <item>
      <title>QOS on a ERS switch port</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-ers/qos-on-a-ers-switch-port/m-p/120342#M658</link>
      <description>&lt;P&gt;Hi All,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been banging my head to configure QoS, as the PC is connected to an ERS 4950GTS switch (v7.9.6.015) on interface port 2/35, running the Avaya Workspace Attendant Software.&lt;/P&gt;&lt;P&gt;The third-party company managing Avaya CC informed me that they cannot see the DSCP value as 46 on their portal—instead, it's showing as -1.&lt;/P&gt;&lt;P&gt;Please review the configuration below and let me know what might be missing&lt;/P&gt;&lt;P&gt;&lt;!-- EndFragment  --&gt;&lt;/P&gt;&lt;P&gt;Switchname(config)#sh run mod qos!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;! Displaying only parameters different to default&lt;BR /&gt;!================================================&lt;BR /&gt;enable&lt;BR /&gt;configure terminal&lt;BR /&gt;!&lt;BR /&gt;! *** QOS ***&lt;BR /&gt;!&lt;BR /&gt;qos if-group name "Trust_VOIP" class untrusted&lt;BR /&gt;qos ip-element 1 name dsClfr1 ds-field 46&lt;BR /&gt;qos classifier 1 set-id 1 name "Trust_VOIP" element-type ip element-id 1&lt;BR /&gt;qos if-assign port 2/35 name Trust_VOIP&lt;BR /&gt;!qos agent queue-set 4&lt;BR /&gt;qos policy 1 name "Trust_VOIP" if-group "Trust_VOIP" clfr-type classifier clfr-id 1 in-profile-action 7 precedence 6 track-statistic&lt;BR /&gt;s&lt;BR /&gt;qos traffic-profile classifier name "VOIP-POL" addr-type ipv4 ethertype 0x800 update-dscp 0 update-1p 0 eval-order 10&lt;BR /&gt;qos if-assign port 1/ALL,2/1-34,2/36-50 name $qosDisabledIfcs&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 15:07:01 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-ers/qos-on-a-ers-switch-port/m-p/120342#M658</guid>
      <dc:creator>Faiyaaa</dc:creator>
      <dc:date>2025-09-23T15:07:01Z</dc:date>
    </item>
    <item>
      <title>Re: QOS on a ERS switch port</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-ers/qos-on-a-ers-switch-port/m-p/120577#M659</link>
      <description>&lt;P&gt;Hi Faiyaaa&lt;BR /&gt;&lt;BR /&gt;Depending on the specifics of what you want to trust or not trust, you can choose to configure port 2/35 as trusted Or untrusted.&lt;BR /&gt;Based on what you have posted the following should work with below minimum config after existing ip-element 1, policy, classifier configured for the very purpose removed.&lt;BR /&gt;&lt;BR /&gt;qos if-group name "Trust_VOIP" class untrusted&lt;BR /&gt;qos if-assign port 2/35 name Trust_VOIP&lt;BR /&gt;qos traffic-profile classifier name "VOIP-POL" addr-type ipv4 ethertype 0x800 update-dscp 46 update-1p 6 eval-order 10&lt;BR /&gt;qos traffic-profile set port 2/35 name "VOIP-POL" track-statistics aggregate&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;You may also need to consider the return packet flow depending on the application requirements. If the return traffic destined to PC is marked with DSCP 46 and is required to be retained across the ERS, then you would need to configure ERS uplink port as trusted.&lt;BR /&gt;&lt;BR /&gt;If the above config does not work for you it may be worth engaging technical support for a deeper look to make sure all of the packet flow requirements on the port are evaluated in detail.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Oct 2025 15:01:44 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-ers/qos-on-a-ers-switch-port/m-p/120577#M659</guid>
      <dc:creator>Shoibsi</dc:creator>
      <dc:date>2025-10-28T15:01:44Z</dc:date>
    </item>
  </channel>
</rss>

