About 6 months ago we replaced our WatchGuard firewalls with Juniper SSG's (mulit site) and we have been having some voice quality issues since.
Here is our setup.
MPLS circuit between multiple sites, QOS implemented with DSCP tagging.
DSCP tagging on Shoretel server turned on 184
Policies on SSG's that add 46 tags to traffic coming from SG server as those packets are not tagged (Shoretel documentation)
Here are some of our issues.
119 events (excessive packet losses) from calls going across the WAN and sometimes the LAN.
PCM will not respond when sitting idle for a while > 30 minutes, get invalid line handle on PCM, it will take about 45 seconds for the call manager to be functional again. (I have a case open with ST, they have had me to wireshark captures, etc, but can't find a problem)
Out network is segregated into Voice and Data VLANs, with tagging turned on on the phones. The SSG is also the router, both the data and voice VLAN's are in the Trust Zone, we have a intra zone policy that is set to any any any, a Trust to MPLS zone that prioritizes the voice traffic as "real time".
The switches we use our Foundry Gigabit (running in layer 2), with the SSG acting at the VLAN router. The ports going to the phones are configured as follows: (only pertinent info included)
vlan 10 name Data-Default by port
tagged ethe 0/1/1 to 0/1/2 ethe 0/1/7 ethe 0/1/9 to 0/1/48
untagged ethe 0/1/6 ethe 0/1/8
spanning-tree 802-1w
!
vlan 11 name Voice-Vlan by port
tagged ethe 0/1/1 to 0/1/2 ethe 0/1/9 to 0/1/48
untagged ethe 0/1/3 to 0/1/5
spanning-tree 802-1w
!
interface ethernet 0/1/3
port-name "Shoregear 90"
no spanning-tree
sflow-forwarding
!
interface ethernet 0/1/4
port-name "Shoregear T-1"
no spanning-tree
sflow-forwarding
!
interface ethernet 0/1/5
port-name "Shoretel Server"
spanning-tree 802-1w admin-edge-port
sflow-forwarding
!
interface ethernet 0/1/9
dual-mode 10
spanning-tree 802-1w admin-edge-port
inline power
voice-vlan 11
sflow-forwarding
!
interface ethernet 0/1/10
dual-mode 10
spanning-tree 802-1w admin-edge-port
inline power
voice-vlan 11
sflow-forwarding
!
interface ethernet 0/1/11
dual-mode 10
spanning-tree 802-1w admin-edge-port
inline power
voice-vlan 11
sflow-forwarding
!
......up to port 48
SSG config (only pertinent lines)
set interface "ethernet0/8.10" tag 10 zone "Trust" <--- Data
set interface "ethernet0/8.11" tag 11 zone "Trust" <--- Voice
set interface ethernet0/8.10 ip 10.10.1.1/24
set interface ethernet0/8.10 route
set interface ethernet0/8.11 ip 10.11.1.1/24
set interface ethernet0/8.11 route
set policy id 20 from "Trust" to "Trust" "Any" "Any" "ANY" permit log
set policy id 20
set log session-init
exit
set policy id 24 from "Trust" to "mpls" "Voice LAN" "Any" "VOIP->1025-UDP" permit log count traffic gbw 256 priority 0 mbw 1000 dscp enable value 46
set policy id 24 application "IGNORE"
set policy id 24
set policy id 12 from "mpls" to "Trust" "Any" "Voice LAN" "VOIP->1025-UDP" permit log count traffic gbw 256 priority 0 mbw 1000 dscp enable value 46
set policy id 12 application "IGNORE"
set policy id 12
exit
We are running ST 8.1 13.23.6910, with a HQ server and a DVM server at location #2.
Sample 119 error:
Switch isgpri01pdx: Excessive number of packets lost from 10.11.2.50 (359 out of 19549).
Is there something I am missing that would cause these random 119 errors, they don't appear during times of high bandwidth usage, and they even happen on the local lan. I have pretty much tried anything, any suggestions would be greatly appreciated.
TIA.
Derek
Here is our setup.
MPLS circuit between multiple sites, QOS implemented with DSCP tagging.
DSCP tagging on Shoretel server turned on 184
Policies on SSG's that add 46 tags to traffic coming from SG server as those packets are not tagged (Shoretel documentation)
Here are some of our issues.
119 events (excessive packet losses) from calls going across the WAN and sometimes the LAN.
PCM will not respond when sitting idle for a while > 30 minutes, get invalid line handle on PCM, it will take about 45 seconds for the call manager to be functional again. (I have a case open with ST, they have had me to wireshark captures, etc, but can't find a problem)
Out network is segregated into Voice and Data VLANs, with tagging turned on on the phones. The SSG is also the router, both the data and voice VLAN's are in the Trust Zone, we have a intra zone policy that is set to any any any, a Trust to MPLS zone that prioritizes the voice traffic as "real time".
The switches we use our Foundry Gigabit (running in layer 2), with the SSG acting at the VLAN router. The ports going to the phones are configured as follows: (only pertinent info included)
vlan 10 name Data-Default by port
tagged ethe 0/1/1 to 0/1/2 ethe 0/1/7 ethe 0/1/9 to 0/1/48
untagged ethe 0/1/6 ethe 0/1/8
spanning-tree 802-1w
!
vlan 11 name Voice-Vlan by port
tagged ethe 0/1/1 to 0/1/2 ethe 0/1/9 to 0/1/48
untagged ethe 0/1/3 to 0/1/5
spanning-tree 802-1w
!
interface ethernet 0/1/3
port-name "Shoregear 90"
no spanning-tree
sflow-forwarding
!
interface ethernet 0/1/4
port-name "Shoregear T-1"
no spanning-tree
sflow-forwarding
!
interface ethernet 0/1/5
port-name "Shoretel Server"
spanning-tree 802-1w admin-edge-port
sflow-forwarding
!
interface ethernet 0/1/9
dual-mode 10
spanning-tree 802-1w admin-edge-port
inline power
voice-vlan 11
sflow-forwarding
!
interface ethernet 0/1/10
dual-mode 10
spanning-tree 802-1w admin-edge-port
inline power
voice-vlan 11
sflow-forwarding
!
interface ethernet 0/1/11
dual-mode 10
spanning-tree 802-1w admin-edge-port
inline power
voice-vlan 11
sflow-forwarding
!
......up to port 48
SSG config (only pertinent lines)
set interface "ethernet0/8.10" tag 10 zone "Trust" <--- Data
set interface "ethernet0/8.11" tag 11 zone "Trust" <--- Voice
set interface ethernet0/8.10 ip 10.10.1.1/24
set interface ethernet0/8.10 route
set interface ethernet0/8.11 ip 10.11.1.1/24
set interface ethernet0/8.11 route
set policy id 20 from "Trust" to "Trust" "Any" "Any" "ANY" permit log
set policy id 20
set log session-init
exit
set policy id 24 from "Trust" to "mpls" "Voice LAN" "Any" "VOIP->1025-UDP" permit log count traffic gbw 256 priority 0 mbw 1000 dscp enable value 46
set policy id 24 application "IGNORE"
set policy id 24
set policy id 12 from "mpls" to "Trust" "Any" "Voice LAN" "VOIP->1025-UDP" permit log count traffic gbw 256 priority 0 mbw 1000 dscp enable value 46
set policy id 12 application "IGNORE"
set policy id 12
exit
We are running ST 8.1 13.23.6910, with a HQ server and a DVM server at location #2.
Sample 119 error:
Switch isgpri01pdx: Excessive number of packets lost from 10.11.2.50 (359 out of 19549).
Is there something I am missing that would cause these random 119 errors, they don't appear during times of high bandwidth usage, and they even happen on the local lan. I have pretty much tried anything, any suggestions would be greatly appreciated.
TIA.
Derek
Comment