Forum Discussion
QoS for SfB when using Cloud PBX and PSTN Calling
Hi not sure if anyone can assist as I am new to QoS and wondered if there were any proper guides when using the Cloud based SfB along with PSTN Calling. (e.g. No SfB Server on site)
I found this site https://ucstuffnet.wordpress.com/2016/01/08/skype-for-business-online-qos-powershell-commands but have tried that and it doesn't seem to work from what I have seen based on running the wireshark tests from this other site http://blogs.perficient.com/microsoft/2014/12/configuring-quality-of-service-for-lync-online/
Really keen to ensure we get things setup correctly on our current test setup before we go ahead and switch the whole company over to it for PSTN calls.
Any assistance would be appreciated.
Hey Peter,
(Author of those articles checking in)
I am curious as to what is causing the traffic not to be marked. Are you able to test on a machine that is not domain joined? (Should be able to export those Registry Keys and import them on the test machine)
*EDIT* - I think I found the issue.
- Go to the GPO Editor and navigate to 'Computer Configuration>Windows Settings'
- Right-click 'Policy-Based QoS' > choose 'Advanced QoS Settings ...'
- Go to the 'DSCP Marking Override' tab
- Check 'Control DSCP Marking requests from applications and services'
- Select "Allowed'
I can't update the Perficient blog post since I am no longer employed there.
But I will try to figure out the PowerShell GPO cmd to create this entry
Hopefully this works for you!
27 Replies
- Himanshu SinghIron Contributor
I am able to identify the reason the clients are not using the port range configured by us in the New-CsConferencingConfiguration it is because clients are still using the GLOBAL settings or policy or configuration whatever setting this port range and count is called technically as I am not able to find this
I need your help to set the new csconferencingconfiguration setting / policy / configuration created by us at the pool level to be effective for all clients, how do to it what command do I have to run
Please do reply soon,
BR,
/HS
- You create a new policy and then assign the users to the new policy and it will override the global policy for those users.
- Himanshu SinghIron Contributor
how to do this
what is the command to do this
and once done how can i verify
- Nick Elniff
Microsoft
Hey Peter,
(Author of those articles checking in)
I am curious as to what is causing the traffic not to be marked. Are you able to test on a machine that is not domain joined? (Should be able to export those Registry Keys and import them on the test machine)
*EDIT* - I think I found the issue.
- Go to the GPO Editor and navigate to 'Computer Configuration>Windows Settings'
- Right-click 'Policy-Based QoS' > choose 'Advanced QoS Settings ...'
- Go to the 'DSCP Marking Override' tab
- Check 'Control DSCP Marking requests from applications and services'
- Select "Allowed'
I can't update the Perficient blog post since I am no longer employed there.
But I will try to figure out the PowerShell GPO cmd to create this entry
Hopefully this works for you!
- Peter LongleyIron Contributor
That worked for me it seems!!!
At least for Audio, now to test the others. Thanks Nick
***EDIT***
Now tested all others (except file transfer and looks to be working fine now)
The Skype tracing log file still shows this though which is strange!
<qosEnabled>false</qosEnabled>
<enableInCallQoS>false</enableInCallQoS>- Peter LongleyIron Contributor
One more thing if any of you can assist, as per my last post it appears that the GPOs are now working as expected.
Our network switches have QoS options and are set as default to trust dot1p there is the option to change it to trust ip-dscp am I correct in assuming now I have set the QoS at GPO level I need to change the switches to the trust ip-dscp also to ensure the switches manage the priorities?
These are the other settings which I am not sure if I should be changing also.
Thanks for all your assistance so far.
- TrentIron Contributor
Without trying hijack this thread - I also have the same issue.
Setting 'Control DSCP Marking requests from applications and services' to Allowed didn't make any difference.
- Ben DonaldsonIron Contributor
Hi, the Skype Operations Framework (SOF) contains the offical guidance arround applying quality of services to a Cloud PBX environment, have you taken a look at that? You'll need to sign in with a Microsoft account to download the content; https://www.skypeoperationsframework.com/Downloads?SelectedIDs=5_1_0_8 .That guidance contains setup and verification in a single document - you shouldn't need any further information beyond this.
Kind regards
Ben- Morning all,
Do you have an ExpressRoute in place? There is no point in QoS to O365 without an ExpressRoute being utilised.- Ben DonaldsonIron Contributor
I think deploying QoS without an Express Route is still perfectly viable; we'renot to know whether the organisation makes 1000 peer to peer video calls a day - If they do, then QoS is most certainly useful regardless of whether an express route is in play or not. Granted, WAN traversing PSTN, conferencing, and federated scenarios etc won't honour the priority requirements, but your peer-to-peer scenarios will. Silver lining; If you procure an express route at a later date then you don't need to make any changes because you local network and GPO's are already in place to honour the same settings as the express route.
In relation to the original post; can you confirm whether it's the QoS settings that aren't applying within the GPO, or the GPO as a whole not applying?
In the registry of the client machine do you see anything here; HKEY_LOCAL_MACHINE > Software > Policies > Microsoft > Windows > QoS?
If you don't it would imply your GPO isn't applying full stop, although you could test this further by making a more obvious change to the GPO and seeing if the client picks it up.
- Peter LongleyIron Contributor
Thanks I hadn't seen that although it is pretty much the same as the website instructions from what I can see.
The issue I have is that the GPOs have been applied with the same settings as on that framework document and are verified on my computer but when checking on wireshark it shows the packets are still using the default Differentiated Services Codepoint and not the expected ones from the GPO.
Can you post some screenshots of your GPO?