Rate limit: Police bandwidth

Hi friends
I have some questions:
equipment: 7609
IOS: s72033-pk9sv-mz.122-18.SXD7.bin
i need create one police with 4200000000, but the police only support 4000000000.
Router(config-pmap-c)# police ?
<32000-4000000000> Bits per second
aggregate Choose aggregate policer for current class
flow police each flow
how can i limit 4.2 Giga, any idea?
do you know a good reference aboute it?
thanx

Hi there,
It seems a bit trickier than I thought!
I've not got a router near me, but have a go with a 2 rate policer. Here you have CIR and PIR. You can send at the PIR rate - which is higher than the CIR rate. Have a look at this link for some config tips:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122t/122t4/ft2rtplc.htm
Next, I would have a go at marking the access-list 125 traffic on ingress with a qos value currently not in use (e.g af11) using shaping for the first 4gig. Then in the 1st map class - match the af11 traffic. Then on the second, match the rest of the traffic that was no marked using the access-list.
Let me know !
LH

Similar Messages

  • Rate limit high bandwidth application

    I have a 10mb line from a site office to my HQ.
    there is one user in the HQ office that is running some high bandwidth application, taking up 50% of my total bandwith.
    its some video monitoring system.
    i am using a C1841 router.
    how do i limit the bandwidth the user can occupy ?
    SrcIf         SrcIPaddress    DstIf         DstIPaddress    Pr SrcP DstP Bytes
    Fa0/0         10.200.2.181    Tu1002        10.200.90.158   06 022A CC9F    46M
    Fa0/0         10.200.2.181    Tu1002        10.200.90.158   06 022A CCE7    32M
    Fa0/0         10.200.2.181    Tu1002        10.200.90.158   06 022A CD01    25M
    Fa0/0         10.200.2.181    Tu1002        10.200.90.158   06 022A CC9C    21M
    Fa0/0         10.200.2.181    Tu1002        10.200.90.158   06 022A CE2B  9478K

    i have enable nbar on the router.
    what i can see that all are gre traffic.
     FastEthernet0/1
                                Input                    Output
       Protocol                 5min Bit Rate (bps)      5min Bit Rate (bps)
       gre                      223000                   288000
       bgp                      0                        0
       ntp                      0                        0
       bittorrent               0                        0
       citrix                   0                        0
       cuseeme                  0                        0
       custom-01                0                        0
       custom-02                0                        0
       custom-03                0                        0
       custom-04                0                        0
       unknown                  0                        0
       Total                    223000                   288000

  • Bandwidth Management(Rate Limit) Using QoS Policies

    Hello,
    I need some advice. We have an ASA 5525 running version 8.6(1)2 and a 10 MG pipe. I have execs that want to limit bandwidth on users for stuff like youtube, stream media, and downloads. I found the article on ‘Bandwidth Management(Rate Limit) Using QoS Policies’ so it appears our firewall can do what we want. I’m not a cisco person. My knowledge is limited when it comes to configuration – that’s why we have SmartNet :). The advice I need is what to ask for, so to speak, when I put a case in. Can bandwidth be limited on end users and/or can they limit the ‘bandwidth rate limit’ to just youtube, steaming media, and downloads? If so, what should the limit be? and I’m assume this would be for ‘incoming’ traffic only? we’re running into some bandwidth hogs – usually youtube and/or streaming media. We have a Barracuda web filter which we’ve used to block and monitor activity but I simply do not have time to babysit this all day. I should also mention we do have critical data running up and down the pipe; such as credit card processing, DB replication between in house DB and hosted website, TPCx and EDI, FTP, and such that we don’t want restricted.
    Need input please,
    Thanks,
    D

    Hello,
    That's a question that you as the network admin of that organization could answer.
    How much traffic for business purposes must travel via HTTP/HTTPS?
    How much bandwith are you willing to provide to this 2 protocols?
    Those are the kind of answers you need to answer before setting the number
    Regards
    Remember to rate all of the helpful posts, Just click the 5 stars at the left of each post
    Julio

  • Bandwidth Rate-Limit -w- WWR-Queue

    How would one convert a layer-2 port's "switchport rate-limit" bandwidth statement, on a 6509 -w- WS-X6748-SFP ports, to a routed/layer-3 "wrr-queue" bandwidth statement policy? Basically trying to hard-core the port's speed to 20MB.  Current/tested layer-2 port bandwidth setting:
    rate-limit input 20000000 5000 5000 conform-action transmit exceed-action drop
    rate-limit output 20000000 5000 5000 conform-action transmit exceed-action drop
    Got lost in how to use/configure all WRR's four queues... just need to limit the port's bandwidth to 20MB.  Any suggestions would be appreciated.
    Thanks, Kevin

    1) Enabled QoS globally...
    2960(config)#mls qos
    2) Configure an ACL to define the matched traffic...
    2960(config)#access-list 111 permit ip any any
    3) Configure a class map for the matched traffic...
    2960(config)#class-map traffic
    2960(config-cmap)#match access 111
    4) Configure a policy-map to define action...
    2960(config)#policy-map Control
    2960(config-pmap)#class traffic
    2960(config-pmap-c)#police 10000000 8000 exceed-action drop
    5) Attached the policy-map to the interface.
    a) Example
    -In this case, I'll attach the policy map to port_1....
    2960(config)#int fa0/1
    2960(config-if)#service-policy input Control
    >>>>>> This will rate-limit traffic coming from the PC

  • Per user bandwidth rate limit.

                       How to configure per user bandwidth rate limit for wireless guest client, authentication server is ISE 1.2 & wireless controller is 5760.

    The Cisco 5760 WLC supports better QoS than other c
    ontrollers, allowing prioritization of mission-crit
    ical
    applications:

    The Cisco 5760 WLC supports four wireless hardware
    queues and priority-based queuing compared to
    software-based queuing in existing controllers.

    The Cisco 5760 WLC follows MQC based commands, allo
    wing usage of exact commands for configuring
    QoS on different types of network devices.

    The Cisco 5760 WLC supports QoS policies to be appl
    ied in a hierarchical fashion with more granularity
    per SSID per radio, while on the current controller
    s granularity is per WLAN.

    The Cisco 5760 WLC supports approximate fair bandwi
    dth to make sure of fairness at client, SSID, and
    radio levels for Non-Real Time (NRT) traffic. There
    fore, if one user consumes excessive bandwidth, we
    can
    limit the amount of bandwidth that user receives an
    d thereby not deprive other users.

  • Service-Policy Or Bandwidth Rate Limit for IP

    Hii Netpros,
    Is this possible to configure the Service Policy(for Bandwidth) or Bandwidth Rate Limit for Single IP. For eg: If we want to configure the Service Policy(for Bandwidth) or Bandwidth Rate Limit of 2Mb for only IP " 10.10.10.3" on network  i.e the Host or device which is configured with this IP can access upto 2Mb only.
    Actual Network :-   We need this to configure this for wireless customers, Actually we have created one Vlan 2 (IP:- 10.10.10.1/29 @ our end router) , 10.10.10.2 on Basestation wiresss device (Vlan 2 allowed on this wireless device) and this wireless device is working as point to multipoint wireless. i.e 2 or more then 2 wireless customers or last mile will connect to this basestation wireless.  Wireless customer-1 is 10.10.10.3 (2Mb bandwidth)  and Wireless Customer-2  10.10.10.4 (512Kb).
    Hence we require to limit the bandwidth for this 2 wireless customers having different bandwidth. how to acheive & control bandwidth @ our end router for them. please suggest.
    Thanks

    This topic is probably better suited in another Infrastructure forum, but I suppose it depends on which features are supported by your Cisco hardware and software. This doc discusses a variety of options:
    http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfpolsh.html
    For example, with the older CAR (committed access rate) approach:
    interface FastEthernet5/0
         rate-limit input access-group 101 20000000 [normal burst size] [excess burst size] conform-action transmit exceed-action drop
         rate-limit input access-group 102 5120000 [normal burst size] [excess burst size] conform-action transmit exceed-action drop
    access-list 101 permit ip 10.10.10.3 0.0.0.0
    access-list 102 permit ip 10.10.10.4 0.0.0.0
    You can observe CAR in action with "show interfaces fa5/0 rate-limit" for example.

  • QoS bandwidth rate limit don't work

    Hello
    Buy a router RV120W, and one of the reasons is limit of bandwidth (QoS). I set up a profile of 1-256 kbps limit, and apply it to the only VLAN that is configured, but does not work and can navigate using the full bandwidth of the internet connection. My firmware version is 1.0.2.6
    Screenshots attached
    thanks
    screenshots attached

    Struggling with a similar issue:
    the setup: internet adsl <--1mbs--> combined router/modem <--100mbs--> RV 120W
    Internet speed is 1mbs. I want to priotize voip calls (via port) and deprioritize one machine (doing downloads). rest of the network should have something in between.
    Firmware upgraded to 1.0.3.10
    I created the profiles bindings, then in QoS settings, selected Priority, Wan total bandwidth 1mbs, and distributed my profiles onto low/med/high (10/31/61).
    When what should be low is downloading, it gets the whole 1mbs and the other are dead slow.
    Changed to rate limit, changed the parameters, etc... no more luck.
    Can you please shed some light as how to configure this - in my case, the whole bw of wan is being used, and prioriization is not happening,
    Rgds

  • How to rate-limit different IP's entering/leaving an Interface?

    Hi There,
    We are an ISP and have an interconnect with say Provider A. Customers of ours use Provider A for layer 2 and us for Layer 3 (IP/Internet).
    Customer #1 to #100 --- (10Mb) --> Provider A ---> ISP ---> Internet
    We'd like to rate limit some customers to 2mb/sec (in/out) on our end because at present they have a 10mb/sec connection coming from Provider A.
    The config we use to peer with Provider A is this:
    interface GigabitEthernet0/1.120
    description Interconnect with Provider A
    bandwidth 400000
    encapsulation dot1Q 120
    ip address A.B.C.1 255.255.255.252
    Customers of ours are simply routed out through this interface like so:
    Customer #1:
    ip route W.X.Y.Z. 255.255.255.255 A.B.C.2
    Customer #2:
    ip route J.K.L.M 255.255.255.255 A.B.C.2
    Is there a way to rate limit both these customers without needing to create a separate class map for each like so:
    class-map match-all CUSTOMER-1-2MB
    match access-group name ACL-CUSTOMER-1
    class-map match-all CUSTOMER-2-2MB
    match access-group name ACL-CUSTOMER-2
    policy-map POLICY-RATE-LIMIT
    class CUSTOMER-1-2MB
    police 2000000 375000 750000
    class CUSTOMER-2-2MB
    police 2000000 375000 750000
    interface GigabitEthernet0/1.120
    service-policy input POLICY-RATE-LIMIT
    service-policy output POLICY-RATE-LIMIT
    I've done this in the lab and I know it works, so Customer #1 ends up with 2mb/sec and Customer #2 gets 2mb/sec too.
    But in production, I'm talking about 100's of customers which we simply route out of this interface. I can't imagine having to configure 100's of class maps and policy maps for each customer to rate limit them to 2mb/sec like in the config above.
    Is there a better way to do this on the router???
    Thanks.
    Andy

    Hi All,
    Doing what Laurent suggested works great. We are able to rate-limit the desired customers by having a separate class-map for each customer that needs to be rate limited under the single policy-map.
    But now we're finding that the CPU utilization has increased by 20% because of this.
    We're pushing about 400M through this interface and rate limiting 7 customers on it.
    Given the large traffic flow through this interface (400M), is it common to see an increase in CPU utilisation by 20%???
    When we take the service-policy off the interface, sure enough the CPU drops by 20%.
    Here's the MQC applied:
    interface GigabitEthernet0/1.120
    bandwidth 400000
    encapsulation dot1Q 120
    ip address 203.17.x.x 255.255.255.252
    ip flow ingress
    service-policy input RATE-LIMIT
    service-policy output RATE-LIMIT
    class-map match-all CLASS-TCS-200338
    description Customer #1 rate limited to 4mb/sec
    match access-group name ACL-TCS-200338
    class-map match-all CLASS-TCS-200208
    description Customer #2 rate limited to 2mb/sec
    match access-group name ACL-TCS-200208
    class-map match-all CLASS-TCS-205593
    description Customer #3 rate limited to 3mb/sec
    match access-group name ACL-TCS-205593
    class-map match-all CLASS-TCS-205679
    description Customer #4 rate limited to 4mb/sec
    match access-group name ACL-TCS-205679
    class-map match-all CLASS-TCS-200441
    description Customer #5 rate limited to 4mb/sec
    match access-group name ACL-TCS-200441
    class-map match-all CLASS-TCS-200005
    description Customer #6 rate limited to 2mb/sec
    match access-group name ACL-TCS-200005
    class-map match-all CLASS-TCS-205560
    description Customer #7 rate limited to 4mb/sec
    match access-group name ACL-TCS-205560
    policy-map RATE-LIMIT
    class CLASS-TCS-200005
    police 2000000 375000 750000 conform-action transmit exceed-action transmit violate-action drop
    class CLASS-TCS-200208
    police 2000000 375000 750000 conform-action transmit exceed-action transmit violate-action drop
    class CLASS-TCS-200441
    police 4000000 750000 1500000 conform-action transmit exceed-action transmit violate-action drop
    class CLASS-TCS-200338
    police 4000000 750000 1500000 conform-action transmit exceed-action transmit violate-action drop
    class CLASS-TCS-205679
    police 4000000 750000 1500000 conform-action transmit exceed-action transmit violate-action drop
    class CLASS-TCS-205560
    police 4000000 750000 1500000 conform-action transmit exceed-action transmit violate-action drop
    class CLASS-TCS-205593
    police 3000000 562500 1125000 conform-action transmit exceed-action transmit violate-action drop
    Is this the correct behaviour of applying the service-policy to the interface whereby the CPU increases by 20% or can the MQC be fine tuned to have less of an impact on the CPU?
    Is the router just overloaded, taking into account it's only pushing about 400M? Should it be able to do more than this??
    Thanks.
    Andy

  • Rate-limit on eompls VCs

    hello guys,
    is it possible to rate limit an eompls circuit between to PE (rate-limit per VC) ?

    Yes you can try with MQC. Have a class-map which matches any traffic and police the bandwidth
    policy-map l2test
    class l2test
    police 2048000 c t e d
    class l2test
    match any
    Let me know if it works

  • Cisco SG300 VLAN rate-limit

    I have a Cisco SG300 small business switch and 541 APs. There are 2 VLANs in our network. One must be limited by bandwidth. Does anyone have an idea for configure vlan rate-limiting on SG300? And please describe CIR & CBS for me. Thanks.

    http://www.cisco.com/en/US/partner/products/ps10898/prod_command_reference_list.html
    Cisco Small Business 300 Series Managed Switches Command Line Interface Guide Release 1.3
    Select CIR and CBS according to your design. You can use a larger CBS when performance is not ideal.
    49.23 rate-limit (VLAN)
    Use the Layer 2 rate-limit (VLAN) Global Configuration mode command to limit the
    incoming traffic rate for a VLAN. Use the no form of this command to disable the
    rate limit.
    Syntax
    rate-limit vlan-id committed-rate committed-burst
    no rate-limit vlan
    Parameters
    • vlan-id—Specifies the VLAN ID.
    • committed-rate—Specifies the average traffic rate (CIR) in kbits per second
    (kbps). (Range: 3-57982058)
    • committed-burst—Specifies the maximum burst size (CBS) in bytes.
    (Range: 3000-19173960)
    Default Configuration
    Rate limiting is disabled.
    Committed-burst-bytes is 128K.
    Command Mode
    Global Configuration mode
    User Guidelines
    Traffic policing in a policy map takes precedence over VLAN rate limiting. If a
    packet is subject to traffic policing in a policy map and is associated with a VLAN
    that is rate limited, the packet is counted only in the traffic policing of the policy
    map.
    This command does not work in Layer 3 mode. It does not work in conjunction with
    IP Source Guard.
    Example
    The following example limits the rate on VLAN 11 to 150000 kbps or the normal
    burst size to 9600 bytes.
    switchxxxxxx(config)# rate-limit 11 150000 9600

  • Configuring rate-limit in switch 6500

    Good morning gentlemen
    Consider a 6509E (supervisor 720 3B) switch with many interface VLANs configured, one of each related to each customer. Each interface VLAN had configured a rate-limit input and output configured representing the maximum bandwidth permitted for the customer.
    I could configured that way using the old IOS s72033-ipservicesk9_wan-mz.122-18.SXF7.
    Last weekend I had to upgrade that IOS to s72033-ipservicesk9_wan-mz.122-33.SXJ7. All rate-limits in VLAN interfaces disappeared, probably not supported in this new version.
    Now, what's you recommendation to perform the same in this IOS version?...I only found the policy-map/service-policy way.
    Follow my questions:
    1 - "mls qos" is globally disabled. Should I configure globally or by interface VLAN?... Expected any impact?
    I believe that only need "police" for QOS. No need for any other kind of QOS.
    2 - Should I enable "mls qos vlan-based" for each physical layer 2 port connected to that switch related to each interface vlan with police?
    Expected only one physical port (or port-channel) for each customer (and each VLAN) connected to a switch.
    Thank you and regards
    Christian

    Interesting that I have just upgraded the IOS to the last version 12 release.
    I think that for the reason that we are facing high CPU usage for "IP Input" process, something related to mls/cef is not tunned.
    Anyone has any idea regarding the configuration presented?
    Regards
    Christian

  • 3750X rate-limit (QoS)

    Hello,
    I'm trying to configure a rate-limit in a 3750X but I'm not seeing any result... 
    These are my configurations:
    RF#show run 
    Building configuration...
    Current configuration : 23410 bytes
    ! Last configuration change at 08:53:35 UTC Sun Mar 14 1993
    version 15.0
    no service pad
    service timestamps debug datetime msec
    service timestamps log datetime msec
    no service password-encryption
    hostname RF
    boot-start-marker
    boot-end-marker
    no aaa new-model
    switch 1 provision ws-c3750x-48p
    system mtu routing 1500
    ip routing
    ip domain-name erf.carco.com.mx
    rep admin vlan 100
    mls qos
    spanning-tree mode pvst
    spanning-tree extend system-id
    vlan internal allocation policy ascending
    vlan 2
    vlan 4 
    vlan 6
    vlan 8
    vlan 10
    vlan 20
    vlan 21   
    vlan 22
    vlan 23
    vlan 25 
    vlan 26
    vlan 30
    vlan 50
    vlan 53
    vlan 70
    vlan 81
    vlan 91
    vlan 92
    vlan 93
    vlan 95
    vlan 96
    vlan 99
    vlan 100
    vlan 102
    vlan 110
    vlan 122
    vlan 129
    vlan 200
    vlan 213
    vlan 227
    vlan 333
    vlan 357
    vlan 417
    vlan 444
    vlan 500
    vlan 502
    vlan 555
    vlan 700
    vlan 712
    vlan 910
    vlan 911
    vlan 951
    vlan 1105
    vlan 1508
    vlan 1830
    vlan 1870
    vlan 1890
    vlan 1891
    vlan 1892
    class-map match-any test
      match access-group 100
    policy-map test
     class test
      police 150000000 512000 exceed-action drop
    interface Loopback0
     ip address 10.20.40.106 255.255.255.0
    interface Port-channel22
     switchport trunk encapsulation dot1q
     switchport trunk native vlan 100
     switchport mode trunk
     bandwidth 10000000
     rep segment 10
    interface Port-channel24
     switchport trunk encapsulation dot1q
     switchport trunk native vlan 100
     switchport mode trunk
     bandwidth 10000000
     rep segment 10
    interface FastEthernet0
     no ip address
     no ip route-cache
     shutdown
    interface GigabitEthernet1/0/1
    interface GigabitEthernet1/0/2
    interface GigabitEthernet1/0/3
     switchport trunk encapsulation dot1q
     switchport trunk native vlan 100
     switchport trunk allowed vlan 2,10,50,53,60,70,91-93,95,96,99,100,110,213,227
     switchport trunk allowed vlan add 500,700,910,911,951,1830,1870,1890-1892
     switchport mode trunk
     no logging event link-status
     shutdown
     speed 1000
     duplex full
    interface GigabitEthernet1/0/4
     switchport trunk encapsulation dot1q
     switchport trunk native vlan 100
     switchport trunk allowed vlan 2,8,10,20,50,53,70,91-93,95,96,99,100,110,213
     switchport trunk allowed vlan add 227,500,700,910,911,951,1830,1870,1890-1892
     switchport mode trunk
     shutdown
     speed 1000
     duplex full
    interface GigabitEthernet1/0/5
    interface GigabitEthernet1/0/6
    interface GigabitEthernet1/0/7
    interface GigabitEthernet1/0/8
    interface GigabitEthernet1/0/9
    interface GigabitEthernet1/0/10
     switchport access vlan 91
     switchport mode access
     logging event link-status
    interface GigabitEthernet1/0/11
    interface GigabitEthernet1/0/12
    interface GigabitEthernet1/0/13
    interface GigabitEthernet1/0/14
    interface GigabitEthernet1/0/15
     switchport access vlan 91
     switchport mode access
     logging event link-status
    interface GigabitEthernet1/0/16
    interface GigabitEthernet1/0/17
    interface GigabitEthernet1/0/18
    interface GigabitEthernet1/0/19
    interface GigabitEthernet1/0/20
     switchport access vlan 91
     switchport mode access
     logging event link-status
    interface GigabitEthernet1/0/21
    interface GigabitEthernet1/0/22
    interface GigabitEthernet1/0/23
    interface GigabitEthernet1/0/24
    interface GigabitEthernet1/0/25
     switchport access vlan 910
     switchport mode access
    interface GigabitEthernet1/0/26
    interface GigabitEthernet1/0/27
    interface GigabitEthernet1/0/28
    interface GigabitEthernet1/0/29
    interface GigabitEthernet1/0/30
    interface GigabitEthernet1/0/31
    interface GigabitEthernet1/0/32
    interface GigabitEthernet1/0/33
    interface GigabitEthernet1/0/34
    interface GigabitEthernet1/0/35
    interface GigabitEthernet1/0/36
    interface GigabitEthernet1/0/37
     no switchport
     bandwidth 150000
     ip address 10.20.103.13 255.255.255.252
     rate-limit output access-group 100 24000000 3000000 3000000 conform-action transmit exceed-action drop
     logging event link-status
    interface GigabitEthernet1/0/38
    interface GigabitEthernet1/0/39
    interface GigabitEthernet1/0/40
    interface GigabitEthernet1/0/41
    interface GigabitEthernet1/0/42
    interface GigabitEthernet1/0/43
     switchport trunk encapsulation dot1q
     switchport trunk native vlan 100
     switchport mode trunk
     bandwidth 10000000
     channel-group 24 mode on
    interface GigabitEthernet1/0/44
    interface GigabitEthernet1/0/45
     switchport trunk encapsulation dot1q
     switchport trunk native vlan 100
     switchport trunk allowed vlan 2,10,50,53,60,70,91-93,95,96,99,100,110,213,227
     switchport trunk allowed vlan add 500,700,910,911,951,1830,1870,1890-1892
     switchport mode trunk
     shutdown
    interface GigabitEthernet1/0/46
     switchport trunk encapsulation dot1q
     switchport trunk native vlan 100
     switchport trunk allowed vlan 2,10,50,53,60,70,91-93,95,96,99,100,110,213,227
     switchport trunk allowed vlan add 500,700,910,911,951,1830,1870,1890-1892
     switchport mode trunk
     shutdown
    interface GigabitEthernet1/0/47
     switchport trunk encapsulation dot1q
     switchport trunk native vlan 100
     switchport mode trunk
     bandwidth 10000000
     channel-group 22 mode on
    interface GigabitEthernet1/0/48
     switchport trunk encapsulation dot1q
     switchport trunk native vlan 6
     switchport trunk allowed vlan 2,7,10,20,50,53,70,91-93,95,96,99,100,110,213
     switchport trunk allowed vlan add 227,700,910,911,951,1830,1870,1890-1892
     switchport mode trunk
     logging event link-status
     shutdown
    interface GigabitEthernet1/1/1
     switchport trunk encapsulation dot1q
     switchport trunk native vlan 100
     switchport trunk allowed vlan 2,8,10,20,50,53,60,70,91-93,95,96,99,110,213,227
     switchport trunk allowed vlan add 500,700,910,911,951,1830,1870,1890-1892
     switchport mode trunk
     shutdown
    interface GigabitEthernet1/1/2
     switchport trunk encapsulation dot1q
     switchport trunk native vlan 100
     switchport trunk allowed vlan 2,8,10,20,50,53,60,70,91-93,95,96,99,110,213,227
     switchport trunk allowed vlan add 500,700,910,911,951,1830,1870,1890-1892
     switchport mode trunk
     shutdown
    interface GigabitEthernet1/1/3
     switchport trunk encapsulation dot1q
     switchport trunk native vlan 6
     switchport trunk allowed vlan 2,6,8,10,20,50,53,70,91-93,95,96,99,100,110,213
     switchport trunk allowed vlan add 227,700,910,911,951,1830,1870,1890-1892
     logging event link-status
     shutdown
    interface GigabitEthernet1/1/4
     switchport trunk encapsulation dot1q
     switchport trunk native vlan 6
     switchport trunk allowed vlan 2,6,8,10,20,50,53,70,91-93,95,96,99,100,110,213
     switchport trunk allowed vlan add 227,700,910,911,951,1830,1870,1890-1892
     switchport mode trunk
     logging event link-status
     shutdown
    interface TenGigabitEthernet1/1/1
    interface TenGigabitEthernet1/1/2
    interface Vlan1
     no ip address
     shutdown
    interface Vlan6
     description ***LANERF**
     ip address 10.20.6.106 255.255.255.0
     no ip redirects
    interface Vlan23
     description < TRANSITO MUR >
     no ip address
     no ip redirects
    interface Vlan100
     description < VLAN MAN >
     ip address 10.20.100.106 255.255.255.0
     no ip redirects
     ip ospf authentication message-digest
     ip ospf message-digest-key 1 md5 7 032368342B2F0F
     ip ospf dead-interval minimal hello-multiplier 4
    router ospf 1
     router-id 10.20.40.106
     auto-cost reference-bandwidth 100000
     area 0.0.0.0 authentication message-digest
     area 1.80.1.1 authentication message-digest
     redistribute connected subnets
     redistribute static subnets
     passive-interface default
     no passive-interface Vlan23
     no passive-interface Vlan100
     no passive-interface GigabitEthernet1/0/37
     network 10.20.6.0 0.0.0.0 area 0.0.0.0
     network 10.20.40.106 0.0.0.0 area 0.0.0.0
     network 10.20.91.6 0.0.0.0 area 0.0.0.0
     network 10.20.100.106 0.0.0.0 area 0.0.0.0
     default-information originate
    ip http server
    ip http secure-server
    access-list 100 permit ip 10.50.80.0 0.0.0.255 10.80.80.0 0.0.0.255
    access-list 100 permit ip 10.80.80.0 0.0.0.255 10.50.80.0 0.0.0.255
    snmp-server community ASComRO RO
    line con 0
    line vty 0 4
     login
    line vty 5 15
     login
    event manager applet track_qos_down authorization bypass
     event syslog pattern "TRACKING-5-STATE: 15 ip sla 15 reachability Up->Down"
     action 1 cli command "enable"
     action 2 cli command "configure terminal"
     action 3 cli command "interface giga1/0/37"
     action 4 cli command "rate-limit output access-group 100 400000000 50000000 50000000 conform-action transmit exceed-action drop"
     action 5 cli command "end"
    event manager applet track_qos_up authorization bypass
     event syslog pattern "TRACKING-5-STATE: 15 ip sla 15 reachability Down->Up"
     action 1 cli command "enable"
     action 2 cli command "configure terminal"
     action 3 cli command "interface giga1/0/37"
     action 4 cli command "no rate-limit output access-group 100 400000000 50000000 50000000 conform-action transmit exceed-action drop"
     action 5 cli command "end"
    end
    ERF#     
    ERF#show mls qos 
    QoS is enabled 
    QoS ip packet dscp rewrite is enabled 
    ERF#show mls qos inter gigabitEthernet 1/0/37 
    GigabitEthernet1/0/37 
    trust state: not trusted 
    trust mode: not trusted 
    trust enabled flag: ena 
    COS override: dis 
    default COS: 0 
    DSCP Mutation Map: Default DSCP Mutation Map 
    Trust device: none 
    qos mode: port-based 
    When I apply the command I'm seeing a gauge using a 3rd party but I'm not seeing that the traffic will be truncated @ 50Mbps.
    Any thoughts??? 

    Hi
    Bandwidth commands allocates the particular amount of bandwidth you mention or configure over there.
    Basically you have the liberty to configure upto 75% of the available interface bandwidth to different classes.
    most widelys used with CBWFQ technique..
    so while configuring up the same better to watch out for the exact bandwidth value keyed in on the interface to have your alloocation work properly.
    policing basically used for limiting the traffic or to control the bursts by dropping them or marking them with different ip precedence or DSCP values.
    its very much similar to the rate-limit command applied on the interface level which again uses token bucket system either single or dual based on the configuration parameters.
    for more info on above mentioned clis do check these links..
    http://www.cisco.com/en/US/tech/tk543/tk545/tsd_technology_support_protocol_home.html
    http://www.cisco.com/en/US/tech/tk543/tk544/tsd_technology_support_protocol_home.html
    regds

  • Rate Limit Traffic on Router

    Is it possible to limit bandwidth between two IPs using ACL or policy map. Like for example i want to limit 50% file sharing traffic coming or going to an IP 172.19.60.50

    Hello,
    You can rate limit the traffic using Traffic Policing or traffic shapping and YES you can match based on the flow of the traffic
    Looking for some Networking Assistance? 
    Contact me directly at [email protected]
    I will fix your problem ASAP.
    Cheers,
    Julio Carvajal Segura
    http://laguiadelnetworking.com

  • Limit TOTAL bandwidth on Server

    Hi all
    I have two question:
    1) There is a method for limit the TOTAL (not for client) bandwidth in downstream withouth the Server Side Action Script ?
    2) If the anwer on the first question is NO (i think NO) can you give me an example of the script for limit the TOTAL bandwidth in Downstream ?
    Thanks all.
    PL

    Disclaimer
    The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
    Liability Disclaimer
    In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
    Posting
    Routers don't have feature to limit bandwidth by some to some cumulative amount.
    What you might be able to do is use embedded scripting, monitor usage from 6 AM to 8 PM, and as it approaches your cumulative limit, add (via the embedded script) a policer to try to avoid hitting your cap.  The embedded script could set a policy, as the cap is about to be reached, to drop all further packets.  It could also have tiers allowed policed bandwidths, which slow egress rates as cap is approached.

  • Limit total bandwidth sent by a router

    I have a router in a remote location that the ISP limits us so we can only send up to 800MB of data from 6 am to 8 pm after that we can send as much as we want. I have some servers that I always want to be able to get out - is there a way to put a hard cap on the users so that they have 200 MB of data in those hours and if they "spend" it all they are cut off until the unlimited time.
    I do not need to shape or police traffic - i need to put a cap on the router so it will not over send the 800MB limit - is this possible?

    Disclaimer
    The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
    Liability Disclaimer
    In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
    Posting
    Routers don't have feature to limit bandwidth by some to some cumulative amount.
    What you might be able to do is use embedded scripting, monitor usage from 6 AM to 8 PM, and as it approaches your cumulative limit, add (via the embedded script) a policer to try to avoid hitting your cap.  The embedded script could set a policy, as the cap is about to be reached, to drop all further packets.  It could also have tiers allowed policed bandwidths, which slow egress rates as cap is approached.

Maybe you are looking for