Solved

Bandwidth Managment with Cisco 2600

Posted on 2002-04-30
12
855 Views
Last Modified: 2009-03-23
Hi,

is it possible to do a sort of bandwidth management on a cisco 2600 router?

Let me explain. I have 2 host behind a 2600 router (connected via the ethernet adaptor). The other side of the router is a WAN link serial leased line (128k).
Is it possible to let ftp traffic to one host with a bandwidth limitation of 80k and the other host 48k of maximum ftp traffic.

Hope you understand what i mean :)

Kind regards

PCassimans  
0
Comment
Question by:PCassimans
12 Comments
 
LVL 79

Expert Comment

by:lrmoore
Comment Utility
You can use Generic Traffic Shaping to rate-limit based on source IP address

http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/qos_c/qcprt4/qcdgts.htm


example:

access-list 101 permit host <host1 IP> any eq ftp
access-list 102 permit host <host2 IP> any eq ftp

interface ether 0/0
 traffic-shape group 101 80000
 traffic-shape group 102 48000


0
 

Author Comment

by:PCassimans
Comment Utility
Hi thx for the fast reply.

In the cisco document they say the following:

"It is only supported on generic routing encapsulation (GRE) tunnel interfaces"

Do i have to do something special for that?

It is not supported on ISDN. (i don't need it right now, but in the future maybe). Is there an other way to do it on ISDN?

Pierre
0
 

Expert Comment

by:hmkias
Comment Utility
Since u say u have two hosts connected to the router , u can very well define the bandwidth at the WAN port & ethernet port  using BANDWIDTH command respectively . It should work well. Traffic shaping is also  when u hv too many hosts on the subnet & thereby control the BW for every IP.

Regards,
Kias
0
 

Author Comment

by:PCassimans
Comment Utility
hmkias,

Can you give me an example of what you
propose to do?

thx

PS:please don't post answers but only comments, otherwise the question is locked for comment from other experts!
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 200 total points
Comment Utility
Traffic shaping can be applied to any interface not just a GRE tunnel.

The bandwidth statement on an interface does absolutely nothing to limit the bandwidth. It is used exclusively by internal system processes and by external network management systems as a measure of what the bandwidth should be.

What version IOS are you running?
0
 

Author Comment

by:PCassimans
Comment Utility
lrmoore

IOS 12.1 ip feature pack.

I'll have a test with traffic shaping over isdn, and if it works i'll accept your answer with pleasure :)


0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 79

Expert Comment

by:lrmoore
Comment Utility
You still put the traffic shaping on the internal Ethernet interface to limit the traffic from that interface across the WAN regardless of whether or not the WAN interface is ISDN, PPP, frame-relay, whatever..
0
 

Author Comment

by:PCassimans
Comment Utility
0
 

Author Comment

by:PCassimans
Comment Utility
0
 

Author Comment

by:PCassimans
Comment Utility
0
 
LVL 79

Expert Comment

by:lrmoore
Comment Utility

This question appears to be abandoned. I will allow one week before I close this question
with the following recommendation:

- points to lrmoore

if there is any objection to this recommendation then please post it here within 7 days.

thanks,

lrmoore@nw
EE Cleanup Volunteer
0
 

Expert Comment

by:SpideyMod
Comment Utility
per recommendation

SpideyMod
Community Support Moderator @Experts Exchange
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Suggested Solutions

In a WLAN, anything you broadcast over the air can be intercepted.  By default a wireless network is wide open to all until security is configured. Even when security is configured information can still be intercepted! It is very important that you …
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now