Solved

Limit network bandwidth (PIX 515E OS 7.2.1 & Dell PowerConnect 5324)

Posted on 2006-10-19
9
1,391 Views
Last Modified: 2012-05-05
I have a server on my network that I need to limit the bandwidth on.  Presently it is behind a Cisco PIX 515E (running 7.2.1) and attached to a Dell PowerConnect 5324 switch.  I need to be able to cap the bandwidth at 256kbps for the port, I dont really care where I apply the limit but need to make this happen.
0
Comment
Question by:innotionent
  • 3
  • 2
  • 2
9 Comments
 
LVL 79

Expert Comment

by:lrmoore
Comment Utility
The PIX can't help you, and I don't know if the PowerConnect switch can do bandwidth policing.
If the server is Windows 2003 it has QoS settings that can throttle it..
http://technet2.microsoft.com/WindowsServer/en/library/a9b9d7f3-ff08-4c49-b8a7-b92e9ce080101033.mspx?mfr=true
http://technet2.microsoft.com/WindowsServer/en/library/450c1fec-d358-42f4-b7e4-18b3f47ef6ff1033.mspx?mfr=true
0
 
LVL 5

Author Comment

by:innotionent
Comment Utility
I looked at both of those documents and I dont see where it says I can set the maximum throughput on the interface.
0
 
LVL 79

Expert Comment

by:lrmoore
Comment Utility
Well... I may have thrown you a red herring . . . I'll have to research that one a bit more.
However, the Dell switch is capable of QoS and WRR which should allow you to identify, tag, and pseudo rate-limit traffic from this server on the switch.
http://docs.us.dell.com/support/edocs/network/pc5324/en/UG/qos.htm#1133796
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 5

Author Comment

by:innotionent
Comment Utility
I read all of that, does that actually work? If I understand it correctly I dump all of the traffic into one QoS category and then I can assign a rate limit to that?
0
 
LVL 10

Expert Comment

by:Joesmail
Comment Utility
Pix v7.0+ does do both policing of the traffic (rate limiting) or QoS.  The newer v7.2 can even add the l2l QoS parameters for you site to site vpn traffic.
http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_7_2/conf_gd/firewall/qos.htm#wp1043440

Check the policing section for what you want.
0
 
LVL 5

Author Comment

by:innotionent
Comment Utility
Joesmail, that looks really close to what I am trying to do, but it doens't look like its a cap on the entire interface (or VLAN in my case) is that possible?
0
 
LVL 10

Accepted Solution

by:
Joesmail earned 500 total points
Comment Utility
Hi Inno,

Policing and QoS are applied to an interface although it can be any traffic you setup in the class map.  You need to sit down and read this document in its entirety.  It’s important to understand some of the examples without going into QoS design. Its always good design to use the "class-default" at the end of any policy-map.  I am only offering a guide below as most of the QoS I put in place is for VOIP over VPN's (no special servers).  If the server is the only device attached to one of the PIX interfaces just apply it to that interface.  Otherwise you might want to think a little harder about exactly what you want the traffic applying to if you map it to the outside interface.

To get you on the right track...You need to define the class-map using your traffic.  In your case you only want to police a server.  You can approach this in several ways although just adding a simple access-list with the ip address of the server will probably work for you.

e.g.
hostname(config)# access-list my_special_server permit tcp host 192.168.1.1 any
hostname(config)# class-map my_special_server
hostname(config-cmap)# match access-list my_special_server

- then create the police map with this class-map and the class-map default (as mentioned above you might want to think of others in this list).

e.g.  (256k for for special server, 1gb the rest.)
hostname(config)# policy-map restrict_special_server
hostname(config-pmap)# class my_special_server
hostname(config-pmap-c)# police output 256000 20000
hostname(config-pmap-c)# class class-default
hostname(config-pmap-c)# police output 1000000 37500

- then apply it to a interface....int fa0/1 or "outside".  You probably only want to poice the traffic output, unless its a highend web server?

e.g.
service-policy restrict_special_server interface outside

Don't try to play with the DSCP values you assign to traffic or search for in packets unless you get familiar with it.  God knows I have some issues trying to use these on different Cisco devices as there are certain rules you have to follow e.g. Cisco 3550 can only apply these to traffic flowing out an interface etc..etc..

Play around with the access-list and matching traffic and remember to use the "sh service-policy police" and "sh run policy-map" to make sure everything is working ok.

Good luck.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now