Limit network bandwidth (PIX 515E OS 7.2.1 & Dell PowerConnect 5324)

Posted on 2006-10-19
Last Modified: 2012-05-05
I have a server on my network that I need to limit the bandwidth on.  Presently it is behind a Cisco PIX 515E (running 7.2.1) and attached to a Dell PowerConnect 5324 switch.  I need to be able to cap the bandwidth at 256kbps for the port, I dont really care where I apply the limit but need to make this happen.
Question by:innotionent
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
  • 2
LVL 79

Expert Comment

ID: 17771251
The PIX can't help you, and I don't know if the PowerConnect switch can do bandwidth policing.
If the server is Windows 2003 it has QoS settings that can throttle it..

Author Comment

ID: 17771260
I looked at both of those documents and I dont see where it says I can set the maximum throughput on the interface.
LVL 79

Expert Comment

ID: 17771302
Well... I may have thrown you a red herring . . . I'll have to research that one a bit more.
However, the Dell switch is capable of QoS and WRR which should allow you to identify, tag, and pseudo rate-limit traffic from this server on the switch.
Supports up to 4K resolution!

The VS192 2-Port 4K DisplayPort Splitter is perfect for anyone who needs to send one source of DisplayPort high definition video to two or four DisplayPort displays. The VS192 can split and also expand DisplayPort audio/video signal on two or four DisplayPort monitors.


Author Comment

ID: 17771312
I read all of that, does that actually work? If I understand it correctly I dump all of the traffic into one QoS category and then I can assign a rate limit to that?
LVL 10

Expert Comment

ID: 17771516
Pix v7.0+ does do both policing of the traffic (rate limiting) or QoS.  The newer v7.2 can even add the l2l QoS parameters for you site to site vpn traffic.

Check the policing section for what you want.

Author Comment

ID: 17773480
Joesmail, that looks really close to what I am trying to do, but it doens't look like its a cap on the entire interface (or VLAN in my case) is that possible?
LVL 10

Accepted Solution

Joesmail earned 500 total points
ID: 17780495
Hi Inno,

Policing and QoS are applied to an interface although it can be any traffic you setup in the class map.  You need to sit down and read this document in its entirety.  It’s important to understand some of the examples without going into QoS design. Its always good design to use the "class-default" at the end of any policy-map.  I am only offering a guide below as most of the QoS I put in place is for VOIP over VPN's (no special servers).  If the server is the only device attached to one of the PIX interfaces just apply it to that interface.  Otherwise you might want to think a little harder about exactly what you want the traffic applying to if you map it to the outside interface.

To get you on the right track...You need to define the class-map using your traffic.  In your case you only want to police a server.  You can approach this in several ways although just adding a simple access-list with the ip address of the server will probably work for you.

hostname(config)# access-list my_special_server permit tcp host any
hostname(config)# class-map my_special_server
hostname(config-cmap)# match access-list my_special_server

- then create the police map with this class-map and the class-map default (as mentioned above you might want to think of others in this list).

e.g.  (256k for for special server, 1gb the rest.)
hostname(config)# policy-map restrict_special_server
hostname(config-pmap)# class my_special_server
hostname(config-pmap-c)# police output 256000 20000
hostname(config-pmap-c)# class class-default
hostname(config-pmap-c)# police output 1000000 37500

- then apply it to a fa0/1 or "outside".  You probably only want to poice the traffic output, unless its a highend web server?

service-policy restrict_special_server interface outside

Don't try to play with the DSCP values you assign to traffic or search for in packets unless you get familiar with it.  God knows I have some issues trying to use these on different Cisco devices as there are certain rules you have to follow e.g. Cisco 3550 can only apply these to traffic flowing out an interface etc..etc..

Play around with the access-list and matching traffic and remember to use the "sh service-policy police" and "sh run policy-map" to make sure everything is working ok.

Good luck.

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For months I had no idea how to 'discover' the IP address of the other end of a link (without asking someone who knows), and it drove me batty. Think about it. You can't use Cisco Discovery Protocol (CDP) because it's not implemented on the ASAs.…
This article is a collection of issues that people face from time to time and possible solutions to those issues. I hope you enjoy reading it.
Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
Suggested Courses

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question