Solved

Traffic-Shape Rate command

Posted on 2008-06-16
2
3,924 Views
Last Modified: 2012-06-21
I have a 20MB static line to the internet and have to provide the traffic shaping to avoind packet loss.  I am struggling with the command needed on the GB interface.

Here is what I have:
Interface GB0/0
 traffic-shape rate 20000000 500000 500000 1000

The command I entered however was simply
traffic-shape rate 20000000 and the rest was added automatically.  Is the above line proper for a 20MB internet connection.
0
Comment
Question by:vppinc
2 Comments
 
LVL 11

Accepted Solution

by:
rowansmith earned 500 total points
ID: 21809174
Is GB0/0 Connected to your ISP?  Does this interface have an IP Address assigned or is the IP Address on a sub-interface?

If so then this is configured correctly.  The remaining settings are set buy the IOS to allow you to maintain maximum throughput.

The format is:  traffic-shape rate bit-rate [burst-size [excess-burst-size]] [buffer-limit]

Bit-rate:
Bit rate that traffic is shaped to, in bits per second. This is the access bit rate that you contract with your service provider, or the service levels you intend to maintain. Bit rates can be in the range of 8000 to 100000000 bps.

burst-size:
(Optional) Sustained number of bits that can be sent per interval. On Frame Relay interfaces, this is the Committed Burst size contracted with your service provider. Valid entries are numbers in the range of 0 to 100000000.

excess-burst-size:
(Optional) Maximum number of bits that can exceed the burst size in the first interval in a congestion event. On Frame Relay interfaces, this is the Excess Burst size contracted with your service provider. Valid entries are numbers in the range of 0 to 100000000. The default is equal to the burst-size argument.

buffer-limit:
(Optional) Maximum buffer limit in bps. Valid entries are numbers in the range of 0 to 4096.

0
 

Author Closing Comment

by:vppinc
ID: 31467783
GB0/0 is connected to our ISP and the address is assigned to the physical interface.  Thanks for the info.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Tired of waiting for your show or movie to load?  Are buffering issues a constant problem with your internet connection?  Check this article out to see if these simple adjustments are the solution for you.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now