Solved

Help with ios: rate-limit

Posted on 2008-10-13
4
1,021 Views
Last Modified: 2010-05-18
I need to know what exactly this rate-limit mean

 rate-limit output access-group 159 384000 256000000 256000000 conform-action continue exceed-action drop
 rate-limit output access-group 159 256000 512000000 512000000 conform-action transmit exceed-action drop

I need a detailed explanation.

Somebody can help me?
0
Comment
Question by:nahime
  • 2
  • 2
4 Comments
 
LVL 11

Expert Comment

by:donmanrobb
ID: 22705268
access-group 159 is an access-list that tells what hosts this applys to.
384000 bps, the fastest the traffic should flow
256000000 burst - How many packets should travel in 1/8 of a second normally, should be 48000
256000000 max burst  - how much traffic can excessly burst in 1/8 a second, again should be smaller
conform-action transmit - If traffic stays before this criteria tranmit
exceed drop - if it exceeds drop the traffic.
0
 
LVL 8

Author Comment

by:nahime
ID: 22705763
256000000 burst - How many packets should travel in 1/8 of a second normally, should be 48000
256000000 max burst  - how much traffic can excessly burst in 1/8 a second, again should be smaller

So this two are too big?
The person who made this script says that after the user download 250 mb (256000000) the bandwidth is limited to 384000 bps.

This is false?
0
 
LVL 11

Accepted Solution

by:
donmanrobb earned 500 total points
ID: 22705837
Yeah its false.

Rate-limiting is only used to shape traffic that is going to fast, it has no consideration for how much a user is downloading however if they start downloading faster then 384k they will be slowed down.


The numbers are way too big as of right now they could download at 256000000 kbs before anything is done.

0
 
LVL 8

Author Comment

by:nahime
ID: 22706256
Thank you.
This real helps me.
I'm going to post another question on how to reach my intent on ios, please partecipate if you know how.
Bye
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
MAC Access List to Block DHCP Traffic on a Cisco SG500 19 47
Website Routing Issue 3 49
VLAN question 7 60
How to use a IP block on cisco 877 3 40
In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…
Hello , This is a short article on how would you go about enabling traceoptions on a Juniper router . Traceoptions are similar to Cisco debug commands but these traceoptions are implemented in Juniper networks router . The following demonstr…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now