Limiting or Dedicating Bandwidth to specific services

Posted on 2008-10-30
Medium Priority
Last Modified: 2013-11-10
I have a network that consists of the following:
Cisco 2851 -> Cisco PIX 515e -> Cisco 3550 (3), Cisco 3560 POE (1) clustered

We have 3 T1's into the facility, the first is for VOIP, the other two are for data.
We purchased one of the T1's specifically for a particular customer's project (we are a software dev co. that utilize large amounts of streaming video at any given time.
Right now, I would describe it as a first come first serve take as much as you can get setup.
We have several web servers for outside customers/ users as well as remote users utilizing access to our LAN via VPN. The servers hosting web pages are our Webmail, HelpDesk, TimeKeeping, etc...
My question is how do I dedicate 1.5 meg to the server/vlan that is directly "dedicated" to a specific customer. All of my servers set on one switch that is trunked to my 3560 and then out.
Also, the 3560 POE is the switch that all of my Cisco 7961's are connected to and each local user is connected through the phone, etc...

Where do I start to dedicate or impliment some type of QoS?
Question by:orci
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
LVL 15

Accepted Solution

bkepford earned 1500 total points
ID: 22843275
If you have your two T1s bundled the best thing to do is to use MQC and creat a class map for the customer and then specify the amout of bandwidth you want to guarantee and then apply the policy to the interface. Make sure your bandwidth is correct on your interface.  Here is an example

access-list 1 permit <PUBLIC IP OF CUSTOMER>
class-map match-all CUSTOMERX
 match access-group 1
policy-map CUSTOMERX
  bandwidth percent 50
interface Multilink 1
 bandwidth 3000
 service-policy output CUSTOMERX

Open in new window


Featured Post

Ransomware Attacks Keeping You Up at Night?

Will your organization be ransomware's next victim?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with our Ransomware Prevention Kit!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
This article will show how Aten was able to supply easy management and control for Artear's video walls and wide range display configurations of their newsroom.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question