Link to home
Start Free TrialLog in
Avatar of gatorIT
gatorIT

asked on

Traffic Shaping/QoS with Bandwidth Limiting and Burst

I'm looking for a router or L3 switch that provides ingress/egress rate limiting with bursting.  I've looked at the Cisco Catalyst 3750 and 3560 L3 switches but they don't appear to have true egress rate limiting capabilities (although the EMI image might provide additional capability?).  

Our scenario is fairly straightforward - we've got a fiber to copper optical network hand-off.  We're trying to determine the best solution to segment the network into VLANs so that each has a dedicated portion of the total WAN pipe (this will most likely be even among all VLAN interfaces but I don't think this matters).  After

Would someone be able to provide confirmation as to what L3 switch and/or routers would be able to provide the ingress/egress rate limiting along with bursting?  I understand the bursting is a function of specifying an amount of data that is able to pass through before the rate limit is applied.  

I prefer a L3 switch simply because we can do everything all in one device but I'd like the most straightforward and stable approach.  If a router and L2 switch is more straightforward, I'm open to going in that direction.
Avatar of cdusio
cdusio
Flag of United States of America image

You should be able to accomplish that with a 3750 series switch.
Here's a link to an article that might help explain the capabilities of what you are trying to do.
http://www.cisco.com/en/US/products/hw/switches/ps5023/products_tech_note09186a0080883f9e.shtml#concept12

you can police ingress but you could invert that as well and apply inbound to the other side and that should work.
hth
ASKER CERTIFIED SOLUTION
Avatar of koudry
koudry
Flag of United Kingdom of Great Britain and Northern Ireland image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
When you configure policing, you will need to specify the burst (in bytes), for example:

policy-map test_policy
  class TestClass
    police CIR NORMAL_BURST EXCESS_BURST  conform-action  exceed-action

CIR: Committed Information Rate in bps

NORMAL_BURST -  in bytes is calculated as follows:
Square route of CIR (in Kb) multiplied by 1000   -- the result is rounded to the nearest 500

example: if CIR is 1000000 bps --> 1000kb, normal burst =[ sqrt (1000) ] * 1000

EXCESS_BURST = NORMAL_BURST * 2

Conform action: this can be transmit

Exceed action: can be drop

-------------------Example config------------
policy-map test_policy
  class TestClass
     police 1000000 32000 64000 conform-action transmit exceed-action drop
!

Avatar of gatorIT
gatorIT

ASKER

Thanks for the responses.  Could you provide model numbers routers?  Also, is the EMI IOS required for these QoS features (both ingress and egress) or will SMI suffice?

I suspect you will need EMI because this provides you with more features than SMI. You also pay more for EMI, so if money is not an issue, then EMI is your choice [see also http://www.tek-tips.com/viewthread.cfm?qid=1157540&page=1].

In terms of feature set, this will depend on where the device is on the network. For example, we use Advanced Security (k9) for our DSL CPE. This allows us to do QoS, RIP/static, VPN, embeded /software firewall etc.

If you are on the core network, you will need a different kind of feature set.  For example, you might want to use a service provider feature set on a Cisco 7200 or Cisco 10720 core router (see details @ http://tools.cisco.com/ITDIT/CFN/Dispatch?HMR_DDM=0&HPF_DDM=0&H_RBut=IM&HPN_Text=&Q1Submit=Continue&act=rlsSelect&task=display&HIM_Text=c10700-p-mz.120-27.S4.bin)

If you go with routers, you might want to use Cisco 2811, 1841, 3745 etc on your CPE base connecting (copper) to your access router which can be a Cisco 7200 or 10720 as these have gigabit port with fibre supports. You can run your BGP, OSPF etc here and do QoS as well.

If you decide to go with switches, you can have 3560 as your CPE base and use 3750 in your core network with EMI type of IOS. As I said in my previous post, switches may be cheaper and provide denser ports. You can still do QoS but the QoS isn't great.  You need to look at how much you want to spend.

When you decide which way to go, I am not an expert but I may be able to provide further information.

Good luck.

Koudry
Avatar of gatorIT

ASKER

We're only talking about a 15 Mbps WAN connection (ethernet handoff) so we basically just need an edge router.  It seems like this equipment might be overkill for our application.  

The Fortinet Fortigate 50B or Cisco ASA5510 may well be all we need.  The ASA5505 would probably be sufficient but it seems to only support 3 VLANs.  

Continuing to do research on this end, but a Cisco 3650 along with 3750 is not in the budget for this project.
I have used a Cisco ASA 5510 as a firewall device but never attempted QoS on it. Looking at the Internet, I came accrosss this document:
 http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/about.html
Chapter 21, "Using Modular Policy Framework" of the above document, covers QoS among other things. This may provide a starting point to see if the Cisco ASA 5510 can deliver the service that you care looking for.
Thanks,
Koudry