Solved

Cisco Time based Traffic Shaping

Posted on 2011-03-14
4
1,338 Views
Last Modified: 2012-08-14
We have a server in head office that sends out updates to remote office servers regularly. When this happens it can slow down the connections between offices by utilizing most of the bandwidth. I want to throttle the bandwidth that travels over our WAN links and implement a time scheule so that after hours it can use more bandwidth. We only have T1 connections to remote offices so the bandwidth isnt that huge. This is what I have now and it is effectively shaping the traffic but I want to add some time rules for it.

interface FastEthernet0/0
 ip address 192.168.4.21 255.255.252.0

interface FastEthernet0/1
  ip address 172.17.1.6 255.255.255.252
  traffic-shape group 102 395264 49408 49408 1000

access-list 102 permit ip host 192.168.5.2 any
access-list 102 permit ip any host 192.168.5.2
0
Comment
Question by:damte
  • 2
4 Comments
 
LVL 17

Accepted Solution

by:
rochey2009 earned 250 total points
Comment Utility
Hi,

Try the following:

Create a time range.

time-range shape-server
 periodic weekdays 8:00 to 18:00

replace your access-list with:

access-list 102 permit ip host 192.168.5.2 any time-range shape-server
access-list 102 permit ip any host 192.168.5.2 time-range shape-server
0
 

Assisted Solution

by:voyager2ie
voyager2ie earned 250 total points
Comment Utility
While you can continue to use Generic Traffic Shaping to achieve the desired result, using CBWFQ is much more scalable and will allow you to do a lot more.

Use the following configurations to enable time-based traffic shaping:

---Define the time ranges (use your own values here)---
time-range DAY
 periodic daily 8:00 to 20:00
!
time-range NIGHT
 periodic weekdays 20:01 to 7:59
 periodic weekend 0:00 to 23:59
 
---Configure ACLs to specify interesting traffic and call the time ranges---

 ip access-list extended police-updates-daytime
  permit ip host 192.168.5.2 any time-range DAY
 ip access-list extended police-updates-nighttime
  permit ip host 192.168.5.2 any time-range NIGHT
 
 ---Configure class-map statements which call the ACLs---

 class-map match-all police-updates-daytime
   description Police updates to remote sites between 8am to 8pm
   match access-group name police-updates-daytime
 class-map match-all police-updates-nighttime
   description Police updates to remote sites between 8pm to 8am and weekends
   match access-group name police-updates-nighttime
 !
 
---Configure the main policy-map which calls the two class-maps and enforces the max BW for the server during the time ranges (again, use your own BW values...I set 200Kbps max during the day and full 1.544 at night/weekends)---

 policy-map Police-Update-Traffic
  class police-updates-daytime
     police 200000
  class police-updates-nighttime
     police 1544000

Once this is in, you will need to bind this to your WAN interface:

int Fa0/1:
service-policy output Police-Update-Traffic

Using this method should allow you to easily tack other shaping needs on top...more config than what you have now, but much more flexible.

Hope this helps!
0
 

Author Comment

by:damte
Comment Utility
Thank you for the responces. Both seemed to have working in my testing.

Voyager2ie, just one command that did not work for me was:
periodic weekdays 20:01 to 7:59
I had to separate those in 2 commands, I was not able to have an end time less that the start time. Fixed by
periodic weekdays 20:01 to 23:59
periodic weekdays 0:00 to 7:59
0
 

Expert Comment

by:voyager2ie
Comment Utility
Good catch. I forgot about the change of day when there are multiple statements.
0

Featured Post

Free camera licenses with purchase of My Cloud NAS

Milestone Arcus software is compatible with thousands of industry-leading cameras for added flexibility. Upon installation on your My Cloud NAS, you will receive two (2) camera licenses already enabled in the software. And for a limited time, get additional camera licenses FREE.

Join & Write a Comment

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now