VLAN1 internal traffic Internal
VLAN2 future use
VLAN3 guest
VLAN4 future use
VLAN5 future use
I am trying to limit bandwidth on the Guest network to 1meg.. Please take a look at the classmap and policy map, I am not able to get the desired results.
!
interface FastEthernet4
description WAN Interface(OUTSIDE)
ip address dhcp
ip nat outside
ip virtual-reassembly
duplex auto
speed auto
service-policy input MAN-BANDWIDTH
!
interface Virtual-Template1 type tunnel
no ip address
tunnel mode ipsec ipv4
!
interface wlan-ap0
description Service module interface to manage the embedded AP
ip unnumbered Vlan1
arp timeout 0
!
interface Wlan-GigabitEthernet0
description Internal switch interface connecting to the embedded AP
switchport mode trunk
!
interface Vlan1
description Internal
ip address 10.217.70.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
interface Vlan2
ip address 10.217.71.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
interface Vlan3
description Guest
ip address 10.217.72.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
interface Vlan4
ip address 10.217.73.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
interface Vlan5
ip address 10.217.74.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
!
ip nat inside source list 100 interface FastEthernet4 overload
!
ip access-list extended BlockGuest_ToProd
remark BlockGuest_ToProd
remark SDM_ACL Category=1
deny ip 10.217.72.0 0.0.0.255 10.0.0.0 0.255.255.255
permit ip any any
!
access-list 100 remark NATinsideOut
access-list 100 remark SDM_ACL Category=2
access-list 100 permit ip 10.192.0.0 0.31.255.255 any
access-list 110 permit ip 10.217.72.0 0.0.0.255 any
Networking ProtocolsNetworkingRouters
Last Comment
kevinhsieh
8/22/2022 - Mon
JPDU4
ASKER
I have changed the service policy from in to out, with no difference.
The only time I am able to match the policy map is if I change access-list 110 to ip any any, unfortunately then it would match the internal vlan as well - which I don't want to limit.
I want to place it on fa4 because this device an an ISR, I want to be able to control the WAP users as well with out having to apply it to all of the interfaces... I just upgraded the code with out any improvement. Seems very weird that the ACL is not being matched. I have checked my workstation million times to enure it is on that network 10.217.72.0 which it is.
Per vlan class map - Bandwidth Limit
Asked by: JPDU4
I have a router with 5 vlans
VLAN1 internal traffic Internal
VLAN2 future use
VLAN3 guest
VLAN4 future use
VLAN5 future use
I am trying to limit bandwidth on the Guest network to 1meg.. Please take a look at the classmap and policy map, I am not able to get the desired results.
!
interface FastEthernet4
description WAN Interface(OUTSIDE)
ip address dhcp
ip nat outside
ip virtual-reassembly
duplex auto
speed auto
service-policy input MAN-BANDWIDTH
!
interface Virtual-Template1 type tunnel
no ip address
tunnel mode ipsec ipv4
!
interface wlan-ap0
description Service module interface to manage the embedded AP
ip unnumbered Vlan1
arp timeout 0
!
interface Wlan-GigabitEthernet0
description Internal switch interface connecting to the embedded AP
switchport mode trunk
!
interface Vlan1
description Internal
ip address 10.217.70.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
interface Vlan2
ip address 10.217.71.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
interface Vlan3
description Guest
ip address 10.217.72.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
interface Vlan4
ip address 10.217.73.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
interface Vlan5
ip address 10.217.74.1 255.255.255.0
ip nat inside
ip virtual-reassembly
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
!
ip nat inside source list 100 interface FastEthernet4 overload
!
ip access-list extended BlockGuest_ToProd
remark BlockGuest_ToProd
remark SDM_ACL Category=1
deny ip 10.217.72.0 0.0.0.255 10.0.0.0 0.255.255.255
permit ip any any
!
access-list 100 remark NATinsideOut
access-list 100 remark SDM_ACL Category=2
access-list 100 permit ip 10.192.0.0 0.31.255.255 any
access-list 110 permit ip 10.217.72.0 0.0.0.255 any
JPDU4 requested that this question be closed by accepting JPDU4's comment #37724649 (0 points) as the solution for the following reason:
rate-limit on the vlan interface resolved the issue
To cancel this request and generate a request for Moderator review, state your reason for objecting in the standard comment box and click the 'Object' button. This question will be closed on 3/19/2012 if there are no objections.
Answers
Your Comment
by: JPDU4Posted on 2012-03-13 at 10:00:51ID: 37715068
I have changed the service policy from in to out, with no difference.
The only time I am able to match the policy map is if I change access-list 110 to ip any any, unfortunately then it would match the internal vlan as well - which I don't want to limit.
Accept Multiple SolutionsAccept as Solution
Expert Comment
by: kevinhsiehPosted on 2012-03-14 at 02:57:58ID: 37718751
From what I can tell, you currently are limiting only the amount of traffic that the guests can send out, but you are not limiting the traffic that can be downloaded from your WAN connection.
Add to your access list so you can catch traffic in both directions. You can then apply in both directions. Are you unable to apply to VLAN 4? That would make more sense to me than on your WAN interface.
access-list 110 permit ip any 10.217.72.0 0.0.0.255
Accept Multiple SolutionsAccept as Solution
Your Comment
by: JPDU4Posted on 2012-03-14 at 14:49:16ID: 37722071
Still not seeing it even hit the ACL.
I want to place it on fa4 because this device an an ISR, I want to be able to control the WAP users as well with out having to apply it to all of the interfaces... I just upgraded the code with out any improvement. Seems very weird that the ACL is not being matched. I have checked my workstation million times to enure it is on that network 10.217.72.0 which it is.
Accept Multiple SolutionsAccept as Solution
Your Comment
by: JPDU4Posted on 2012-03-15 at 08:19:49ID: 37724649
Performing a rate-limit on the vlan works.
rate-limit input 1048000 131072 131072 conform-action transmit exceed-action drop
rate-limit output 1048000 131072 131072 conform-action transmit exceed-action drop
kevinhsieh
Wasn't it my suggestion to apply to the VLAN interface? #37718751
The only time I am able to match the policy map is if I change access-list 110 to ip any any, unfortunately then it would match the internal vlan as well - which I don't want to limit.