Solved

Limit-Bandwidth

Posted on 2013-06-08
5
512 Views
Last Modified: 2013-07-10
Hi experts,

I hava 5Mb comes to my router and I have 12 vlans I want to reserve 2Mb for one vlan and divide the rest on other vlans. How can I do this by command without third party.

My router is cisco 2821 and 2960 TTL switch.

Thanks
0
Comment
Question by:lexmark1
5 Comments
 
LVL 13

Expert Comment

by:Sandy
ID: 39231674
Implement Qos or just use bandwidth command in IOS

Cheers
SA
0
 

Author Comment

by:lexmark1
ID: 39232564
Hi Dear,

I configured like this but doesn't work with me

router(config-subif)# bandwidth 2000000


Thanks
0
 
LVL 20

Accepted Solution

by:
agonza07 earned 500 total points
ID: 39235330
Bandwidth command won't do you much good. it's only used for metrics, not actual limiting.

You're going to have to do some QoS with shaping commands. Here's a sample from one of my switches. You will have to do it on your router, and the router has more capabilities than my switch, but here's a start for you.

It'll probably be better for you to do a nested QoS. Limit the whole interface for 5Mb, then do another QoS layer with your important VLAN as priority, then leave the class default as is.

Anyways, check out my config below so you can see how I'm shaping my traffic, but then create one yourself by following the guide below.

http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcfpolsh.html


interface GigabitEthernet0/0
 bandwidth 4096
 service-policy output VZ-traf-shaping


policy-map VZ-traf-shaping
 class Voice-Traffic
   set dscp ef
    priority
    police cir 512000 bc 640
 class OracleTraffic
    shape average 1536000
   set dscp af31
 class class-default
    queue-limit 3000
    shape average 2048000

class-map match-all OracleTraffic
  match access-group 103

class-map match-any Voice-Sig
  match  dscp af31
  match  dscp cs3

class-map match-any Voice-Traffic
  match access-group 100
  match  dscp ef
  match  dscp af41
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
DHCP for a guest wireless network 1 42
networking details on centos 6.6 4 50
Viber-Only Restriction 6 23
access vs trunk with voice vlan 2 19
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now