Solved

how to set port rate limits on switch

Posted on 2014-10-12
6
114 Views
Last Modified: 2016-11-23
I have a Dell 6224 switch that I want the copper ports to only allow 5,6,10,15 megs per second throughput on them.  I don't want to setup the ports to negotiate at 10 full, or 100 half.  Is there a way to do this?  Thanks!
0
Comment
Question by:johnpatbullock
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
6 Comments
 
LVL 62

Expert Comment

by:gheist
ID: 40377523
1st is best done with pppoe
2nd is not possible with dell switch. at least it has auto - MDIX
0
 
LVL 39

Expert Comment

by:Aaron Tomosky
ID: 40377758
Their bandwidth management is called "traffic shaping". Here is a nice writeup for both the gui as well as cli
http://sipi.usc.edu/manuals/dell/6024/ug_html/configuh.htm
0
 
LVL 62

Expert Comment

by:gheist
ID: 40377985
In provider which sells customers 5,6,10,15Mbps packages you use PPPoE with traffic shaping far behind the scenes.
0
NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

 

Accepted Solution

by:
johnpatbullock earned 0 total points
ID: 40463403
traffic-shape and creating a policy was the resolution for this
0
 

Author Closing Comment

by:johnpatbullock
ID: 40471400
no solutions were made other than a managed switch
0
 
LVL 39

Expert Comment

by:Aaron Tomosky
ID: 40471648
Really? My comment looks like I specifically suggested traffic shaping and gave you an article to reference.
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question