Solved

how to set port rate limits on switch

Posted on 2014-10-12
6
113 Views
Last Modified: 2016-11-23
I have a Dell 6224 switch that I want the copper ports to only allow 5,6,10,15 megs per second throughput on them.  I don't want to setup the ports to negotiate at 10 full, or 100 half.  Is there a way to do this?  Thanks!
0
Comment
Question by:johnpatbullock
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
6 Comments
 
LVL 62

Expert Comment

by:gheist
ID: 40377523
1st is best done with pppoe
2nd is not possible with dell switch. at least it has auto - MDIX
0
 
LVL 39

Expert Comment

by:Aaron Tomosky
ID: 40377758
Their bandwidth management is called "traffic shaping". Here is a nice writeup for both the gui as well as cli
http://sipi.usc.edu/manuals/dell/6024/ug_html/configuh.htm
0
 
LVL 62

Expert Comment

by:gheist
ID: 40377985
In provider which sells customers 5,6,10,15Mbps packages you use PPPoE with traffic shaping far behind the scenes.
0
Simple, centralized multimedia control

Watch and learn to see how ATEN provided an easy and effective way for three jointly-owned pubs to control the 60 televisions located across their three venues utilizing the ATEN Control System, Modular Matrix Switch and HDBaseT extenders.

 

Accepted Solution

by:
johnpatbullock earned 0 total points
ID: 40463403
traffic-shape and creating a policy was the resolution for this
0
 

Author Closing Comment

by:johnpatbullock
ID: 40471400
no solutions were made other than a managed switch
0
 
LVL 39

Expert Comment

by:Aaron Tomosky
ID: 40471648
Really? My comment looks like I specifically suggested traffic shaping and gave you an article to reference.
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question