Solved

how to set port rate limits on switch

Posted on 2014-10-12
6
108 Views
Last Modified: 2016-11-23
I have a Dell 6224 switch that I want the copper ports to only allow 5,6,10,15 megs per second throughput on them.  I don't want to setup the ports to negotiate at 10 full, or 100 half.  Is there a way to do this?  Thanks!
0
Comment
Question by:johnpatbullock
  • 2
  • 2
  • 2
6 Comments
 
LVL 61

Expert Comment

by:gheist
ID: 40377523
1st is best done with pppoe
2nd is not possible with dell switch. at least it has auto - MDIX
0
 
LVL 38

Expert Comment

by:Aaron Tomosky
ID: 40377758
Their bandwidth management is called "traffic shaping". Here is a nice writeup for both the gui as well as cli
http://sipi.usc.edu/manuals/dell/6024/ug_html/configuh.htm
0
 
LVL 61

Expert Comment

by:gheist
ID: 40377985
In provider which sells customers 5,6,10,15Mbps packages you use PPPoE with traffic shaping far behind the scenes.
0
What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

 

Accepted Solution

by:
johnpatbullock earned 0 total points
ID: 40463403
traffic-shape and creating a policy was the resolution for this
0
 

Author Closing Comment

by:johnpatbullock
ID: 40471400
no solutions were made other than a managed switch
0
 
LVL 38

Expert Comment

by:Aaron Tomosky
ID: 40471648
Really? My comment looks like I specifically suggested traffic shaping and gave you an article to reference.
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now