?
Solved

how to set port rate limits on switch

Posted on 2014-10-12
6
Medium Priority
?
115 Views
Last Modified: 2016-11-23
I have a Dell 6224 switch that I want the copper ports to only allow 5,6,10,15 megs per second throughput on them.  I don't want to setup the ports to negotiate at 10 full, or 100 half.  Is there a way to do this?  Thanks!
0
Comment
Question by:johnpatbullock
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
6 Comments
 
LVL 62

Expert Comment

by:gheist
ID: 40377523
1st is best done with pppoe
2nd is not possible with dell switch. at least it has auto - MDIX
0
 
LVL 39

Expert Comment

by:Aaron Tomosky
ID: 40377758
Their bandwidth management is called "traffic shaping". Here is a nice writeup for both the gui as well as cli
http://sipi.usc.edu/manuals/dell/6024/ug_html/configuh.htm
0
 
LVL 62

Expert Comment

by:gheist
ID: 40377985
In provider which sells customers 5,6,10,15Mbps packages you use PPPoE with traffic shaping far behind the scenes.
0
The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

 

Accepted Solution

by:
johnpatbullock earned 0 total points
ID: 40463403
traffic-shape and creating a policy was the resolution for this
0
 

Author Closing Comment

by:johnpatbullock
ID: 40471400
no solutions were made other than a managed switch
0
 
LVL 39

Expert Comment

by:Aaron Tomosky
ID: 40471648
Really? My comment looks like I specifically suggested traffic shaping and gave you an article to reference.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question