We have 50 Mbps for Internet access, and lately we have been experimenting congestion on the link, everyday from 10AM up to 12PM. We use cisco router 3825 for Internet access. After running NBAR we found a lot of peer-to-peer/file sharing applications over the link. We can´t just drop the peer-to-peer for the clients that share this link, but we want to limit it during day period. To just limit p2p is not a problem, but my question is how to make it automatically, i.e, to limit p2p during day and authomaticaly remove the rule during the night without the need of manual intervention or running a script on for example a Linux server to do it...
Is there any configuration example of how to do it only with/within the cisco router?
Thanks for the link. Unfortunately it helps only if I want to classify based on ACLs; I want to use NBAR and match traffic by protocol,instead of port numbers, i´m afraid of the dynamic port changes of peer-to-peer aplications. So my question is how to do it by matching with IP NBAR instead of time-based ACLs?
Until now I found 2 ways of doing it: automaticaly using an external server with a script that periodicaly logs into the routers and applies/remove the rule, or I do it manually, what is not scalable
I don´t have good experience with scripts, because some times there´s a problem with the server, or I don´t notice that it´s not longer working until someone complain and it´s late. I was looking for independent solution within the router...
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...