How can I slow down the traffic through a (2612) router interface?
We have a Cisco 2612 router that connects a test ethernet (via a hub) to our legacy 16Mbps token-ring backbone which has about 500 users & hosts. Users on the test LAN regularly bring the token-ring to halt by doing apparently straightforward file transfers. These appear to swamp the t/r with so much traffic that it causes other users' response times to go sky-high and their connections to hosts to time-out.
The 2612 has one 10Mbps ethernet interface and one 16Mpbs token-ring i/f.
Is it possible to slow down the throughput on one or the other of the interfaces so they only get (say) 10 percent of the token-ring bandwidth?
Re: How can I slow down the traffic through a (2612) router inte
Leo's post is a good one and worth looking into. In case you still want to try and limit traffic you can use either traffic policing (drops packets) or traffic shaping (queues packets). In your case since it is a test ethernet environment, I would simply use rate-limiting committed access rate (CAR). An example would be "rate-limit input 32000 640000 conform-action transmit exceed-action drop". CAR can be applied inbound or outbound on an interface. See link for more details: http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fswtch_r/xrfscmd4.htm#1065880
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...