Implementation of Time-based QOS/CAR, using "time-range" command
We would like to configure a Time-based QOS/CAR Policy to allow our ISP Customer to have more Burst BW during Weekends then weekdays. In our setup, we color all Burst traffic of all Customers with precedence 1 and then allocate some amount of BW to this shared Pool for precedence 1. So, using Cisco's Technology of "time-range", we have done following config to achieve the said objective. But we are not able to achieve the automatic activation of weekday CAR despite the fact that weekend acces-list/Car gets automatically get deactivated when week-end is over and weekday access-group i.e. 197 gets activated (gets activated but no match in access-group & CAR, can see using show access-list & sh interface rate-limit | include access-group 199 command)
Would appreciate yr valuable input to achieve the desired task.
Re: Implementation of Time-based QOS/CAR, using "time-range" com
Since there has been no response to your post, it appears to be either too complex or too rare an issue for other forum members to assist you. If you don't get a suitable response to your post, you may wish to review our resources at the online Technical Assistance Center (http://www.cisco.com/tac) or speak with a TAC engineer. You can open a TAC case online at http://www.cisco.com/tac/caseopen
If anyone else in the forum has some advice, please reply to this thread.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...