Is there a way to have a different config applied to a router based on time. I have a VOIP implementation that works great during the day, but at night, when nobody is at their phones, I would like to turn off my traffic shaping and QOS so that I can do backups across the WAN. Before the traffic shaping, I could do backups across the wAN in about 3.5 hours. Now that I have traffic shaped to the CIR, it takes more than 8 hours. I would be pleased to buy 3rd party software if necessary. Thank you for your thoughts.
You could try to use access-lists with time-ranges, but you may also need to change the method of QoS depending what you're currently using to get most ideal results. Which method are you using and whats your WAN layout?
If your WAN is Frame relay and you're doing FRTS then I don't think there is a way to remove the FRTS values (bc, be, cir, mincir) without having a script running on a external machine that automatically telnets in, makes changes, etc. Same goes for most other values.
Yes it is Frame-Relay and I am trying to remove FRTS based on time of day. I know about using the time-range ACLs and I cant apply a time-range to where it would need to go. I am using LLQ on these routers, so I would need to apply the time-range on the map-class, but IOS does not allow that. Any other thoughts, or do you know of a 3rd party system that can automatically telnet and upload configs based on time of day?
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...