Just to update this thread, I figured out where I was going wrong!
As mentioned by Mikael, the ACL only shows traffic one way, hence why it was not applying the service policy to the download.
I have three subnets I want to Police both outbound and inbound so I started with Three ACLs:
access-list 197 permit ip 172.16.97.0 0.0.0.255 any access-list 197 permit ip any 172.16.97.0 0.0.0.255 access-list 198 permit ip 172.16.98.0 0.0.0.255 any access-list 198 permit ip any 172.16.98.0 0.0.0.255 access-list 199 permit ip 172.16.99.0 0.0.0.255 any access-list 199 permit ip any 172.16.99.0 0.0.0.255
I then created the relevant class maps:
class-map match-all vlan998-download match access-group 198 class-map match-all vlan999-download match access-group 199 class-map match-all vlan997-download match access-group 197
class-map match-all vlan998-upload match access-group 198 class-map match-all vlan999-upload match access-group 199 class-map match-all vlan997-upload match access-group 197
Then the service policies:
policy-map download-limit class vlan997-download police 2000000 class vlan998-download police 3000000 class vlan999-download police 4000000
policy-map upload-limit class vlan997-upload police 200000 class vlan998-upload police 300000 class vlan999-upload police 400000
Then finally applied those to the relevant SVI:
interface Vlan102 ip vrf forwarding WAN2 ip address 10.20.2.2 255.255.255.0 ip nat inside ip virtual-reassembly in service-policy output download-limit service-policy input upload-limit
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...