But i have a suggestion on this.As u basically want to allocate each of ur isp a specific max-bandwidth they can pull, so it would be better if u use MQC with policing applied for better throughput and interface congestion control to avoid drops as with CAR rate limit , lot of drops do occur once the other end is trying to reach the threshold.
But neverthless u can go ahead with ur plan.
Hope this helps u .
Please do rate the post as it would help us to give valuable output useful to all.
yes the encapsulation has to be used on every subinterface u create for a particular isp(in ur case) , as u r using logically created interfaces for the traffic flow.This would mean the flow frm each isp wud be having a dotiq tag with it to differentiate it frm other isp flow.The tag wud identify flow and de-tag once it passes of thru the trunk to one of the other core devices..say for eg.backbone/gateway router interface.
AS for MQC ..
int gig 0/1
no ip address
speed , duplex settings..
int gig /1.101
ip address 192.168.65.1 255.255.255.252
service-policy input test1
service-policy input test2
define the policy maps.
match access-group 150
match access-group 151
police 2048000 128000 conform-action transmit
police 1024000 64000 conform-action transmit exceed-action drop
these are modular class maps attached to policy maps,which define the flow to be considered and then given to policy maps for action .
attaching this to the reqd interface would enforce these rulesets.
Hope this clears ur doubts and helps.
Do let me know if anything more on this is needed.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...