When you have a major interface at a host and it is a full T-1 you use the bandwidth statement 1544. What about the subinterfaces. Do you use 1544 or the actually bandwith provisioned at the remote. I see people using 1544 on the major interface and all the subinterfaces. what is correct? Thanks
I do not believe that there is any one answer that is right for every situation. In some respects the appropriate bandwidth to use may depend on the provisioning of the Frame Relay circuit - what is the bursting capability of the line. If it is possible to burst up to full line rate then perhaps 1544 is appropriate.
Also recognize that while the configured bandwidth may influence the calculation of metrics for some routing protocols, it does not operationally affect the interface or subinterface.
As Rick said, that answer depends on your circumstances. While the bandwidth parameter does not impact the rate at which traffic is actually sent out the interface, it does impact a lot of other things:
- QoS policies applied to the sub-interface
- OSPF cost
- EIGRP packet pacing
Therefore, if you are using any of the above, it is advisable to tune the bandwidth to at least match the CIR of that particular PVC. When using EIGRP, you have to make sure that the sum of the bandwidths for each interface does not exceed the physical bandwidth of the link.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...