i have got a 1841 modular router.my requirement is that I am planning to implement 3 E1 Link. Is this series router is capable for the above said link.
Cisco 1841 is capable of taking 3 E1 but make sure that you are not overloading the box by using IPSEC/QOS and other features..
What kinda links you are gonna have in the box ?
Thanks first for the quick reply.The primary work with this Router is QOS. Bz I am planning to split the bandwidth for two seperate workouts.To be clear .. 2 mb leased link will be for Browsing area and other 4 mb leased link will be for upload and download as one my client has most of the works with FTP server hosted in US.
Here i have to split the bandwidth for two different work area..
i need you suggession..
Are you planning specific links for the mentioned purpose (like link 1 for browsing and link2,3 for upload/download) ?
If thats the case then you can make use of policy based routing in which you can match the packets destined to HTTP to flow through link 1 and the rest via the other 2 links.
Also are you taking these links from the same service provider ?
Yes i am getting link from same service provider.
if possible ..give me hint in configuring policy map
waiting for your reply
You need to create an access list permitting any any matching port http (80) traffic.
Do create a route map under which u bind this ACL using match command.
Once you are done with the same then set the next hop/gateway through which you want to forward your http traffic..
For all CLI info and assistance you can refer the below link.
I was assuming its connecting on 3 different interfaces.
If its getting teriminating on a single ethernet interface then you can even make use of CIR(rate-limit) in conjunction with ACL created to match http traffic..
CAR is discussed over here..
The config which you have posted doesnt have proper ACL configured.
The ACLs configured are 111 and 112 under the class maps but you are having 101 and 102.
I feel you better go ahead with rate-limit on your interface which could help in achieving the requirement.
Can you try checking with the below access-list...
access-list 111 permit tcp any any eq 80
access-list 112 deny tcp any any eq 80
access-list 112 permit ip any any