Re: MPLS CoS Question - Default traffic keep on overload
Queueing is a functionality local to where the bottleneck resides. So the best solution would be that the service provider implements an outbound QoS policy. I would ask the provider, which options exist, as MPLS providers usually also offer QoS at least on the link to the customer.
If the provider does not offer assistance, you can create a hierarchical input policy. You can shape the received traffic to somewhat less than your interface speed and use a child service policy to do the queueing.
Note: this might or might not work depending on your traffic. If you mainly use TCP the flow controls should give you decent results. If you are under a DoS attack, it will not help you.
An example config:
priority percent 50
bandwidth percent 30
shape average 1900000
service-policy output CBWFQ
description MPLS connection
service-policy input ShapeIn
The shaper in policy-map ShapeIn acts like a logical interface hardware Q and the idea is to control the throughput to your MPLS connection locally. With TCP this should give you quite decent results, if the shaper is less than the MPLS connection speed (I assumed 2M here). You need to configure less, because of Layer 2 overhead on the wire, which is not seen on input.
1) Best: provider implements QoS according to your requirements
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...