there are 3 different companies share one 2811 router and there is 5.0 Mbps in WAN connection. We'd like to provision bandwidth between these three companies. I know with the QoS, we can define bandwith based on ACL. is there any document that describe this solution?
Athough Arvind's second post shows what you can do inbound, the results will not be the same as outbound. The first major difference is, outbound you have different class queues which should obtain a minimum amount of specified bandwidth when there's congestion. Inbound, the classes will cap the amount of bandwidth used. The biggest different between these two approaches is an outbound class, unless also shaped or policed, can use additional excess available bandwidth; inbound the class will never be allowed to use more than its policed cap even if the bandwidth is available.
The second major difference, for inbound, although your policiers will restrict the amount of bandwidth forwarded by your router, they may not have any effect upon inbound traffic utilization (e.g. most non-TCP traffic) or if they do (e.g. TCP traffic), the traffic might burst on the link before it gets to the policer.
The best method to regulate inbound is on the other side of the link's outbound. Next best, at least with TCP traffic, is regulation of the outbound ACKs and/or manipulation of receiver advertised receive window values. Neither of these methods, I believe, supported by Cisco devices.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...