cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1353
Views
0
Helpful
7
Replies

Restrict 512Kbps bandwidth to some workstations

hamidrezaaf
Level 1
Level 1

Hello,

we have 3 workstations which have static nats.

How can you restrice at most 512 kbps bandwidth to these workstations ?

Regards

Hamid

7 Replies 7

sean_evershed
Level 7
Level 7

Hi,

Do you manage the firewall? If so you could police bandwidth based on IP addresses. See below

https://supportforums.cisco.com/docs/DOC-1230

Don't forget to rate posts that are helpful.

>>

Do you manage the firewall? If so you could police bandwidth based on IP addresses. See below

https://supportforums.cisco.com/docs/DOC-1230

<<

sorry for my unattention

we want to config a router cisco 2851(c2800nm-adventerprisek9-mz.124-24.T6.bin ios).

You're probably going to have to shape outbound and police inbound to 512k to your natted addresses.

Let's say that you have addresses 192.168.1.50 - 52 and they map to 5.5.5.50 - 52, you could do something like this:

ip access-list ext Shape

permit ip host 5.5.5.50 any

permit ip host 5.5.5.51 any

permit ip host 5.5.5.52 any

ip access-list ext Police

permit ip any host 5.5.5.50

permit ip any host 5.5.5.51

permit ip any host 5.5.5.52

class-map match-any Shape

match access-group name Shape

class-map match-any Police

match access-group name Police

policy-map Police

class Police

police 512000

     exceed-action drop

policy-map Shape

class Shape

shape average 512000

int s0/0 (outside interface)

service-policy input Police

service-policy output Shape

HTH,

John

Please rate useful posts...

HTH, John *** Please rate all useful posts ***

Many thnaks for your comment

Does below configs convey us to our desired purpose ?

----------------------------------------------------

ip nat inside source static 192.168.10.50 X.X.X.10 extendable

ip nat inside source static 192.168.10.51 X.X.X.11 extendable

ip nat inside source static 192.168.10.52 X.X.X.12 extendable

interface GigabitEthernet0/0

description $ETH-LAN$

ip address 192.168.10.1 255.255.255.0

ip access-group 150 in

ip nat inside

ip virtual-reassembly

duplex auto

speed auto

!

interface GigabitEthernet0/1

description $ETH-WAN$

ip address X.X.X.226 255.255.255.224

ip access-group 150 in

ip nat outside

ip virtual-reassembly

duplex auto

speed auto

service-policy input Police

service-policy output Shape

ip access-list ext Shape

permit ip host X.X.X.50 any

permit ip host X.X.X.51 any

permit ip host X.X.X.52 any

ip access-list ext Police

permit ip any host X.X.X.50

permit ip any host X.X.X.51

permit ip any host X.X.X.51

class-map match-any Shape

match access-group name Shape

class-map match-any Police

match access-group name Police

policy-map Police

class Police

police 512000

exceed-action drop

policy-map Shape

class Shape

shape average 512000

access-list 150 deny   tcp any eq 1034 any log

access-list 150 deny   tcp any eq 1080 any log

access-list 150 deny   tcp any eq 1214 any log

access-list 150 deny   tcp any eq 2535 any log

access-list 150 deny   tcp any eq 1433 any log

access-list 150 deny   tcp any eq 3127 any log

access-list 150 deny   tcp any eq 2745 any log

access-list 150 deny   tcp any eq 4444 any log

access-list 150 deny   udp any eq 1434 any log

access-list 150 deny   udp any range 135 netbios-ss any

access-list 150 deny   tcp any range 1036 1037 any log

access-list 150 deny   tcp any any eq 81 log

access-list 150 deny   tcp any any eq 445 log

access-list 150 deny   tcp any any eq 1080 log

access-list 150 deny   tcp any any eq ident

access-list 150 deny   tcp any any eq 1214

access-list 150 deny   tcp any any eq 2745

access-list 150 deny   tcp any any eq 5101

access-list 150 deny   tcp any any eq 5554

access-list 150 deny   tcp any any eq 6129

access-list 150 deny   tcp any any eq 9996

access-list 150 deny   udp any any eq 1434

access-list 150 deny   tcp any any eq 11768

access-list 150 deny   tcp any any eq 15118

access-list 150 deny   tcp any any range 1022 1025

access-list 150 deny   tcp any any range 135 139

access-list 150 deny   udp any any range 135 netbios-ss

access-list 150 permit tcp any any eq 443

access-list 150 permit udp any any eq domain

access-list 150 permit tcp any any eq domain

access-list 150 permit tcp any any eq 8181

access-list 150 permit tcp any any eq 8080

access-list 150 permit tcp any any eq 1433

access-list 150 permit ip any any

--------------------------------------------------

Regards

Hamid

Hamid,

You police on the traffic before it's natted and shape after it's natted. So you're acl will reflect the public addresses.

John

HTH, John *** Please rate all useful posts ***

Dear j,blakley,

>>

You police on the traffic before it's natted and shape after it's natted. So you're acl will reflect the public addresses.

>>

do you have a better solution ?

Regards

Hamid

Hi Hanidrezaaf,

A different approach to your problem is to use GTS (generic traffic shaping)

The syntax of the command is the next

traffic-shape rate bit-rate burst-size excess-burst-size

The next config can be applied to  the ethernet (LAN) interface in order to limit all output to 512k

interface LAN-per user

 traffic-shape rate 512000

Then you can apply the next config to the WAN interface to limit the output to 512 for each of the 3 users


interface

traffic-shape group 101 512000

traffic-shape group 102 512000

traffic-shape group 103 512000

Where 101,102,103 are the Access lists that match the user traffic

Hope that helps,

Vasilis

Please rate the useful posts

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: