08-07-2015 07:26 AM - edited 03-08-2019 01:16 AM
I have a visitor VLAN that needs to be bandwidth constrained when leaving the local LAN, but not bandwidth constrained when switching vlans on the local LAN.
MY topography is as follows:
10.x.0.0/16= (Local Lan) =====> 192.168.x.0/24 (Transport WAN) ==========> Internet
Catalyst 4503/7LE (local LAN) -------->ASA5512X --------------------------------------------->ISR-4321.
Packets that stay on the Local Lan, get switched at the Catalyst 4503 level.
Packets destined for the internet go from Left to right across the topology.
I just started reading the QOS document for the 4500 series*, and it states that QOS values are marked and then routing is applied. So, I am thinking this is not going to work.What other mechanisms exist that would help accomplish this?
Thanks for your comments and knowledge
Solved! Go to Solution.
08-08-2015 10:42 AM
I think you might be able to accomplish it with the following.
Define an extended ACL that would match the source destination to the destination you want to limit. Then define a route map, and match it to that ACL, then set a QoS group for the matches. Then set a class-map matching the same QoS group and a policy map to that group that limits bandwidth. Finally apply the route map and service policy to the interfaces that you want the limitations on:
ip access-list extended LIMIT
10 permit ip any 192.168.1.1 0.0.0.0
route-map LIMIT
match ip address LIMIT
set ip qos-group 1
class-map match-all LIMIT
match qos-group 1
policy-map LIMIT
class LIMIT
bandwidth percent 10
int s0/0
ip policy route-map LIMIT
service-policy {output | input} LIMIT
08-08-2015 10:42 AM
I think you might be able to accomplish it with the following.
Define an extended ACL that would match the source destination to the destination you want to limit. Then define a route map, and match it to that ACL, then set a QoS group for the matches. Then set a class-map matching the same QoS group and a policy map to that group that limits bandwidth. Finally apply the route map and service policy to the interfaces that you want the limitations on:
ip access-list extended LIMIT
10 permit ip any 192.168.1.1 0.0.0.0
route-map LIMIT
match ip address LIMIT
set ip qos-group 1
class-map match-all LIMIT
match qos-group 1
policy-map LIMIT
class LIMIT
bandwidth percent 10
int s0/0
ip policy route-map LIMIT
service-policy {output | input} LIMIT
08-11-2015 02:50 PM
Zach,
Thanks for your reply, I followed the instructions and researched some of the commands, and wrote them into the Router closest to the PE. I am still working on configuration , since I can't ping through the router, but I wanted to give you the credit for answering the original question.
08-13-2015 12:35 PM
This discussion has been reposted from Additional Communities to the LAN, Switching and Routing community.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide