02-17-2017 04:24 PM - edited 03-08-2019 09:23 AM
Hello,
Where I work we have a 1G link connecting our test lab to the rest of the network. We have a traffic generator in the lab and sometimes engineers generate traffic to an IP destination which isn't in the lab routing table and by using the default route out it causes the 1G link to become completely flooded. So far to continue allowing connectivity to devices when this happens we've put a qos policy to match any management traffic and give it priority on the link which works fine. We've tried policing everything but the management traffic but when the flooding happens it still drops genuine test traffic using that link anyway so it's not really any use. I'm looking for a more efficient solution to this issue and I was wondering if it would be possible to shape or police per individual source IP address/flow of traffic? Any help or working solutions would be greatly appreciated.
Thanks.
02-19-2017 04:06 AM
Anyone have any ideas for this?
02-19-2017 07:12 AM
Hi Matthew,
Have a look on below link for your reference
Hope it Helps..
-GI
02-19-2017 07:26 AM
Hi Ganesh,
Thanks for the response. Unfortunately this only helps when trying to limit a specific IP address or a known range. What I'd like to do here is limit all flows of traffic from any source IP address.
Thanks.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide