Where I work we have a 1G link connecting our test lab to the rest of the network. We have a traffic generator in the lab and sometimes engineers generate traffic to an IP destination which isn't in the lab routing table and by using the default route out it causes the 1G link to become completely flooded. So far to continue allowing connectivity to devices when this happens we've put a qos policy to match any management traffic and give it priority on the link which works fine. We've tried policing everything but the management traffic but when the flooding happens it still drops genuine test traffic using that link anyway so it's not really any use. I'm looking for a more efficient solution to this issue and I was wondering if it would be possible to shape or police per individual source IP address/flow of traffic? Any help or working solutions would be greatly appreciated.
Thanks for the response. Unfortunately this only helps when trying to limit a specific IP address or a known range. What I'd like to do here is limit all flows of traffic from any source IP address.