Cisco路由交换怎么做限速和arp绑定??急求!
发布网友
发布时间:2022-04-23 06:05
我来回答
共2个回答
热心网友
时间:2023-10-18 05:31
cisco中低端交换机(如2960、3560)Qos限速在一个端口上只能做一个方向的应用:
Switch(config)#int f0/1
Switch(config-if)#ser
Switch(config-if)#service-policy input cc 清风不醉原创
Switch(config-if)#service-policy output cc
Warning: Assigning a policy map to the output side of an interface not supported
Service Policy attachment failed
Warning: Assigning a policy map to the output side of an interface not supported
无法对一个端口既做上行又做下行流量*,只能*用户上传的流量不能*下载,没有实际意义了;华为
的接入层交换机都可以做端口上下行限速,cisco的应用也可以。网上查了查资料.cisco3560可以用QOS限速到每一个VLAN,但只能配置64个策略,也就是只能*64个VLAN的速度,一般酒店VLAN的数目会大于64个,所以我想办法在接入层2960试试。配置如下:
1.*各VLAN上行带宽为1M
class-map match-all up
match access-group 1
policy-map up
class up
police 1000000 125000 exceed-action drop
trust dscp
int f0/x (在想要限速的端口内配置)
service-policy input up
access-list 1 permit any (建立ACL允许所有)
2.*各VLAN下行速度为1M(因一个接入交换机最多接入25个左右的网段,所以建立25个VLAN作为模版)
class-map match-all down-1
match access-group 2001
class-map match-all down-2
match access-group 2002
class-map match-all down-3
match access-group 2003
class-map match-all down-4
match access-group 2004
class-map match-all down-5
match access-group 2005
class-map match-all down-6
match access-group 2006
class-map match-all down-7
match access-group 2007
class-map match-all down-8
match access-group 2008
class-map match-all down-9
match access-group 2009
class-map match-all down-10
match access-group 2010
class-map match-all down-11
match access-group 2011
class-map match-all down-12
match access-group 2012
class-map match-all down-13
match access-group 2013
class-map match-all down-14
match access-group 2014
class-map match-all down-15
match access-group 2015
class-map match-all down-16
match access-group 2016
class-map match-all down-17
match access-group 2017
class-map match-all down-18
match access-group 2018
class-map match-all down-19
match access-group 2019
class-map match-all down-20
match access-group 2020
class-map match-all down-21
match access-group 2021
class-map match-all down-22
match access-group 2022
class-map match-all down-23
match access-group 2023
class-map match-all down-24
match access-group 2024
class-map match-all down-25
match access-group 2025
policy-map up
class up
police 1000000 125000 exceed-action drop
trust dscp
policy-map down
class down-1
police 1000000 125000 exceed-action drop
trust dscp
class down-2
police 1000000 125000 exceed-action drop
trust dscp
class down-3
police 1000000 125000 exceed-action drop
trust dscp
class down-4
police 1000000 125000 exceed-action drop
trust dscp
class down-5
police 1000000 125000 exceed-action drop
trust dscp
class down-6
police 1000000 125000 exceed-action drop
trust dscp
class down-7
police 1000000 125000 exceed-action drop
trust dscp
class down-8
police 1000000 125000 exceed-action drop
trust dscp
class down-9
police 1000000 125000 exceed-action drop
trust dscp
class down-10
police 1000000 125000 exceed-action drop
trust dscp
class down-11
police 1000000 125000 exceed-action drop
trust dscp
class down-12
police 1000000 125000 exceed-action drop
trust dscp
class down-13
police 1000000 125000 exceed-action drop
trust dscp
class down-14
police 1000000 125000 exceed-action drop
trust dscp
class down-15
police 1000000 125000 exceed-action drop
trust dscp
class down-16
police 1000000 125000 exceed-action drop
trust dscp
class down-17
police 1000000 125000 exceed-action drop
trust dscp
class down-18
police 1000000 125000 exceed-action drop
trust dscp
class down-19
police 1000000 125000 exceed-action drop
trust dscp
class down-20
police 1000000 125000 exceed-action drop
trust dscp
class down-21
police 1000000 125000 exceed-action drop
trust dscp
class down-22
police 1000000 125000 exceed-action drop
trust dscp
class down-23
police 1000000 125000 exceed-action drop
trust dscp
class down-24
police 1000000 125000 exceed-action drop
trust dscp
class down-25
police 1000000 125000 exceed-action drop
trust dscp
!
int f0/x (在本交换机上联的端口应用)service-policy input down
access-list 2001 permit ip any 网段1 0.0.0.255 (建立ACL对应各VLAN的地址段)
access-list 2002 permit ip any 网段2 0.0.0.255
access-list 2003 permit ip any 网段3 0.0.0.255
access-list 2004 permit ip any 网段4 0.0.0.255
access-list 2005 permit ip any 网段5 0.0.0.255
access-list 2006 permit ip any 网段6 0.0.0.255
access-list 2007 permit ip any 网段7 0.0.0.255
access-list 2008 permit ip any 网段8 0.0.0.255
access-list 2009 permit ip any 网段9 0.0.0.255
access-list 2010 permit ip any 网段10 0.0.0.255
access-list 2011 permit ip any 网段11 0.0.0.255
access-list 2012 permit ip any 网段12 0.0.0.255
access-list 2013 permit ip any 网段13 0.0.0.255
access-list 2014 permit ip any 网段14 0.0.0.255
access-list 2015 permit ip any 网段15 0.0.0.255
access-list 2016 permit ip any 网段16 0.0.0.255
access-list 2017 permit ip any 网段17 0.0.0.255
access-list 2018 permit ip any 网段18 0.0.0.255
access-list 2019 permit ip any 网段19 0.0.0.255
access-list 2020 permit ip any 网段20 0.0.0.255
access-list 2021 permit ip any 网段21 0.0.0.255
access-list 2022 permit ip any 网段22 0.0.0.255
access-list 2023 permit ip any 网段23 0.0.0.255
access-list 2024 permit ip any 网段24 0.0.0.255
access-list 2025 permit ip any 网段25 0.0.0.255
对于这个模版,不同的交换机,如果有不同的VLAN,只需在ACL里修改即可。如果要更改限的速度,则需要在policy-map
里修改了.
热心网友
时间:2023-10-18 05:32
你打算给什么做什么样的限速,Cisco的这个东西很多,具体看你需求。arp绑定你只需要手动把IP地址和MAC地址绑定在一起就好了。