[j-nsp] Traffic shaping on SRX340
Kody Vicknair
kvicknair at reservetele.com
Thu Oct 15 17:22:12 EDT 2020
For my policers I use family ANY. I don't have experience with doing so on the SRX340 but he's is what my standard deployment looks like, see my notes:
set firewall policer 20M apply-flags omit
set firewall policer 20M if-exceeding bandwidth-limit 21250000
set firewall policer 20M if-exceeding burst-size-limit 6250000
set firewall policer 20M then discard
set firewall family any filter police-20M apply-flags omit
set firewall family any filter police-20M interface-specific <<<<<<<<<<<<<<<<<<<<<<<<< This may be your issue.
set firewall family any filter police-20M term 1 then policer 20M
set firewall family any filter police-20M term 1 then count policer
set interfaces ge-0/0/42 flexible-vlan-tagging
set interfaces ge-0/0/42 encapsulation flexible-ethernet-services
set interfaces ge-0/0/42 unit 500 vlan-id 500
set interfaces ge-0/0/42 unit 500 filter input police-20M
set interfaces ge-0/0/42 unit 500 filter output police-20M
set interfaces ge-0/0/42 unit 500 family inet filter input BCP38_REDACTED
set interfaces ge-0/0/42 unit 500 family inet address REDACTED
Kody Vicknair | Network Engineer III
985.536.1214 | kvicknair at reservetele.com
-----Original Message-----
From: juniper-nsp <juniper-nsp-bounces at puck.nether.net> On Behalf Of Emille Blanc
Sent: Thursday, October 15, 2020 11:16 AM
To: Chris Lee <chris at datachaos.com.au>; juniper-nsp at puck.nether.net
Subject: Re: [j-nsp] Traffic shaping on SRX340
*External Email: Use Caution*
Nothing looks out of sorts.
For the sake of testing, if you give the input direction a different policer, does it show any hits on 'show policer' output?
Eg;
set firewall family inet filter customer-ZZZ-out term default then policer policer-20m-TEST
set firewall policer policer-20m-TEST if-exceeding bandwidth-limit 22m ...
-----Original Message-----
From: Chris Lee [mailto:chris at datachaos.com.au]
Sent: Wednesday, October 14, 2020 7:05 PM
To: juniper-nsp at puck.nether.net
Subject: Traffic shaping on SRX340
Hi,
We're running an SRX340 in packet mode as a router for customer internet access on campus, generally providing smaller speed links around 5/10/20/50Mbps symmetric.
We apply a filter to the customers interface on the input and output, with a policer policy to discard traffic when exceeding the defined bandwidth limit.
So in the example configuration below, I find that when running a speed test on the customers IP that the download traffic to them is shaped nicely, spot on 22Mbps as in the example below, however on the upload test it's as if the filter as no impact whatsoever and they get 60-70Mbps.
Anyone have any ideas on what I might be doing wrong? JunOS is 18.2R3-S3 in this case, however this router was previously running a 15 release and we had the same issue with the filters only seeming to work on the download and not the upload traffic.
set interfaces ge-0/0/4 unit 3623 description "CUST-INTERNET-ZZZ Internet"
set interfaces ge-0/0/4 unit 3623 vlan-id 3623 set interfaces ge-0/0/4 unit 3623 family inet filter input customer-ZZZ-in set interfaces ge-0/0/4 unit 3623 family inet filter output customer-ZZZ-out set interfaces ge-0/0/4 unit 3623 family inet address 192.0.2.133/30
set firewall family inet filter customer-ZZZ-in term allow-icmp from protocol icmp set firewall family inet filter customer-ZZZ-in term allow-icmp then accept set firewall family inet filter customer-ZZZ-in term default then policer policer-20m set firewall family inet filter customer-ZZZ-in term default then accept
set firewall family inet filter customer-ZZZ-out term allow-icmp from protocol icmp set firewall family inet filter customer-ZZZ-out term allow-icmp then accept set firewall family inet filter customer-ZZZ-out term default then policer policer-20m set firewall family inet filter customer-ZZZ-out term default then accept
set firewall policer policer-20m if-exceeding bandwidth-limit 22m set firewall policer policer-20m if-exceeding burst-size-limit 625k set firewall policer policer-20m then discard
Thanks,
Chris
_______________________________________________
juniper-nsp mailing list juniper-nsp at puck.nether.net https://link.edgepilot.com/s/0cc801b1/CjcPXRlBiUy8KtRUdVP4AA?u=https://puck.nether.net/mailman/listinfo/juniper-nsp
Links contained in this email have been replaced. If you click on a link in the email above, the link will be analyzed for known threats. If a known threat is found, you will not be able to proceed to the destination. If suspicious content is detected, you will see a warning.
More information about the juniper-nsp
mailing list