You need to understand that this is NOT under your control but under ISP control how much traffic is sent to you on portchannel2. You try to avoid to hit the max speed by shaping on downstream links to C7600 using nested policy isp that is a shaper at 940 Mbps that invokes a child policy that is a CBWFQ but these are other links.

Traffic shaping is a form of rate limiting and is used for managing traffic on a network so that the output fits a desired traffic profile. Traffic shaping is utilized to enhance network performance, though some see it as a method used by ISP to reduce loads on their networks. The purpose of this example is to demonstrate how port shaping enables you to shape the traffic passing through an interface to a rate that is less than the line rate for that interface. When you configure port shaping on an interface, you are essentially specifying a value that indicates the maximum amount of traffic that can pass through the Mar 13, 2011 · Traffic shaping box should be simple. I think it's better if you first make a FreeBSD router to do all the routing and nat with as many LAN cards you want. Then set up a FreeBSD or OpenBSD bridge between your clients and router to do all the traffic shaping using PF. Regards usman Glasnost attempted to detect whether your Internet service provider (ISP) was performing application-specific traffic shaping. Glasnost allowed a user to test whether an ISP was throttling or blocking email, HTTP, SSH, Flash Video, and P2P applications such as BitTorrent.

The battle between p2p users and ISPs is an endless game of cat and mouse. When ISPs began throttling BitTorrent traffic to crack down on "bandwidth hogs," the users began using encryption-enabled

May 07, 2008 Getting Around Bell Canada's Traffic Shaping - Changing When users first got around the traffic shaping by Canadian Cable company Rogers using encryption, the ISP just throttled all encrypted traffic. When user started using VPNs to get around the

Traffic shaping is a powerful and flexible way to ensure quality of service and defend against bandwidth-abusing distributed denial-of- service (DDoS) attacks. It protects networks and applications from traffic spikes, regulates abusive users, and prevents network attacks from overwhelming network resources.

Apr 13, 2018 · BitTorrent Traffic Shaping. Let’s start with one of the more common scenarios: is your ISP slowing down your BitTorrent traffic? Or are your torrents just slow? Neubot is a useful tool for testing BitTorrent traffic shaping and monitoring it over time. This tool is a bit complicated to use, but is rather powerful. Traffic shaping is sometimes applied by traffic sources to ensure the traffic they send complies with a contract which may be enforced in the network by a policer. Shaping is widely used for teletraffic engineering , and appears in domestic ISPs' networks as one of several Internet Traffic Management Practices (ITMPs). [7] Traffic shaping is an integral component of the proposed two-tiered internet, in which certain customers or services receive traffic priority for a premium charge. Importance of traffic shaping. Traffic shaping is important when network uplinks become overwhelmed with data being sent out of an interface. Without traffic shaping, any excess Test if your ISP is shaping your traffic An ISP should treat your traffic transparently and not care about its contents. There are ISPs out there however that will rate-limit ( shape ) certain traffic like NNTP (usenet) or P2P (torrents). Shaping is a QoS (Quality of Service) technique that we can use to enforce lower bitrates than what the physical interface is capable of. Most ISPs will use shaping or policing to enforce "traffic contracts" with their customers. When we use shaping we will buffer the traffic to a certain bitrate,