For my policers I use family ANY. I don't have experience with doing so on the 
SRX340 but he's is what my standard deployment looks like, see my notes:

set firewall policer 20M apply-flags omit
set firewall policer 20M if-exceeding bandwidth-limit 21250000
set firewall policer 20M if-exceeding burst-size-limit 6250000
set firewall policer 20M then discard

set firewall family any filter police-20M apply-flags omit
set firewall family any filter police-20M interface-specific                    
          <<<<<<<<<<<<<<<<<<<<<<<<< This may be your issue.
set firewall family any filter police-20M term 1 then policer 20M
set firewall family any filter police-20M term 1 then count policer

set interfaces ge-0/0/42 flexible-vlan-tagging
set interfaces ge-0/0/42 encapsulation flexible-ethernet-services
set interfaces ge-0/0/42 unit 500 vlan-id 500
set interfaces ge-0/0/42 unit 500 filter input police-20M
set interfaces ge-0/0/42 unit 500 filter output police-20M
set interfaces ge-0/0/42 unit 500 family inet filter input BCP38_REDACTED
set interfaces ge-0/0/42 unit 500 family inet address REDACTED






Kody Vicknair | Network Engineer III
985.536.1214 | [email protected]


-----Original Message-----
From: juniper-nsp <[email protected]> On Behalf Of Emille 
Blanc
Sent: Thursday, October 15, 2020 11:16 AM
To: Chris Lee <[email protected]>; [email protected]
Subject: Re: [j-nsp] Traffic shaping on SRX340

*External Email: Use Caution*

Nothing looks out of sorts.
For the sake of testing, if you give the input direction a different policer, 
does it show any hits on 'show policer' output?

Eg;
set firewall family inet filter customer-ZZZ-out term default then policer 
policer-20m-TEST

set firewall policer policer-20m-TEST if-exceeding bandwidth-limit 22m ...


-----Original Message-----
From: Chris Lee [mailto:[email protected]]
Sent: Wednesday, October 14, 2020 7:05 PM
To: [email protected]
Subject: Traffic shaping on SRX340

Hi,

We're running an SRX340 in packet mode as a router for customer internet access 
on campus, generally providing smaller speed links around 5/10/20/50Mbps 
symmetric.

We apply a filter to the customers interface on the input and output, with a 
policer policy to discard traffic when exceeding the defined bandwidth limit.

So in the example configuration below, I find that when running a speed test on 
the customers IP that the download traffic to them is shaped nicely, spot on 
22Mbps as in the example below, however on the upload test it's as if the 
filter as no impact whatsoever and they get 60-70Mbps.

Anyone have any ideas on what I might be doing wrong? JunOS is 18.2R3-S3 in 
this case, however this router was previously running a 15 release and we had 
the same issue with the filters only seeming to work on the download and not 
the upload traffic.

set interfaces ge-0/0/4 unit 3623 description "CUST-INTERNET-ZZZ Internet"
set interfaces ge-0/0/4 unit 3623 vlan-id 3623 set interfaces ge-0/0/4 unit 
3623 family inet filter input customer-ZZZ-in set interfaces ge-0/0/4 unit 3623 
family inet filter output customer-ZZZ-out set interfaces ge-0/0/4 unit 3623 
family inet address 192.0.2.133/30

set firewall family inet filter customer-ZZZ-in term allow-icmp from protocol 
icmp set firewall family inet filter customer-ZZZ-in term allow-icmp then 
accept set firewall family inet filter customer-ZZZ-in term default then 
policer policer-20m set firewall family inet filter customer-ZZZ-in term 
default then accept

set firewall family inet filter customer-ZZZ-out term allow-icmp from protocol 
icmp set firewall family inet filter customer-ZZZ-out term allow-icmp then 
accept set firewall family inet filter customer-ZZZ-out term default then 
policer policer-20m set firewall family inet filter customer-ZZZ-out term 
default then accept

set firewall policer policer-20m if-exceeding bandwidth-limit 22m set firewall 
policer policer-20m if-exceeding burst-size-limit 625k set firewall policer 
policer-20m then discard

Thanks,
Chris
_______________________________________________
juniper-nsp mailing list [email protected] 
https://link.edgepilot.com/s/0cc801b1/CjcPXRlBiUy8KtRUdVP4AA?u=https://puck.nether.net/mailman/listinfo/juniper-nsp


Links contained in this email have been replaced. If you click on a link in the 
email above, the link will be analyzed for known threats. If a known threat is 
found, you will not be able to proceed to the destination. If suspicious 
content is detected, you will see a warning.
_______________________________________________
juniper-nsp mailing list [email protected]
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to