Switch port Speed Limit summary

Source: Internet
Author: User
Tags bind datetime lowercase snmp switches time interval port number cisco switch

Speed-limiting switches are typically on three or more switches, and the new switch model two-tier device since 2008 can achieve the QoS speed limit of 1Mbps, such as the Cisco 2960 series switches. After this, most of the domestic standard two-layer switches can be long speed limit, the accuracy of the basic can reach 1Mbps, such as  standard two layer, H3C standard two layer can do. Older Cisco standard two-layer switches such as 2950-class switching can also be speed-limiting, but with only 10Mbps accuracy. Switching between 2950G and 2950 for EI type does not have much speed limit differences, because the speed limit and iOS are related, the 2950 series of the Exchange iOS version is generally around 9.0, the latest 2960 series switch iOS version around 12.2, the higher version of iOS provides stronger system features.

The following is a summary of some of the speed limit methods:

The PC1 is connected to the Cisco3550 F0/1, and the rate is 1M;

The PC1 is connected to the Cisco3550 F0/2, and the rate is 2M;

CISCO3550 's G0/1 for export.

PC is directly connected to the three-layer switch port, meaning that the limit is three layer switch port uplink and downlink traffic control, similarly, if the three-layer switch port is not connected to the PC, but a two-layer switch, then the lower-level devices can be on the upper bound speed limit.

Note: Each interface supports only one policy per direction, and one policy can be used for multiple interfaces. Therefore, the download rate limit for all PCs should be defined. In the same strategy (in this case, Policy-map User-down), the difference between PC rates is defined in Class-map.

1. Start QoS on the switch

Switch (config) #mls QoS//Start QoS on the switch

2. Define PC1 (10.10.1.1) and PC2 (10.10.2.1) access control lists respectively

Switch (config) #access-list permit 10.10.1.0 0.0.0.255//control PC1 upstream traffic

Switch (config) #access-list permit any 10.10.1.0 0.0.0.255//control PC1 downstream traffic

Switch (config) #access-list permit 10.10.2.0 0.0.0.255//control PC2 upstream traffic

Switch (config) #access-list 111 permit any 10.10.2.0 0.0.0.255/control PC2 downstream traffic

3. Define the class and bind to the Access control list defined above

Switch (config) # Class-map user1-up//define PC1 upstream class and bind access list 10

Switch (config-cmap) # match Access-group 10

Switch (Config-cmap) # exit

Switch (config) # Class-map user2-up

Switch (config-cmap) # match Access-group 11//define PC2 upstream class and bind access list 10

Switch (Config-cmap) # exit

Switch (config) # Class-map User1-down

Switch (config-cmap) # match Access-group 100//define PC1 downstream class and bind access list 100

Switch (Config-cmap) # exit

Switch (config) # Class-map User2-down

Switch (config-cmap) # match Access-group 111//define PC2 downstream class and bind access list 111

Switch (Config-cmap) # exit

4, define the policy, bind the class defined above to the policy

Switch (config) # Policy-map user1-up//define PC1 upstream at a rate of 1M

Switch (CONFIG-PMAP) # class user1-up

Switch (config-pmap-c) # Trust DSCP

Switch (config-pmap-c) # police 1024000 1024000 exceed-action drop

Switch (config) # Policy-map user2-up//define PC2 upstream at a rate of 2M

Switch (CONFIG-PMAP) # class user2-up

Switch (config-pmap-c) # Trust DSCP

Switch (config-pmap-c) # police 2048000 1024000 exceed-action drop

Switch (config) # Policy-map User-down//define PC1 downlink at a rate of 1M

Switch (CONFIG-PMAP) # class User1-down

Switch (config-pmap-c) # Trust DSCP

Switch (config-pmap-c) # police 1024000 1024000 exceed-action drop

Switch (config-pmap-c) # exit

Switch (CONFIG-PMAP) # class User2-down//define PC2 downlink at a rate of 2M

Switch (config-pmap-c) # Trust DSCP

Switch (config-pmap-c) # police 2048000 1024000 exceed-action drop

Switch (config-pmap-c) # exit

5. Apply the strategy on the interface

Switch (config) # interface F0/1//Enter PC1 port uplink switch port configuration mode

Switch (config-if) # Service-policy input user1-up//bind PC1 upstream policy to user1-up

Switch (config) # interface F0/2//Enter PC2 port uplink switch port configuration mode

Switch (config-if) # Service-policy input user2-up//bind PC2 upstream policy to user2-up

Switch (config) # interface G0/1//Enter switch uplink Gigabit port configuration mode

Switch (config-if) # Service-policy input user-down//bind switch uplink port policy to User-down

Using the Strom-control (Storm Control) feature in three-layer switching, this feature is based on port-controlled unicast \ Multicast \ Multicast, which can be accurate to 0.01%, but an approximate value. This method is a threshold way, limit the monitoring time per second, more than the set threshold to discard the package, and the user is not aware of the network terminal, or remote unresponsive, obviously this way can not ensure that the end user every moment of the network unimpeded, so I think this method is only applicable to certain occasions, Or in conjunction with other policies.

Specific configuration method:

Switch (config) # interface F0/1//Enter switch port configuration mode

Switch (config-if) # Strom-control Unicast/broadcast/multi level 10//10% of the port bandwidth

Understanding Storm Control

Storm control prevents the port of the switch from being destroyed by a broadcast, multicast, or unicast storm on a physical port in the LAN. LAN storm occurs in the packet flooding in the local area network, the establishment of excessive traffic and loss of network performance. Errors in the protocol stack or errors on the network configuration can cause storms.

Storm control (or flow suppression) manages the flow state of the stack, and is managed through a time and contrast measurement with pre-set threshold values for the suppression level. The threshold value is expressed as a percentage of the total available bandwidth for that port. The switch supports individual storm control thresholds for broadcast, multicast, and unicast. If the traffic type threshold is reached, more of this type of traffic will be suppressed until the incoming stack flow drops below the threshold level.

Note: When multicast is faster than a set of thresholds, all inbound traffic (broadcast multicast unicast) is discarded until the level drops below the threshold level. Only the STP package is forwarded. When the broadcast and unicast thresholds are exceeded, only traffic exceeding the threshold is closed.

When the storm control is turned on, the switch monitors the packets over the interface to exchange the bus and determines whether the packet is unicast, multicast, or broadcast. The switch monitors the number of broadcast multicast and unicast, once every 1 seconds, and when a threshold for a type of traffic arrives, the traffic is discarded. This threshold is specified as a percentage of the total available bandwidth that can be used by the broadcast.

The following is a model graph of the broadcast traffic over a period of time on an interface.

This example can also be applied to multicast and unicast traffic. In this example, the broadcast traffic is forwarded between T1-T2 and T4-T5 time over the configured threshold and all of that traffic is discarded at the next time. Therefore, the broadcast traffic is closed within T2 and T5 time. At the next break, T3, if the broadcast traffic does not exceed the limit, then it is forwarded again.

The work of storm control algorithm is the combination of storm control suppression level and interval control per second. A higher threshold allows more packets to pass. Setting the door limit to 100% means that all traffic will not be throttled. 0% means that all broadcast multicast and unicast traffic will be closed.

Note: Because the package does not arrive within the unified time interval, there is no traffic between intervals that can affect storm control.

The switch continuously monitors the port traffic, and when the utilization level drops below the threshold, the dropped type of traffic is forwarded again.

You can use the Storm-control interface command to set a threshold value for each type of traffic.

Default Storm control configuration: By default, the storm control for unicast multicast broadcasts is turned off on the switch, which means: the suppression level is 100%.

Turn on Storm control: You turn on Storm control on the interface and enter a percentage of the total available bandwidth to determine what you want to use for that type of traffic, and enter 100% to allow all traffic. However, because of the limitations of the hardware and the difference in the size of the package, the threshold percentage is an approximate value.

Note: Storm control is only supported under the physical port, and it does not support the use of the Ethernet channel, although it can be knocked in.

The following example restricts the multicast storm level to 70.5% under F0/17

switch# Configure terminal

Switch (config) # interface FASTETHERNET0/17

Switch (config-if) # Storm-control Multicast level 70.5//Limit multicast type of package

Switch (config-if) # End

switch# Show Storm-control FASTETHERNET0/17 multicast

Interface Filter State level current

--------- ------------- ------- -------

FA0/17 Forwarding 70.5% 0%

This is a closed storm control.

switch# Configure terminal

Switch (config) # interface FASTETHERNET0/17

Switch (config-if) # no Storm-control multicast level

Switch (config-if) # End

switch# Show Storm-control FASTETHERNET0/17 multicast

Interface Filter State level current

--------- ------------- ------- -------

-Interface speed limit for CISCO 3550-qos

Building configuration ...

Current configuration:3123 bytes

Version 12.1

No service pad

Service Timestamps Debug Uptime

Service Timestamps log datetime localtime

No service password-encryption

Hostname Shangwu

Enable Secret 5 $1$pmhu$dlsphrguma1simueia87j0

Enable password

IP Subnet-zero

MLS QoS

Class-map Match-all user1-up

Match Access-group 10

Class-map Match-all User1-down

Match Access-group 100

Policy-map user1-up

Class user1-up

Police 800000 800000 exceed-action drop

Trust DSCP

Spanning-tree Extend System-id

Interface FASTETHERNET0/1

No IP address

Duplex full

Speed 100

Interface FASTETHERNET0/2

No IP address

Duplex full

Speed 100

Interface FASTETHERNET0/3

No IP address

Duplex full

Speed 100

Interface FASTETHERNET0/4

No IP address

Duplex full

Speed 100

Interface FASTETHERNET0/5

No IP address

Duplex full

Speed 100

Interface FASTETHERNET0/6

No IP address

Duplex full

Speed 100

Interface FASTETHERNET0/7

No IP address

Duplex full

Speed 100

Interface FASTETHERNET0/8

No IP address

Duplex full

Speed 100

Interface FASTETHERNET0/9

No IP address

Duplex full

Speed 100

Interface FASTETHERNET0/10

No IP address

Duplex full

Speed 100

Interface FASTETHERNET0/11

No IP address

Duplex full

Speed 100

Interface FASTETHERNET0/12

No IP address

Duplex full

Speed 100

Interface FASTETHERNET0/13

No IP address

Service-policy input user1-up

Interface FASTETHERNET0/14

No IP address

Duplex full

Speed 100

Service-policy input user1-up

Interface FASTETHERNET0/15

No IP address

Duplex full

Speed 100

Service-policy input user1-up

Interface FASTETHERNET0/16

No IP address

Duplex full

Speed 100

Service-policy input user1-up

Interface FASTETHERNET0/17

No IP address

Duplex full

Speed 100

Service-policy input user1-up

Interface FASTETHERNET0/18

No IP address

Duplex full

Speed 100

Service-policy input user1-up

Interface Fastethernet0/19

No IP address

Duplex full

Speed 100

Service-policy input user1-up

Interface FASTETHERNET0/20

No IP address

Duplex full

Speed 100

Service-policy input user1-up

Interface FASTETHERNET0/21

No IP address

Duplex full

Service-policy input user1-up

Interface FASTETHERNET0/22

No IP address

Duplex full

Speed 100

Service-policy input user1-up

Interface FASTETHERNET0/23

No IP address

Duplex full

Speed 100

Service-policy input user1-up

Interface FASTETHERNET0/24

Description WAN Interface

Switchport mode access

No IP address

Duplex full

Speed 100

Interface GIGABITETHERNET0/1

No IP address

Interface GIGABITETHERNET0/2

No IP address

Interface Vlan1

IP address ********255.255.255.0

IP Default-gateway ********

IP classless

IP HTTP Server

Logging Trap Debugging

Logging Source-interface fastethernet0/24

Logging ***********

Access-list Permit *********.0 0.0.0.255

Access-list permit IP any ********.0 0.0.0.255

Line con 0

Exec-timeout 0 0

Line vty 0 4

Password

Login

Line Vty 5 15

Password

Login

End

The hostname of the switch, the password to enter enable mode, the user name and password for remote login and settings, the IP address of the Management VLAN, the default gateway for the switch, the port of the switch, the SNMP service, the switch time setting, and so on. These are the same as the previous 2950 switches, 2960 switches and 2950 increase the speed limit and other functions, because in the future customers new shelves in addition to the signing of the traffic contract of the other to do on the switch port speed limit.

The first and most important point is that before the configuration of the switch is complete, especially the configuration of the VTP mode (in general, the initial mode of the VTP is configured as transparent mode), it is forbidden to connect the switch to the network until the VLAN information in the network changes, so Because it is configured with the console line.

At the beginning of the configuration 2950 because the password has not been set, security considerations do not connect it to the network, because it is configured with the console port. All ports are self-tested when the switch is power on, and the indicator light on each port starts to turn off after a period of time. The system's instructions are illuminated by default on the Syst and stat two lights.

After the switch is started, it is set up using the console line. The console line uses a serial interface, and the serial port is connected to the computer's serial port (e.g. the computer does not have a serial port to connect with the adapter), and the RJ-45 connector is connected to the console port of the switch. After the line is connected on Windows click start → programs → accessories → communication → HyperTerminal, after jumping out of the New Connection dialog box, fill in the Name column with the name of the connection you want to create, and then OK. Then connected to the COM port, in the COM1 attribute Portland rate Select "9600", Data bit Select "8", parity check Select "None", Stop bit Select "1", Flow control Select "None", or click "Restore Default" to determine the access to the 2950 configuration interface.

2950 If the dialog configuration mode option appears for the first boot, select Yes to enter the dialog configuration mode and select No to enter the CLI command line interface. The following configurations are performed in CLI mode.

Switch display:switch> in CLI mode

Enter command here switch> user mode

Switch>enable Entering privileged mode

switch# Configure terminal Enter configuration mode

Switch (config) # configuration mode

Set host name switch (config) #hostname hostname in general, the rules for setting the host name are switches followed by switch numbers, such as SWITCH20, SWITCH21, etc.

Set the Enable password switch (config) #enable secret password with the secret command, because it has better security than the password command, and the password is password The agent software randomly generates 12-bit passwords with numbers and uppercase and lowercase letters

Set the remote login switch (config) # username user name privilege permissions secret password

User name, permissions and password when setting the permissions parameters generally fill 0 (minimum permissions), the user name is unified netmaster, password with password agent software randomly generated 12 digits and uppercase and lowercase letters of the password

Encrypt the password switch (config) # service password-encryption that is set

Set the Management VLAN and switch (config) # interface vlan1 into the configuration of the management VLAN

Default gateway switch (CONFIG-IF) # IP Address IP addresses subnet mask settings management VLAN IP, remote login using this IP

Switch (CONFIG-IF) #no shutdown enable the management VLAN

Switch (config-if) #exit exit the configuration of the management VLAN

Switch (config) # IP default-gateway IP Address set default gateway

Set switch port switch (config) # interface fastethernet 0/1 Enter the switch port number 1th

Switch (config-if) # Description Uplink port is described, by default switch 1th port is upper connected port

Switch (config-if) # switchport mode trunk sets the upper connection to trunk

Switch (config-if) # Speed 100 Set the port rate

Switch (config-if) # Duplex full port set to fully duplex mode

Switch (config-if) interface range FastEthernet 0/2-24

Enter Port 2 to port 24 configuration

Switch (config-if-range) #shutdown close these ports and turn them on when you use them

Set the SNMP service switch (config) #snmp-server community string lgb96g0o RO

The command allows read access to any software that commits community string to a string set to conform to a length of more than 8 digits, to contain uppercase and lowercase letters and numbers

Turn off the HTTP service switch (config) #no IP http Server has a hidden risk due to the full-open HTTP service

Set vty switch (config) #line vty 0 4 set telnet to 0 to 4 total 5 lines

Switch24 (config-line) # Login Local enables the system to authenticate with a locally set user name and password when Telnet

Set timestamps switch (config) # service timestamps Debug datetime

Switch (config) # service timestamps log datetime default Debug/log to Uptime, datetime

Setting the VTP mode Switch#vlan database into VTP settings

Switch (VLAN) #vtp transparent to set the VTP mode to transparent mode

Set switch time Switch#clock set HH:MM:SS

Save settings for the switch switch#copy running-config startup-config

View switch Settings switch#show running-config View the configuration of the switch

Limit of port traffic

The limit of switch port traffic is implemented by Policy-map.

Switch (config) #ip access-list standard name//establish a standardized named access control list, name of the ACL

Switch (CONFIG-STD-NACL) # permit any//matches any IP

Switch (config) #class-map name//Set QoS class map

Switch (config-cmap) #match access-group name name//bind ACL list

Switch (config) #policy-map name//Set policy name

Switch (config-pmap) #class name//bind Class-map

Switch (config-pmap-c) #police 3000000 100000 exceed-action drop defines a policy with a normal rate of 3Mbit per second, the allowable range is 100KByte, and the out-of-range packet is drop

Switch (config) #interface range fastethernet 0/1–24//Enter Port 1-24, and the default switch must do speed limit in addition to the uplink

Switch (config-if) #service-policy input name//bound policy in the direction of the port upward

Switch (config) #mls QoS//Enable MLS QoS to make policy effective

Port-bound MAC address

After entering configuration mode, the following command bindings are used:

Switch (config-if) switchport port-security mac-address mac (host MAC address)

Unbind

Switch (config-if) no switchport port-security Mac-address mac (host MAC address)

How the two-layer switch is speed-limiting.

With the Cisco 2950 switch, each port is a two-tier access and how to speed limit.

The port speed limit can be used with Service-policy:

You can define class first, and then

Switch (config) # Policy-map Policy1

Switch (CONFIG-PMAP) # class Class1

Switch (config-pmap-c) # police 1000000 65536 exceed-action drop

Then configure under the interface:

Switch (config) # interface GIGABITETHERNET0/17

Switch (config-if) # Service-policy input Plcmap1

Can speed limit, but not accurate ...

Give an example of a speed limit of 6500:

Mls QoS aggregate-policer Test 50000000 100000 conform-action transmit exceed-action drop

Mls QoS

Class-map Match-any Test_limite

Match Access-group name Test_addr

Policy-map Rate-limit-uplink

Class Test_limite

Police aggregate test

IP Access-list Extended test_addr

Permit IP any x.x.x.x 0.0.0.255

Inter G0/1

Service-policy input Rate-limit-uplink

Summary: Cisco switch port speed limit commonly used configuration, the front-end speed limit work is done by the superior department, recently due to the branch's own internal customer needs, we want to provide it with 50M bandwidth. For this reason, we took a painstaking two-day test, first of all, we tested the device connection situation:

Cisco 3560 Port 0/47 (analog user) —————— Cisco 6509 ports 0/1, 0/2 (analog station, two routes on the line, hot standby).

Test method on 3560 and 6509 respectively from the FTP for Speed measurement

The point is to say the 6509 command:

MLS QoS Aggregate-policer Test 50000000 100000 conform-action transmit exceed-action drop

MLS QoS

Class-map Match-any Test_limite

Match Access-group name Test_addr

Policy-map Rate-limit-uplink

Class Test_limite

Police aggregate test

IP access-list Extended test_addr (because the upper and lower lines refer to the same policy so do not separate ACLs)

Permit IP any x.x.x.x 0.0.0.3 (Internet address segment a assigned to the user)

Permit IP x.x.x.x 0.0.0.3 any

Permit IP any x.x.x.x 0.0.0.3 (assigned to the user's Internet address segment B)

Permit IP x.x.x.x 0.0.0.3 any

Inter F0/1

IP addre x.x.x.x 255.255.255.252

Service-policy input Test_uplink limit upload

Inter F0/2

IP addre x.x.x.x 255.255.255.252

Service-policy input Test_uplink limit upload

Inter G0/47

Service-policy input rate-limit-uplink restricted download

After testing, the scheme was successful. There are a few points to explain, because 35 and 65 only in the input direction to refer to the policy, so at the same time the uplink and download as the speed limit need to be on the top and download two-way port to do, and secondly, we have a lot of detours, say to everyone to wake up, start our test equipment performance is very low, So always test not the ideal result, very frustrated, accidentally took the best of a computer to test, unexpectedly, and later found a high-performance equipment to test, the results are very ideal, here to remind you, low-performance equipment in the test of high bandwidth should pay special attention.

2-layer switch, which is directly into the port, uses line-rate to speed up the upper and lower lines, but it seems to be done in both directions

Here's what I saw you try.

Access-list 2 Permit any

MLS QoS

Class-map Match-all Input-class

Match Access-group 2

Class-map Match-all Output-class

Match IP DSCP 0

Policy-map output-policy-2m

Class Output-class

Police 2000000 200000 exceed-action drop

Policy-map input-policy-2m

Class Input-class

Police 2000000 200000 exceed-action drop

Policy-map output-policy-5m

Class Output-class

Police 5000000 500000 exceed-action drop

Policy-map input-policy-5m

Class Input-class

Police 5000000 500000 exceed-action drop

Policy-map output-policy-10m

Class Output-class

Police 10000000 1000000 exceed-action drop

Policy-map input-policy-10m

Class Input-class

Police 10000000 1000000 exceed-action drop

Policy-map output-policy-20m

Class Output-class

Police 20000000 1000000 exceed-action drop

Policy-map input-policy-20m

Class Input-class

Police 20000000 1000000 exceed-action drop

Interface fastethernet?/?

Service-policy input input-policy-5m

Service-policy Output output-policy-5m

Smart Ethernet Switch Series

The Cisco Catalyst 2960 Series Smart Ethernet switch is a new, fixed-configuration standalone device family that provides desktop Fast Ethernet and Gigabit Ethernet connectivity to provide enhanced LAN services for entry-level enterprise, midsize market, and branch office networks. The Catalyst2960 family has integrated security features, including network Admission Control (NAC), Advanced quality of Service (QoS), and resiliency to provide intelligent service to the edge of the network.

Cisco Catalyst 2960 Series offers: Provides intelligent features for network edge, such as advanced access Control lists (ACLs) and enhanced security features dual media uplink ports provide Gigabit Ethernet uplink flexibility and can use copper or fibre uplink ports- Each media uplink Port has a two-port Ethernet port and a small pluggable (SFP) Gigabit Ethernet port, one of which is activated when used, but cannot be used at the same time. Network control and bandwidth optimization are achieved through advanced QoS, precise rate limiting, ACL, and multicast services. Network security through multiple authentication methods, data encryption technology, and network access control based on user, port and MAC address simplifies network configuration, upgrades, and troubleshooting with smartports and automatically configures specific applications using the Cisco Network Assistant

Cisco Catalyst 2960-24tt:24 10/100 Ethernet port and 2 A/a fixed Ethernet uplink port; 1 rack Unit (RU)

Cisco Catalyst 2960-48tt:48 10/100 Ethernet port and 2 A/a fixed Ethernet uplink port; 1 RU

Cisco Catalyst 2960-24tc:24 10/100 Ethernet ports and 2 dual media uplink ports; 1 RU

Cisco Catalyst 2960-48tc:48 10/100 Ethernet ports and 2 dual media uplink ports; 1 RU

Cisco Catalyst 2960g-24tc:20 x/N Ethernet ports, 4 of which are dual media ports; 1 RU

The CiscoCatalyst2960 series of software images provides a rich array of intelligent services, including advanced QoS, rate limiting, and ACLs. SFP Gigabit Ethernet ports can be installed with a wide range of SFP transceivers including CISCO1000BASE-SX, 1000BASE-LX, 1000BASE-BX, 1000base-zx, 100base-fx, 100base-lx10, 100BASE-BX and coarse-wavelength division multiplexing (CWDM) SFP transceivers.

Advanced QoS:

802.1p Cos and DSCP field classifications are available with source and destination IP addresses, source and destination MAC addresses, or layer fourth TCP/UDP port numbers

Make tags and reclassify based on a single grouping.

The Cisco control plane and data plane QoS ACLs on all ports ensure proper tagging on a single grouping basis. 4 output queues per port allow users to manage up to four types of traffic in the stack.

The SRR Scheduler ensures that users can provide different priorities for data traffic by intelligently serving input and output queues. Weighted Fleet tail Drop (WTD) provides congestion avoidance for input and output queues before an outage occurs.

Strict prioritization ensures that the highest-priority groupings are serviced before all other traffic.

High-precision QoS features do not have any impact on performance.

Precise rate Limiting:

The Cisco CIR feature ensures bandwidth with accuracy of up to 1Mbps.

Rate limits are based on source and destination IP addresses, source and destination MAC addresses, layer fourth TCP/UDP information, or any combination of these fields, and are provided using QoS, ACLs (IP ACLs or Mac ACLs), level diagrams, and policy diagrams.

The input policy control and output shaping makes it easy to manage asynchronous upstream and downstream traffic from base stations or uplinks. Each Fast Ethernet or Gigabit Ethernet port can support up to 64 totals or a separate policy controller.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.