Netvisor’s CPU Control Packet Processing Protection feature allows the CPU control packet processing path be protected against misbehaving and malicious hosts or end-points that may flood control protocol packets. This is also called “CPU hog protection”.

If a host floods a control protocol packet, it floods the to-cpu queue. This prevents lower-rate packets from valid senders from reaching Netvisor, resulting in traffic loss for those hosts. Typically a traffic loss occurs for other hosts on the network. Netvisor can process large streams of both valid and malformed protocol packets for various protocols.


hog-checker-interval hog-checker-interval-number (ms)

Specify the hog checking interval in milliseconds. 

hog-max-hosts-per-class hog-max-hosts-per-class-number

Specify the maximum number of active hosts tracked per CPU class.

hog-max-violators-per-port hog-max-violators-per-port-number

Specify the maximum number of hog violators per port.

hog-max-violators-per-port hog-max-violators-per-port-number

Specify the hog warning threshold.

hog-violator-timeout hog-violator-timeout-number (s)

Specify the timeout before restoring the hog violator to normal queue after an idle state.

Defaults   None

Access   Network Administrator

History   Command introduced in Version 2.6.0.

Usage   Use this command to modify statistics settings for CPU class.

Examples  To modify CPU class settings for hog-checker-interval from 100 to 150, use the following syntax:

CLI network-admin@switch > cpu-clss-settings-modify hog-checker-interval 150

See Also   Command See Also