The Netvisor OS CPU Control Packet Processing Protection feature allows the CPU control packet processing path be protected against misbehaving and malicious hosts or end-points that may flood control protocol packets. This is also called “CPU hog protection”.

If a host floods a control protocol packet, it floods the to-cpu queue. This prevents lower-rate packets from valid senders from reaching Netvisor, resulting in traffic loss for those hosts. Typically a traffic loss occurs for other hosts on the network. Netvisor can process large streams of both valid and malformed protocol packets for various protocols.

Syntax   cpu-class-stats-clear


name name-string

Specify the name of the CPU class to clear statistics.

cos cos-number

Clear the CoS value for the CPU class.

hw-out-pkts hw-out-pkts-number

Clear the hardware transmitted packet count.

hw-drop-pkts hw-drop-pkts-number

Clear the number of hardware dropped packets.

sw-pkts sw-pkts-number

Clear the number of packets processed in software.

sw-drops-pkts sw-drops-pkts-number

Clear the number of packets dropped in software because the queue is full.

hog-violations hog-violations-number

Clear the number of hog protection host violations and moved to separate queue.

hog-warnings hog-warnings-number

Clear the number of hog protection delegated bandwidth warnings.

hog-hosts-in hog-hosts-in-number

Clear the number of added hosts for hog protection.

hog-hosts-out hog-hosts-out-number

Clear the number of hosts removed from hog protection.

hog-max-hosts-drops hog-max-hosts-drops-number

Clear the number of dropped hosts with hog protection because the maximum number of hosts is reached.


Defaults   None

Access   Network Administrator

History   Command introduced in Version 2.6.0.

Usage   Use this command to clear statistics for CPU hog protection.

Examples  To clear statistics for CPU hog protection, use the following syntax:

CLI network-admin@switch > cpu-class-stats-show

See Also