cpu-class-settings-modify
Netvisor’s CPU Control Packet Processing Protection feature allows the CPU control packet processing path be protected against misbehaving and malicious hosts or end-points that may flood control protocol packets. This is also called “CPU hog protection”.
If a host floods a control protocol packet, it floods the to-cpu queue. This prevents lower-rate packets from valid senders from reaching Netvisor, resulting in traffic loss for those hosts. Typically a traffic loss occurs for other hosts on the network. Netvisor can process large streams of both valid and malformed protocol packets for various protocols.
Syntax CLI network-admin@switch >cpu-class-settings-show
hog-checker-interval hog-checker-interval-number (ms) |
Specify the hog checking interval in milliseconds. |
hog-max-hosts-per-class hog-max-hosts-per-class-number |
Specify the maximum number of active hosts tracked per CPU class. |
hog-max-violators-per-port hog-max-violators-per-port-number |
Specify the maximum number of hog violators per port. |
hog-max-violators-per-port hog-max-violators-per-port-number |
Specify the hog warning threshold. |
hog-violator-timeout hog-violator-timeout-number (s) |
Specify the timeout before restoring the hog violator to normal queue after an idle state. |
Defaults None
Access Network Administrator
History Command introduced in Version 2.6.0.
Usage Use this command to modify statistics settings for CPU class.
Examples To modify CPU class settings for hog-checker-interval from 100 to 150, use the following syntax:
CLI network-admin@switch > cpu-clss-settings-modify hog-checker-interval 150