cpu-class-settings-show
The Netvisor OS CPU Control Packet Processing Protection feature allows the CPU control packet processing path be protected against misbehaving and malicious hosts or end-points that may flood control protocol packets. This is also called “CPU hog protection”.
If a host floods a control protocol packet, it floods the to-cpu queue. This prevents lower-rate packets from valid senders from reaching Netvisor, resulting in traffic loss for those hosts. Typically a traffic loss occurs for other hosts on the network. Netvisor can process large streams of both valid and malformed protocol packets for various protocols.
Syntax cpu-class-settings-show
hog-checker-interval hog-checker-interval-number (ms) |
Specify the hog checking interval in milliseconds. |
hog-max-hosts-per-class hog-max-hosts-per-class-number |
Specify the maximum number of active hosts tracked per CPU class. |
hog-max-violators-per-port hog-max-violators-per-port-number |
Specify the maximum number of hog violators per port. |
hog-max-violators-per-port hog-max-violators-per-port-number |
Specify the hog warning threshold. |
hog-violator-timeout hog-violator-timeout-number (s) |
Specify the timeout before restoring the hog violator to normal queue after an idle state. |
Defaults None
Access Network Administrator
History Command introduced in Version 2.6.0.
Usage Use this command to display statistic settings for CPU hog protection.
Examples To display statistic settings for CPU hog protection, use the following syntax:
CLI network-admin@switch > cpu-class-settings-show
switch: Spine01
hog-checker-interval(ms): 100
hog-max-hosts-per-class: 500
hog-max-violators-per-port: 50
hog-warning-threshold: 5
hog-violator-timeout(s): 20