cpu-class-settings-show
The NetVisor OS's CPU Control Packet Processing Protection feature allows the CPU control packet processing path be protected against misbehaving, and malicious hosts or end-points that may flood control protocol packets. This is also called “CPU hog protection”.
If a host floods a control protocol packet, it floods the to-cpu queue. This prevents lower-rate packets from valid senders from reaching NetVisor, resulting in traffic loss for those hosts. Typically a traffic loss occurs for other hosts on the network. NetVisor OS can process large streams of both valid, and malformed protocol packets for various protocols.
Syntax cpu-class-settings-show
hog-checker-interval hog-checker-interval-number (ms) |
The hog checking interval in milliseconds. |
hog-max-hosts-per-class hog-max-hosts-per-class-number |
The maximum number of active hosts tracked per CPU class. |
hog-max-violators-per-port hog-max-violators-per-port-number |
The maximum number of hog violators per port. |
hog-max-violators-per-port hog-max-violators-per-port-number |
The hog warning threshold. |
hog-violator-timeout hog-violator-timeout-number (s) |
The timeout before restoring the hog violator to normal queue after an idle state. |
Defaults None
Access Network Administrator
History
Version 2.6.0 |
Command introduced. |
Usage Use this command to display statistic settings for CPU hog protection.
Examples To display statistic settings for CPU hog protection, use the following syntax:
CLI (network-admin@switch) > cpu-class-settings-show
switch: Spine01
hog-checker-interval(ms): 100
hog-max-hosts-per-class: 500
hog-max-violators-per-port: 50
hog-warning-threshold: 5
hog-violator-timeout(s): 20