Operational Guidelines And Tips - Alcatel-Lucent 7450 System Management Manual

Ethernet service switch
Hide thumbs Also See for 7450:
Table of Contents

Advertisement

ETH-CFM Ingress Squelching

Operational Guidelines and Tips

The following points offer various optional guidelines that may help an operator decide how to
leverage Distributed CPU Protection.
Page 50
The rates in a policy assigned to a capture SAP should be higher than those assigned
to MSAPs that will contain a single subscriber. The rates for the capture sap policy
should allow for a burst of MSAP setups.
To completely block a set of specific protocols on a given SAP, create a single static
policer with a rate of 0 and map the protocols to that policer. Dynamic policers and
local monitors can't be used to simultaneously allow some protocols but block others
(the non-zero rates in the monitor would let all protocols slip through at a low rate).
During normal operation it is recommended to configure "log-events" (no verbose
keyword) for all static-policers, in the dynamic-parameters of all protocols and for all
local-monitoring-policers. he verbose keyword can be used selectively during debug,
testing, tuning and investigations.
Packet based rate limiting is generally recommended for low rate subscriber based
protocols whereas kbps rate limiting is recommended for higher rate infrastructure
protocols (such as BGP).
It is recommended to configure an exceed-action of low-priority for routing and
infrastructure protocols. Marked packets are more likely to be discarded if there is
congestion in the control plane of the router, but will get processed if there is no
contention for CPU resources allowing for a work-conserving behavior in the CPM.
In order to assign a different dist-cpu-protection policy to a specific MSAP (instance)
or to all MSAPs for a specific msap policy, the operator can assign a new dist-cpu-
protection policy to the MSAP policy and then use the eval-msap tool:
A:nodeA>tools>perform# subscriber-mgmt eval-msap
- eval-msap { policy <msap-policy-name> | msap <sap-id> }
Note that any new MSAPs will also be assigned the new dist-cpu-protection policy.
If needed, an operator can determine which subscriber is on a specific MSAP by using
the show service active-subs command and then filtering ("| match") on the msap
string.
If protocol X is trusted, and using the "all-unspecified" protocol is not required, then
simply avoid creating protocol X in the policy configuration.
If protocol X is trusted, but the all-unspecified bucket is required, then there are two
options:
→ avoid creating protocol X so that it is treated as part of the all-unspecified bucket
(but account for the packets from X in the all-unspecified rate and local-mon rate),
or
→ create protocol X and configure it to bypass.
7450 ESS System Mangement Guide

Advertisement

Table of Contents
loading

Table of Contents