Brocade Communications Systems NetIron MLXe Series Hardware Installation Manual page 45

Table of Contents

Advertisement

sysmon task-threshold
The threshold time is configured using the global configuration command sysmon task-threshold <time> for the active
MP and all LPs, and will be available across resets.
Syntax
sysmon task-threshold time
no sysmon task-threshold time
Used to unconfigure the threshold value.
Parameters
time
Sets the threshold-time in milliseconds.
Modes
Global configuration
Examples
The following configuration example configures the task-threshold to default 60ms:
device(config)#sysmon task-threshold 60
Task threshold-time is set to default value 60ms.
The following configuration example sets the task-threshold to 50ms:
device(config)#sysmon task-threshold 50
Task threshold-time is set to 50ms.
When hold time exceeds the configured threshold, i.e. 20ms for sfm_mgr task, the below syslog gets generated:
Nov 26 14:12:11:I:System: High CPU condition on MP, task name=sfm_mgr, max hold time=29ms, count =11
Nov 26 14:07:11:I:System: High CPU condition on MP, task name=sfm_mgr, max hold time=29ms, count =1
History
Release version
R05.8.00
MLXe BR-MLX-10Gx4-M IPsec and IKEv2
NetIron MLXe is located on the perimeter of connections to external networks. Encryption and decryption is supported for IPv4 unicast
data and control packets transmitted or received from external networks, using IPSec FPGA and IKEv2 protocols for the MLXe BR-
MLX-10Gx4-M-IPSEC.
The Public Key Infrastructure (PKI) provides a security infrastructure for secure communication. Each PKI peer holds a Digital Certificate
which holds multiple attributes that ensure the entity can be trusted, and can support secure communication.
IPSec FPGA protocol for the MLXe BR-MLX-10Gx4-M-IPSEC provides hardware based data encryption and decryption.
IKEv2 protocol for the MLXe BR-MLX-10Gx4-M-IPSEC is used to setup and manage secure tunnels across external
networks.
PKI uses the asymmetric encryption algorithm; two different keys are used to encrypt and decrypt data. The key pair consists of a private
key and a public key. The private key must be kept secret, while the public key can be distributed. Data encrypted by one of the two keys
can only be decrypted by the other. Data encrypted with a public key cannot be decrypted using a public key and vice versa. Users of a
public key are confident that the associated private key is owned by the correct remote subject.
Brocade NetIron MLXe Series Hardware Installation Guide
53-1004203-04
Command history
This command was introduced.
Router modules
45

Advertisement

Table of Contents
loading

Table of Contents