Global Storm Policer Configuration - FibroLAN Falcon-RX/812/G/A User Manual

Table of Contents

Advertisement

Falcon R-Class | User Guide
4.7.12.1
Leaky Bucket
The leaky-bucket algorithm is used to realize rate limiting (policing or shaping). A leaky bucket
provides a mechanism by which bursty traffic can be limited/shaped to present a steady stream of
traffic to the network
The dual leaky bucket implementation is named Two-rate Three Color Marker (TrTCM), for which
configuration attributes are assigned:
CIR: Committed Information Rate: the rate in bits-per-second which the Policer is committed to
pass through.
CBS: Committed Burst Size: the burst size in bytes, allowed for the committed bucket.
EIR: Excess Information Rate: the rate in bits-per-second which the Policer is allowing to pass
through when only excess resources are available.
EBS: Excess Burst Size: the burst size in bytes, allowed for the excess bucket.
Figure 4-61: Dual Leaky Bucket

Global Storm Policer Configuration

Storm control prevents traffic on a LAN from being overloaded by a broadcast, multicast, or
unknown-unicast storm. A LAN storm occurs when packets flood the LAN, creating excessive traffic
and degrading network performance. Errors in the protocol-stack implementation, mistakes in
network configuration, or users issuing a denial-of-service attack can cause a storm.
There is a unicast storm policer, multicast storm policer, and a broadcast storm policer. These only
affect flooded frames, i.e., frames with a (VLAN ID, DMAC) pair not present in the MAC Address table.
92
fra

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Falcon-rx/812/g/d

Table of Contents