Rate Limiters - FibroLAN Falcon Gen-3 M-Class User Manual

Table of Contents

Advertisement

Falcon M-Class | User Guide
Protocol IP protocol number: (0-255, TCP or UDP) or 'Any'.
6. IPv6
Source IP 32 LS bits of IPv6 source address in value/mask format or 'Any'. If
a port is configured to match on DMAC/DIP, this field is the Destination IP
address.
DSCP Diffserv Code Point value (DSCP): It can be a specific value, range of
values or 'Any'. DSCP values are in the range 0-63 including BE, CS1-CS7, EF
or AF11-AF43.
Sport Source TCP/UDP port:(0-65535) or 'Any', specific or port range
applicable for IP protocol UDP/TCP.
Dport Destination TCP/UDP port :(0-65535) or 'Any', specific or port range
applicable for IP protocol UDP/TCP.
Indicates the classification action taken on ingress frame if Parameters
Action
configured are matched with the frame's content.
Parameters
CoS:Class of Service (0-7) or 'Default'
DP: Drop Precedence Level.(0-1or 'Default'
DSCP:
PCP PCP: (0-7) or 'Default'. Note: PCP and DEI cannot be set individually.
DEI DEI: (0-1) or 'Default'.
Policy ACL Policy number: (0-255) or 'Default' (empty field).
Buttons
Save: Click to save the configuration and move to main QCL page.
Reset: Click to undo any changes made locally and revert to previously saved
values.
Cancel: to the previous page without saving the configuration change
Note: 'Default' means that the default-classified value is not modified by this QCE.
4.8.12

Rate Limiters

Rate Limiters control the rate of traffic sent or received on a network interface. Traffic that is less than or
equal to the specified rate is forwarded (and may be delayed by a Shaper), whereas traffic that exceeds the
rate is dropped or delayed.
Traffic Policer monitors network traffic for conformity with a traffic contract and if required, drops (or
remarks) traffic to enforce compliance with that contract. Traffic sources which are aware of a traffic contract
sometimes apply Traffic Shaping in order to ensure their output stays within the contract and is thus not
dropped. Traffic exceeding a traffic contract may be tagged as non-compliant, dropped, or left as-is
depending on configuration and circumstance.
Traffic Shaper attempts to control network traffic in order to optimize or guarantee the bandwidth by
delaying packets that exceeds the configured bandwidth profile. Traffic shaping action results in a smooth,
evenly distributed flow of frames, complying with the configured rate.
4.8.12.1
Leaky Bucket
The leaky-bucket algorithm is used to realize rate limiting (policing or shaping). A leaky bucket
provides a mechanism by which bursty traffic can be limited/shaped to present a steady stream of
traffic to the network
DSCP
(0-63, BE, CS1-CS7, EF or AF11-AF43) or 'Default'.
112

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Nfalcon-mFalcon-mxMfalcon-mx

Table of Contents