[f-nsp] Layer 2 packet forwarded in hardware(PP)

Eldon Koyle ekoyle+puck.nether.net at gmail.com
Mon Sep 10 10:22:19 EDT 2018


You can enable cpu-protection on the vlan IIRC, I don't remember all the
caveats; definitely look at the manual before enabling.

-- 
Eldon

On Mon, Sep 10, 2018, 04:11 Franz Georg Köhler <lists at openunix.de> wrote:

> I see on another device traffic hitting the CPU that looks like the same
> packet hits twice with different reasons.
> Does anyone have an idea why this happens?
> I wonder why it is being claffied as multicast only once (and finally it
> doesn't look like multicast)?
>
> [ppcr_rx_packet]: Packet received
> Time stamp : 83 day(s) 06h 07m 07s:,
> TM Header: [ 0151 0a25 0000 ]
> Type: Fabric Unicast(0x00000000) Size: 337 Class: 0 Src sys port: 2597
> Dest Port: 0  Drop Prec: 0 Ing Q Sig: 0 Out mirr dis: 0x0 Excl src: 0 Sys
> mc: 0
> **********************************************************************
> Packet size: 331, XPP reason code: 0x0000a8a9
> 00: 05f0 0003 1850 0e34-78cb fffe 0000 0000  FID     = 0x05f0
> 10: 000c 29ab f8be 000c-297e ba9a 0800 4500  Offset  = 0x10
> 20: 012d 030c 4000 4011-1ff6 0a40 0125 0a40  VLAN    = 3636(0x0e34)
> 30: 011a 8f2b 1f93 0119-f6e8 7b22 7322 3a22  CAM     = 0x05ffff(R)
> 40: 7375 6974 6522 2c22-7461 7267 6574 223a  SFLOW   = 0
> 50: 2275 7365 7222 2c22-6465 7669 6365 223a  DBL TAG = 0
> 60: 6661 6c73 652c 2274-7970 6522 3a22 7573
> 70: 6572 6261 6e6b 222c-2269 6422 3a22 3562
> Pri CPU MON SRC   PType US BRD DAV SAV DPV SV ER TXA SAS Tag MVID
> 0   0   0   11/4  3     0  0   0   1   1   0  0  0   0   1   0
>
> 10.64.1.37 -> 10.64.1.26 UDP [36651 -> 8083]
> **********************************************************************
> [ppcr_tx_packet] ACTION: Forward packet using fid 0xa3df
> [xpp10ge_cpu_forward_debug]: Forward LP packet
> Time stamp : 83 day(s) 06h 07m 07s:,
> TM Header: [ 1002 03df a3df ]
> Type: Multicast(0x00000000) Size: 2 Mcast ID: 0xfa3 Src Port: 15
> Drp Pri: 3 Snp: 1 Exclude Src: 1 Cls: 0x00000003
> **********************************************************************
> 00: a3df 0003 1850 0e34-84c0 0296 0000 0000  FID     = 0xa3df
> 10: 000c 29ab f8be 000c-297e ba9a 0800 4500  Offset  = 0x10
> 20: 012d 030c 4000 4011-1ff6 0a40 0125 0a40  VLAN    = 3636(0x0e34)
> 30: 011a 8f2b 1f93 0119-f6e8 7b22 7322 3a22  CAM     = 0x00014b
> 40: 7375 6974 6522 2c22-7461 7267 6574 223a  SFLOW   = 0
> 50: 2275 7365 7222 2c22-6465 7669 6365 223a  DBL TAG = 0
> 60: 6661 6c73 652c 2274-7970 6522 3a22 7573
> 70: 6572 6261 6e6b 222c-2269 6422 3a22 3562
> Pri CPU MON SRC   PType US BRD DAV SAV DPV SV ER TXA SAS Tag MVID
> 0   0   0   12/4  3     0  0   0   1   1   0  0  0   0   1   0
>
> 10.64.1.37 -> 10.64.1.26 UDP [36651 -> 8083]
> **********************************************************************
>
>
> _______________________________________________
> foundry-nsp mailing list
> foundry-nsp at puck.nether.net
> http://puck.nether.net/mailman/listinfo/foundry-nsp
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://puck.nether.net/pipermail/foundry-nsp/attachments/20180910/640b7ed3/attachment.html>


More information about the foundry-nsp mailing list