[f-nsp] Layer 2 packet forwarded in hardware(PP)
Eldon Koyle
ekoyle+puck.nether.net at gmail.com
Mon Sep 10 10:22:19 EDT 2018
You can enable cpu-protection on the vlan IIRC, I don't remember all the
caveats; definitely look at the manual before enabling.
--
Eldon
On Mon, Sep 10, 2018, 04:11 Franz Georg Köhler <lists at openunix.de> wrote:
> I see on another device traffic hitting the CPU that looks like the same
> packet hits twice with different reasons.
> Does anyone have an idea why this happens?
> I wonder why it is being claffied as multicast only once (and finally it
> doesn't look like multicast)?
>
> [ppcr_rx_packet]: Packet received
> Time stamp : 83 day(s) 06h 07m 07s:,
> TM Header: [ 0151 0a25 0000 ]
> Type: Fabric Unicast(0x00000000) Size: 337 Class: 0 Src sys port: 2597
> Dest Port: 0 Drop Prec: 0 Ing Q Sig: 0 Out mirr dis: 0x0 Excl src: 0 Sys
> mc: 0
> **********************************************************************
> Packet size: 331, XPP reason code: 0x0000a8a9
> 00: 05f0 0003 1850 0e34-78cb fffe 0000 0000 FID = 0x05f0
> 10: 000c 29ab f8be 000c-297e ba9a 0800 4500 Offset = 0x10
> 20: 012d 030c 4000 4011-1ff6 0a40 0125 0a40 VLAN = 3636(0x0e34)
> 30: 011a 8f2b 1f93 0119-f6e8 7b22 7322 3a22 CAM = 0x05ffff(R)
> 40: 7375 6974 6522 2c22-7461 7267 6574 223a SFLOW = 0
> 50: 2275 7365 7222 2c22-6465 7669 6365 223a DBL TAG = 0
> 60: 6661 6c73 652c 2274-7970 6522 3a22 7573
> 70: 6572 6261 6e6b 222c-2269 6422 3a22 3562
> Pri CPU MON SRC PType US BRD DAV SAV DPV SV ER TXA SAS Tag MVID
> 0 0 0 11/4 3 0 0 0 1 1 0 0 0 0 1 0
>
> 10.64.1.37 -> 10.64.1.26 UDP [36651 -> 8083]
> **********************************************************************
> [ppcr_tx_packet] ACTION: Forward packet using fid 0xa3df
> [xpp10ge_cpu_forward_debug]: Forward LP packet
> Time stamp : 83 day(s) 06h 07m 07s:,
> TM Header: [ 1002 03df a3df ]
> Type: Multicast(0x00000000) Size: 2 Mcast ID: 0xfa3 Src Port: 15
> Drp Pri: 3 Snp: 1 Exclude Src: 1 Cls: 0x00000003
> **********************************************************************
> 00: a3df 0003 1850 0e34-84c0 0296 0000 0000 FID = 0xa3df
> 10: 000c 29ab f8be 000c-297e ba9a 0800 4500 Offset = 0x10
> 20: 012d 030c 4000 4011-1ff6 0a40 0125 0a40 VLAN = 3636(0x0e34)
> 30: 011a 8f2b 1f93 0119-f6e8 7b22 7322 3a22 CAM = 0x00014b
> 40: 7375 6974 6522 2c22-7461 7267 6574 223a SFLOW = 0
> 50: 2275 7365 7222 2c22-6465 7669 6365 223a DBL TAG = 0
> 60: 6661 6c73 652c 2274-7970 6522 3a22 7573
> 70: 6572 6261 6e6b 222c-2269 6422 3a22 3562
> Pri CPU MON SRC PType US BRD DAV SAV DPV SV ER TXA SAS Tag MVID
> 0 0 0 12/4 3 0 0 0 1 1 0 0 0 0 1 0
>
> 10.64.1.37 -> 10.64.1.26 UDP [36651 -> 8083]
> **********************************************************************
>
>
> _______________________________________________
> foundry-nsp mailing list
> foundry-nsp at puck.nether.net
> http://puck.nether.net/mailman/listinfo/foundry-nsp
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://puck.nether.net/pipermail/foundry-nsp/attachments/20180910/640b7ed3/attachment.html>
More information about the foundry-nsp
mailing list