<div dir="auto">You can enable cpu-protection on the vlan IIRC, I don't remember all the caveats; definitely look at the manual before enabling.<div dir="auto"><br></div><div dir="auto">-- </div><div dir="auto">Eldon</div></div><br><div class="gmail_quote"><div dir="ltr">On Mon, Sep 10, 2018, 04:11 Franz Georg Köhler <<a href="mailto:lists@openunix.de">lists@openunix.de</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">I see on another device traffic hitting the CPU that looks like the same<br>
packet hits twice with different reasons.<br>
Does anyone have an idea why this happens?<br>
I wonder why it is being claffied as multicast only once (and finally it<br>
doesn't look like multicast)?<br>
<br>
[ppcr_rx_packet]: Packet received<br>
Time stamp : 83 day(s) 06h 07m 07s:,<br>
TM Header: [ 0151 0a25 0000 ]<br>
Type: Fabric Unicast(0x00000000) Size: 337 Class: 0 Src sys port: 2597<br>
Dest Port: 0 Drop Prec: 0 Ing Q Sig: 0 Out mirr dis: 0x0 Excl src: 0 Sys mc: 0<br>
**********************************************************************<br>
Packet size: 331, XPP reason code: 0x0000a8a9<br>
00: 05f0 0003 1850 0e34-78cb fffe 0000 0000 FID = 0x05f0<br>
10: 000c 29ab f8be 000c-297e ba9a 0800 4500 Offset = 0x10<br>
20: 012d 030c 4000 4011-1ff6 0a40 0125 0a40 VLAN = 3636(0x0e34)<br>
30: 011a 8f2b 1f93 0119-f6e8 7b22 7322 3a22 CAM = 0x05ffff(R)<br>
40: 7375 6974 6522 2c22-7461 7267 6574 223a SFLOW = 0<br>
50: 2275 7365 7222 2c22-6465 7669 6365 223a DBL TAG = 0<br>
60: 6661 6c73 652c 2274-7970 6522 3a22 7573<br>
70: 6572 6261 6e6b 222c-2269 6422 3a22 3562<br>
Pri CPU MON SRC PType US BRD DAV SAV DPV SV ER TXA SAS Tag MVID<br>
0 0 0 11/4 3 0 0 0 1 1 0 0 0 0 1 0<br>
<br>
10.64.1.37 -> 10.64.1.26 UDP [36651 -> 8083] <br>
**********************************************************************<br>
[ppcr_tx_packet] ACTION: Forward packet using fid 0xa3df<br>
[xpp10ge_cpu_forward_debug]: Forward LP packet<br>
Time stamp : 83 day(s) 06h 07m 07s:,<br>
TM Header: [ 1002 03df a3df ]<br>
Type: Multicast(0x00000000) Size: 2 Mcast ID: 0xfa3 Src Port: 15<br>
Drp Pri: 3 Snp: 1 Exclude Src: 1 Cls: 0x00000003<br>
**********************************************************************<br>
00: a3df 0003 1850 0e34-84c0 0296 0000 0000 FID = 0xa3df<br>
10: 000c 29ab f8be 000c-297e ba9a 0800 4500 Offset = 0x10<br>
20: 012d 030c 4000 4011-1ff6 0a40 0125 0a40 VLAN = 3636(0x0e34)<br>
30: 011a 8f2b 1f93 0119-f6e8 7b22 7322 3a22 CAM = 0x00014b <br>
40: 7375 6974 6522 2c22-7461 7267 6574 223a SFLOW = 0<br>
50: 2275 7365 7222 2c22-6465 7669 6365 223a DBL TAG = 0<br>
60: 6661 6c73 652c 2274-7970 6522 3a22 7573<br>
70: 6572 6261 6e6b 222c-2269 6422 3a22 3562<br>
Pri CPU MON SRC PType US BRD DAV SAV DPV SV ER TXA SAS Tag MVID<br>
0 0 0 12/4 3 0 0 0 1 1 0 0 0 0 1 0<br>
<br>
10.64.1.37 -> 10.64.1.26 UDP [36651 -> 8083] <br>
**********************************************************************<br>
<br>
<br>
_______________________________________________<br>
foundry-nsp mailing list<br>
<a href="mailto:foundry-nsp@puck.nether.net" target="_blank" rel="noreferrer">foundry-nsp@puck.nether.net</a><br>
<a href="http://puck.nether.net/mailman/listinfo/foundry-nsp" rel="noreferrer noreferrer" target="_blank">http://puck.nether.net/mailman/listinfo/foundry-nsp</a><br>
</blockquote></div>