<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Purpose of the 'cos flood-ctrl' command set in FAQs</title>
    <link>https://community.extremenetworks.com/t5/faqs/purpose-of-the-cos-flood-ctrl-command-set/m-p/48015#M499</link>
    <description>Article ID: 16074 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
7100-Series&lt;BR /&gt;
S-Series&lt;BR /&gt;
Matrix N-Series DFE&lt;BR /&gt;
K-Series&lt;BR /&gt;
I-Series&lt;BR /&gt;
G-Series&lt;BR /&gt;
D-Series&lt;BR /&gt;
C5, C3, C2-Series&lt;BR /&gt;
B5, B3, B2-Series&lt;BR /&gt;
A4-Series &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Changes&lt;/B&gt;&lt;BR /&gt;
Implemented the '&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;cos ... flood-ctrl&lt;/PRE&gt;&lt;/DIV&gt;' command set - this does not require licensing - in order to limit the ingress of what is perceived to be a flood of excess traffic from the network. &lt;BR /&gt;
&lt;BR /&gt;
For example:&lt;UL&gt;&lt;PRE&gt;#cos state&lt;/PRE&gt; 
&lt;PRE&gt;set cos state enable&lt;/PRE&gt; 
&lt;PRE&gt;!&lt;/PRE&gt; 
&lt;PRE&gt;#cos port-config&lt;/PRE&gt; 
&lt;PRE&gt;set cos port-config flood-ctrl 1.0 ports ge.1.10;ge.1.13 append&lt;/PRE&gt; 
&lt;PRE&gt;!&lt;/PRE&gt; 
&lt;PRE&gt;#cos port-resource&lt;/PRE&gt; 
&lt;PRE&gt;set cos port-resource flood-ctrl 1.0 unicast rate 5&lt;/PRE&gt; 
&lt;PRE&gt;set cos port-resource flood-ctrl 1.0 multicast rate 5&lt;/PRE&gt; 
&lt;PRE&gt;set cos port-resource flood-ctrl 1.0 broadcast rate 5&lt;/PRE&gt;&lt;/UL&gt;
&lt;B&gt;Symptoms&lt;/B&gt;&lt;BR /&gt;
The applied Flood Control configuration has no discernable limiting effect on the volume of incoming traffic. &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Cause&lt;/B&gt;&lt;BR /&gt;
The &lt;A href="http://extranet.enterasys.com/downloads" target="_blank" rel="nofollow noreferrer noopener"&gt;Configuration/CLI Guides&lt;/A&gt; outline the purpose of the Flood Control feature as follows:&lt;UL&gt; 
&lt;PRE&gt;CoS-based flood control prevents configured ports from being disrupted by a traffic storm by rate limiting specific types of packets through those ports. When flood control is enabled on a port, incoming traffic is monitored over one second intervals. During an interval, the incoming traffic rate for each configured traffic type (unicast, broadcast, or multicast) is compared with the configured traffic flood control rate, specified in packets per second. If, during a one second interval, the incoming traffic of a configured type reaches the traffic flood control rate configured on the port, CoS-based flood control drops the traffic until the interval ends. Packets are then allowed to flow again until the limit is again reached.&lt;/PRE&gt;&lt;/UL&gt;
What is not made fully clear in the Configuration and CLI Guides but is made slightly clearer in &lt;A href="http://extranet.enterasys.com/downloads" target="_blank" rel="nofollow noreferrer noopener"&gt;Release Notes&lt;/A&gt;... &lt;BR /&gt;
    (7100/S/N/K-Series: "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;Support for Flood-Limiting controls for Broadcast,&lt;/PRE&gt;&lt;/DIV&gt; &lt;BR /&gt;
      &lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;Multicast, and Unknown Unicast per port.&lt;/PRE&gt;&lt;/DIV&gt;") &lt;BR /&gt;
    (I/G/D/C/B/A-Series: "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;CoS MIB based Flood Control (broadcast, multicast,&lt;/PRE&gt;&lt;/DIV&gt; &lt;BR /&gt;
      &lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;and unknown unicast)&lt;/PRE&gt;&lt;/DIV&gt;") &lt;BR /&gt;
        ...is that the Flood Control feature is intended to act only upon egress-port-flooded traffic which has been forwarded via the CPU-based "soft path" rather than having been forwarded more efficiently via hardware. Such soft-forwarded traffic otherwise has the potential to contribute to poor throughput performance and high CPU utilization. Broadcast traffic is always flooded, multicast traffic is flooded only when not scoped by IGMP Snooping ('&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;set igmpsnooping...&lt;/PRE&gt;&lt;/DIV&gt;') or Static Multicast MAC configuration ('&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;set mac multicast...&lt;/PRE&gt;&lt;/DIV&gt;'), and unicast traffic is flooded whenever the destination MAC address has not been learned for the ingress VLAN (see the IVL/SVL discussion in &lt;A href="http://bit.ly/1iwHISK" target="_blank" rel="nofollow noreferrer noopener"&gt;4918&lt;/A&gt;). &lt;BR /&gt;
&lt;BR /&gt;
The Flood Control feature is assigned to traffic upon its ingress to the configured port(s), but only potentially takes effect upon CPU-flooded traffic before such traffic is - or would have been - forwarded by the CPU to one or more egress ports. If the traffic has no appreciable flooded element to it, then no rate-limiting effect will be observed.&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Solution&lt;/B&gt;&lt;BR /&gt;
If the intent is to broadly rate-limit traffic, this is most typically implemented using Policy-based inbound rate-limiting, outbound rate-limiting, and/or outbound rate shaping (&lt;A href="http://bit.ly/1b34pny" target="_blank" rel="nofollow noreferrer noopener"&gt;11667&lt;/A&gt;) - depending upon design requirements and product hardware/firmware support. For products not supporting Policy either by design (A2-Series) or in the absence of a required policy license (D, B3, B2-Series), then DiffServ may be used instead (&lt;A href="http://bit.ly/18F0WPL" target="_blank" rel="nofollow noreferrer noopener"&gt;5848&lt;/A&gt;) for outbound rate-limiting. &lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="http://www.enterasys.com/support/contact-support.aspx" target="_blank" rel="nofollow noreferrer noopener"&gt;Contact the GTAC&lt;/A&gt; for further assistance, as necessary.</description>
    <pubDate>Sat, 04 Jan 2014 03:02:00 GMT</pubDate>
    <dc:creator>FAQ_User</dc:creator>
    <dc:date>2014-01-04T03:02:00Z</dc:date>
    <item>
      <title>Purpose of the 'cos flood-ctrl' command set</title>
      <link>https://community.extremenetworks.com/t5/faqs/purpose-of-the-cos-flood-ctrl-command-set/m-p/48015#M499</link>
      <description>Article ID: 16074 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
7100-Series&lt;BR /&gt;
S-Series&lt;BR /&gt;
Matrix N-Series DFE&lt;BR /&gt;
K-Series&lt;BR /&gt;
I-Series&lt;BR /&gt;
G-Series&lt;BR /&gt;
D-Series&lt;BR /&gt;
C5, C3, C2-Series&lt;BR /&gt;
B5, B3, B2-Series&lt;BR /&gt;
A4-Series &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Changes&lt;/B&gt;&lt;BR /&gt;
Implemented the '&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;cos ... flood-ctrl&lt;/PRE&gt;&lt;/DIV&gt;' command set - this does not require licensing - in order to limit the ingress of what is perceived to be a flood of excess traffic from the network. &lt;BR /&gt;
&lt;BR /&gt;
For example:&lt;UL&gt;&lt;PRE&gt;#cos state&lt;/PRE&gt; 
&lt;PRE&gt;set cos state enable&lt;/PRE&gt; 
&lt;PRE&gt;!&lt;/PRE&gt; 
&lt;PRE&gt;#cos port-config&lt;/PRE&gt; 
&lt;PRE&gt;set cos port-config flood-ctrl 1.0 ports ge.1.10;ge.1.13 append&lt;/PRE&gt; 
&lt;PRE&gt;!&lt;/PRE&gt; 
&lt;PRE&gt;#cos port-resource&lt;/PRE&gt; 
&lt;PRE&gt;set cos port-resource flood-ctrl 1.0 unicast rate 5&lt;/PRE&gt; 
&lt;PRE&gt;set cos port-resource flood-ctrl 1.0 multicast rate 5&lt;/PRE&gt; 
&lt;PRE&gt;set cos port-resource flood-ctrl 1.0 broadcast rate 5&lt;/PRE&gt;&lt;/UL&gt;
&lt;B&gt;Symptoms&lt;/B&gt;&lt;BR /&gt;
The applied Flood Control configuration has no discernable limiting effect on the volume of incoming traffic. &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Cause&lt;/B&gt;&lt;BR /&gt;
The &lt;A href="http://extranet.enterasys.com/downloads" target="_blank" rel="nofollow noreferrer noopener"&gt;Configuration/CLI Guides&lt;/A&gt; outline the purpose of the Flood Control feature as follows:&lt;UL&gt; 
&lt;PRE&gt;CoS-based flood control prevents configured ports from being disrupted by a traffic storm by rate limiting specific types of packets through those ports. When flood control is enabled on a port, incoming traffic is monitored over one second intervals. During an interval, the incoming traffic rate for each configured traffic type (unicast, broadcast, or multicast) is compared with the configured traffic flood control rate, specified in packets per second. If, during a one second interval, the incoming traffic of a configured type reaches the traffic flood control rate configured on the port, CoS-based flood control drops the traffic until the interval ends. Packets are then allowed to flow again until the limit is again reached.&lt;/PRE&gt;&lt;/UL&gt;
What is not made fully clear in the Configuration and CLI Guides but is made slightly clearer in &lt;A href="http://extranet.enterasys.com/downloads" target="_blank" rel="nofollow noreferrer noopener"&gt;Release Notes&lt;/A&gt;... &lt;BR /&gt;
    (7100/S/N/K-Series: "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;Support for Flood-Limiting controls for Broadcast,&lt;/PRE&gt;&lt;/DIV&gt; &lt;BR /&gt;
      &lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;Multicast, and Unknown Unicast per port.&lt;/PRE&gt;&lt;/DIV&gt;") &lt;BR /&gt;
    (I/G/D/C/B/A-Series: "&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;CoS MIB based Flood Control (broadcast, multicast,&lt;/PRE&gt;&lt;/DIV&gt; &lt;BR /&gt;
      &lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;and unknown unicast)&lt;/PRE&gt;&lt;/DIV&gt;") &lt;BR /&gt;
        ...is that the Flood Control feature is intended to act only upon egress-port-flooded traffic which has been forwarded via the CPU-based "soft path" rather than having been forwarded more efficiently via hardware. Such soft-forwarded traffic otherwise has the potential to contribute to poor throughput performance and high CPU utilization. Broadcast traffic is always flooded, multicast traffic is flooded only when not scoped by IGMP Snooping ('&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;set igmpsnooping...&lt;/PRE&gt;&lt;/DIV&gt;') or Static Multicast MAC configuration ('&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;set mac multicast...&lt;/PRE&gt;&lt;/DIV&gt;'), and unicast traffic is flooded whenever the destination MAC address has not been learned for the ingress VLAN (see the IVL/SVL discussion in &lt;A href="http://bit.ly/1iwHISK" target="_blank" rel="nofollow noreferrer noopener"&gt;4918&lt;/A&gt;). &lt;BR /&gt;
&lt;BR /&gt;
The Flood Control feature is assigned to traffic upon its ingress to the configured port(s), but only potentially takes effect upon CPU-flooded traffic before such traffic is - or would have been - forwarded by the CPU to one or more egress ports. If the traffic has no appreciable flooded element to it, then no rate-limiting effect will be observed.&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Solution&lt;/B&gt;&lt;BR /&gt;
If the intent is to broadly rate-limit traffic, this is most typically implemented using Policy-based inbound rate-limiting, outbound rate-limiting, and/or outbound rate shaping (&lt;A href="http://bit.ly/1b34pny" target="_blank" rel="nofollow noreferrer noopener"&gt;11667&lt;/A&gt;) - depending upon design requirements and product hardware/firmware support. For products not supporting Policy either by design (A2-Series) or in the absence of a required policy license (D, B3, B2-Series), then DiffServ may be used instead (&lt;A href="http://bit.ly/18F0WPL" target="_blank" rel="nofollow noreferrer noopener"&gt;5848&lt;/A&gt;) for outbound rate-limiting. &lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="http://www.enterasys.com/support/contact-support.aspx" target="_blank" rel="nofollow noreferrer noopener"&gt;Contact the GTAC&lt;/A&gt; for further assistance, as necessary.</description>
      <pubDate>Sat, 04 Jan 2014 03:02:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/faqs/purpose-of-the-cos-flood-ctrl-command-set/m-p/48015#M499</guid>
      <dc:creator>FAQ_User</dc:creator>
      <dc:date>2014-01-04T03:02:00Z</dc:date>
    </item>
  </channel>
</rss>

