by Ben on Wed Oct 13, 2004 6:51 am
Here is some info I got from technical support:
This filter will only kick in when the shaper is overloaded, we drop enough packets to resolve the overload condition.
To control this filtering you'll need to modify the following sys sets.
PacketShaper# sys set shed
System values Current Default Min Max
=========================================================================
loadSheddingClientFPM 1000000 1000000 10 1000000
loadSheddingEnable 0 0 0 1
loadSheddingNewFlowsOnly 1 1 0 1
loadSheddingTCBConn 100 100 5 1000000
loadSheddingUCBConn 100 100 5 1000000
To enable the feature you need to issue the following CLI command:
sys set loadSheddingEnable 1 "loadSheddingNewFlowsOnly" by default is set to only drop new flows, this is recommended.
loadSheddingClientFPM is the threshold you'll need to modify, it work with loadSheddingTCBConn (for TCP flows) or loadSheddingUCBConn (for UDP traffic). If you set this threshold at a given value, say xxx, it instructs the PacketShaper to drop all new flows from the hosts that are generating more than xxx new Flows per Minute and have more than 100 established flows (100 is the default value for loadShedding TCBConn, UCBConn).
For example, if you set ...ClientFPM to 300, the Shaper will drop all new flows from the hosts that are exceeding 300 new flows per minute and have 100 established flows. The number you should configure for this variable depends on your network/application requirements.
You can modify loadSheddingClientFPM, loadSheddingTCBConn and loadSheddingUCBConn to values that suit your network. Suggested starting point maybe 300, 100, 100.
You should start by monitoring the "host info -sf -n 20" command output and check the number of existing flows and new flows per minute from the hosts that you suspect are infected. Once you have a trend, you should then configure the sys set values based on your findings and re-check the results, verify impact on network...