Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation

Supported Platforms

Configuring How Traffic in a Culprit Flow Is Controlled at Each Flow Aggregation Level

When flow detection is enabled, all traffic in a culprit flow is dropped by default for all protocol groups and packet types and at all flow aggregation levels. You can include the flow-level-control statement to configure flow detection to control traffic differently for individual packet types. You have to specify the control behavior at a particular flow aggregation level: subscriber, logical interface, or physical interface.

You can configure flow detection flow control to employ one of the following modes for a packet type:

  • Drop all traffic—Configure flow control to drop all traffic when you think the flow that is violating a bandwidth limit is malicious. This behavior is the default at all flow aggregation levels.
  • Police traffic—Configure flow control to police a flow that is violating bandwidth, forcing the rate below the bandwidth limit. Flow control acts as a simple policer in this case.
  • Keep all traffic—Configure flow control to keep all traffic whether the flow is in violation or below the bandwidth limit. This mode is helpful when you need to debug traffic flow for your network.

Flow control mode enables great flexibility in how you manage control traffic in your network. For example, if you only want to ensure that control flows for a packet type at all aggregation levels are within their limits, you can configure flow control to police the traffic at each level. Or if you want to detect culprit flows and suppress them at one level but only restrain traffic to the allowed bandwidth at another level, you can configure one level to drop all traffic and the other to police traffic.

To configure how flow detection controls traffic in a culprit flow:

  1. (Optional) Specify the control mode at the subscriber level.
    [edit system ddos-protection protocols protocol-group packet-type scfd flow-level-control]user@host# set subscriber flow-control-mode
  2. (Optional) Specify the control mode at the logical interface level.
    [edit system ddos-protection protocols protocol-group packet-type scfd flow-level-control]user@host# set logical-interface flow-control-mode
  3. (Optional) Specify the control mode at the physical interface level.
    [edit system ddos-protection protocols protocol-group packet-type scfd flow-level-control]user@host# set physical-interface flow-control-mode

For example, to configure flow detection to keep all traffic for a physical interface under the configured bandwidth, but detect and suppress culprit flows at the subscriber level:

[edit system ddos-protection protocols dhcpv4 discover]user@host# edit flow-level-controluser@host# set subscriber dropuser@host# set physical-interface policeuser@host# edit flow-level-detectionuser@host# set logical-interface off

In this example, you do not care about the logical interface, so flow detection is turned off for that level. Because flow detection is disabled, the state of flow control for that level does not matter.

Published: 2012-12-11

Supported Platforms

Published: 2012-12-11