Falcon R-Class | User Guide
92
4.7.12.1
Leaky Bucket
The leaky-bucket algorithm is used to realize rate limiting (policing or shaping). A leaky bucket
provides a mechanism by which bursty traffic can be limited/shaped to present a steady stream of
traffic to the network
The dual leaky bucket implementation is named Two-rate Three Color Marker (TrTCM), for which
configuration attributes are assigned:
•
CIR: Committed Information Rate: the rate in bits-per-second which the Policer is committed to
pass through.
•
CBS: Committed Burst Size: the burst size in bytes, allowed for the committed bucket.
•
EIR: Excess Information Rate: the rate in bits-per-second which the Policer is allowing to pass
through when only excess resources are available.
•
EBS: Excess Burst Size: the burst size in bytes, allowed for the excess bucket.
Figure 4-61: Dual Leaky Bucket
Global Storm Policer Configuration
Storm control prevents traffic on a LAN from being overloaded by a broadcast, multicast, or
unknown-unicast storm. A LAN storm occurs when packets flood the LAN, creating excessive traffic
and degrading network performance. Errors in the protocol-stack implementation, mistakes in
network configuration, or users issuing a denial-of-service attack can cause a storm.
There is a unicast storm policer, multicast storm policer, and a broadcast storm policer. These only
affect flooded frames, i.e., frames with a (VLAN ID, DMAC) pair not present in the MAC Address table.
fra