![Nortel SMC 2450 Implementation Manual Download Page 54](http://html1.mh-extra.com/html/nortel/smc-2450/smc-2450_implementation-manual_1706451054.webp)
Page 54 of 260
Description
553-3001-225
Standard 1.00
May 2006
fingerprints can be difficult. If the SMC initially sets the phone fingerprints,
the new fingerprint overwrites both fingerprint locations. A subsequent
fingerprint update modifies only one of the fingerprints, thereby leaving two
different fingerprints that can be specified uniquely for the primary and
secondary devices.
Note:
Nortel recommends that both SMC clusters share the same private
key, and hence fingerprint, in a geographically redundant configuration.
Engineering impact and limitations
Buffering
Buffering and moving larger packets and small packet performance could be
a limitation for high-end systems. Nortel estimates that the hardware provides
at least 100 megabytes (MByte) throughput for 100 byte packets or 125 kilo
packets per second (Kpps). This is sufficient to support more than 1000
concurrent calls, assuming 50 to 100 pps/call.
Security log rate limiting
In the following circumstances, the security and firewall logs can use many
system resources and degrade performance:
•
logging is turned on for a rule that processes many packets per second
•
the SMC is installed in an environment where there is much additional
traffic that is not handled by the current rules and logging is turned on for
unavailable messages
•
the SMC is under certain types of attacks
•
a message is logged for every packet
These circumstances can degrade the performance of the SMC. Modifying
logging configuration can help to overcome these issues. For more
information, see “Logging” on
page 207
.
Summary of Contents for SMC 2450
Page 2: ......
Page 4: ...Page 4 of 260 Revision history 553 3001 225 Standard 1 00 May 2006...
Page 10: ...Page 10 of 260 Contents 553 3001 225 Standard 1 00 May 2006 Format 251 Log message table 253...
Page 16: ...Page 16 of 260 List of procedures 553 3001 225 Standard 1 00 May 2006...
Page 20: ...Page 20 of 260 About this document 553 3001 225 Standard 1 00 May 2006...
Page 56: ...Page 56 of 260 Description 553 3001 225 Standard 1 00 May 2006...
Page 76: ...Page 76 of 260 Hardware installation 553 3001 225 Standard 1 00 May 2006...
Page 120: ...Page 120 of 260 Firewall deployment 553 3001 225 Standard 1 00 May 2006...
Page 160: ...Page 160 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006...
Page 182: ...Page 182 of 260 Maintenance 553 3001 225 Standard 1 00 May 2006...
Page 196: ...Page 196 of 260 The Command Line Interface CLI 553 3001 225 Standard 1 00 May 2006...
Page 212: ...Page 212 of 260 Logging 553 3001 225 Standard 1 00 May 2006...
Page 250: ...Page 250 of 260 Appendix D Software licenses 553 3001 225 Standard 1 00 May 2006...
Page 260: ...Page 260 of 260 Appendix E SMC packet filter log messages 553 3001 225 Standard 1 00 May 2006...
Page 261: ......