background image

Page 9 | AlliedWare™ OS How To Note: Hardware Filters

How many filters can you create?

The following figure shows the copies of these rules.

When a QoS policy has been applied to ports 4 and 5, all the hardware filter rules have to be 
replicated further down in the rule table, and the QoS-specific rules added to the table below 
this copy of the hardware filter rules. For ports 4 and 5, the rule comparison process starts 
at entry 9 in the rule table, not at entry 

1

.

The entries 5-8 in the table have been left blank because separate sets of rules in the rule 
table must begin at an 8-entry boundary. 

So, if there are several QoS policies configured on the switch, then there will be several 
copies of the hardware filter rules within the rule table. This, of course, can significantly 
reduce the maximum number of hardware filters that can be created.

Also, the protocols that use filters (see 

page 11

) create at least one entry each.

2. The profile (mask)

The other item that affects the number of filters you can create is called the profile. 
Conceptually, this is a 

1

6-byte mask that decides which set of bytes should be extracted from 

a packet as it enters the filtering process, to be compared against all the hardware filter and 
QoS classifiers. Hardware filters and QoS share a single mask.

In effect, the mask is the sum of all the individual bytes required for each individual classifier 
parameter. The number of bytes required by each classifier parameter depends on what fields 
it maps on. For example:

source MAC address—6 bytes

destination MAC address—6 bytes

Port

Start

1

Rule 

1

1

1

2

Rule 2

2

1

3

Rule 3

3

1

4

Rule 4

4

9

5

5

9

6

6

1

7

...

...

8

...

...

9

Copy of rule 

1

1

0

Copy of rule 2

11

Copy of rule 3

1

2

Copy of rule 4

1

3

QoS rule #

1

52

1

1

4

QoS rule #2

Table that maps ingress port 

to the starting point of the 

rule comparison process

Rule table

Содержание AT-9900 Series

Страница 1: ...he throughput of the switch It is possible to configure over 1000 different filters and still have complete wire speed throughput on the switch The following configuration methods are available 1 To f...

Страница 2: ...en combining QoS and hardware filters 8 2 The profile mask 9 Are there enough bytes for your set of filters 10 Some protocols also use filters so use some of the length 11 How to see the current filte...

Страница 3: ...B DIAg NLSp IPXwan ipxsocketnum ANY TCPSport portid port range ANY TCPDport portid port range ANY UDPSport portid port range ANY UDPDport portid port range ANY L4SMask mask L4DMask mask L5BYTE01 byteo...

Страница 4: ...ote see page 13 Note The default value of each mask is FFFF This means that if you specify a port number without specifying a mask then the classifier matches only that one value of the port number Th...

Страница 5: ...hey will all be treated like core ports if at least one of the ports is a core port Creating hardware filters Once you have created a classifier create a filter The filter uses the classifier and spec...

Страница 6: ...matches the packets in the stream and specify copy discard for the action setl2qos Note that this action has the other parameters associated with it as the following syntax shows add switch hwfilter f...

Страница 7: ...cket as if it belongs to the default traffic class for the port s QoS policy For this reason we only recommend combining hardware filters and QoS if all your hardware filters result in traffic being d...

Страница 8: ...an be configured on different ports So the rules for allocating packet to flow groups can differ from port to port Hence QoS can result in the rule table containing different sets of rules for differe...

Страница 9: ...filters that can be created Also the protocols that use filters see page 11 create at least one entry each 2 The profile mask The other item that affects the number of filters you can create is called...

Страница 10: ...already matches on those fields If you next make a hardware filter that matches on source UDP port this also does not add any length to the mask because it shares the same 2 bytes as the source TCP po...

Страница 11: ...n IP address destination TCP UDP port 6 6 1 4 2 19 bytes Some protocols also use filters so use some of the length The following protocols use filters and therefore use up some of the available profil...

Страница 12: ...one block on the base system for packets arriving in via any other port z one block allocated on the IPv6 accelerator Number of rules per application MLD Snooping 4 Accel Card IPv6 1 Switch HwFilter 2...

Страница 13: ...they are both 1 then the result is 1 otherwise the result is 0 Let s look at some examples Profile 1 IPv4 bytes used 3 of 16 Other Eth bytes used 5 of 16 Profile used to match on packets z Number of b...

Страница 14: ...choose the number of the ports as 4 power of 2 to simplify the example Before going into the complex examples there are some points to remember for the L4 mask calculation z if the beginning port is...

Страница 15: ...drop Example 3 ports 333 777 A more complex situation let s try to write the classifiers for UDP ports between 333 777 As we are trying to get rid of odd numbers in the beginning of our port range we...

Страница 16: ...ed 2 x 2 blocks one at the start classifier 2 and one at the end classifier 8 256 384 383 511 Port range Number of ports Command 333 334 335 336 351 352 383 384 511 512 767 768 775 776 777 1 2 16 32 1...

Страница 17: ...12288 24576 49152 4096 8192 16384 32768 65536 5120 10240 20480 40960 6144 12288 24576 49152 7168 14336 28672 57344 8192 16384 32768 65536 9216 18432 36864 10240 20480 40960 11264 22528 45056 12288 245...

Страница 18: ...ts reserved Information in this document is subject to change without notice All company names logos and product designs that are trademarks or registered trademarks are the property of their respecti...

Отзывы: