On 11 April 2017 at 00:42,  <adamv0...@netconsultings.com> wrote:

> Nope ASR9k is using LPTS to cya :)

Some problems with LPTS

a) LPTS punted packets are not subject to MQC, so you cannot use
interface policers to limit say say ICMP, BGP etc
b) LPTS only has 'aggregate' (NPU) level policing, ddos-protection has
aggregate => ifd => ifl => sub
c) There is no log information of what is causing LPTS or XIPC to drop packets

All this means, for example if you have 'bad' and 'good' customer
sending you say BGP (or ICMP6, or what ever). Maybe 'bad' customer has
L2 loop, and accidentally offers line rate of BGP. This means that
your aggregate BGP policer, BGP-known @ 2500pps is congested. If your
'good' BGP is say 5pps and your 'bad' BGP is say 1.48Mpps, there is
99.5% probability that any given BGP through that NPU will time out
(1-(2500.0/1480010))**3).

If you manage to identify the culprit somehow (perhaps capturing NPU
counters), only thing you can do is add ACL to the offending interface
dropping all BGP packets, as ACL is subject to LPTS punted packets,
even though MQC is not. For obviously you cannot do this as
pre-emptive measure, so there is no proactive way to actually protect
the box today.
And some newer IOS-XR platforms don't implement LPTS at all, even
though you can configure it, it'll commit, and it may look casually
like it's doing something.

In summary LPTS is great out of the box, but impossible to configure
right. JunOS is terrible out of the box, but possible to configure
right, but no one does it, because it's too hard (I know I can't do it
for all cases, like DHCP snooping).

-- 
++ytti
_______________________________________________
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to