Policing is very limited. It operates all-or-nothing on all the packets
arriving at an interface. There is no opportunity to parse the packet
and distinguish between VLANs or other fields.
You can do a form of QoS with meters, perhaps satisfying the rates that
you mention, but it operates on the
We managed to figure it out on our side. We have to explicitly make it so that
the compiler-rt library is included or else it just keeps throwing these
errors. This is the configuration we used.
./configure CC=clang --enable-Werror --disable-shared CFLAGS="-m32
-rtlib=compiler-rt -Wno-error=unu
Hi, I'm working with a simple topology with 2 hosts and an OVS. Host A uses
tcpreplay and a .pcap file ( multiple ip source addresses and host B's
address is the destination ) to act as a DDOS attack.
I want to know the number of packets that each ip source address sends to
host B within a period,
On Wed, Aug 21, 2019 at 6:47 PM Ben Pfaff wrote:
>
> On Tue, Aug 20, 2019 at 06:11:12PM -0700, Han Zhou wrote:
> > On Tue, Aug 20, 2019 at 4:57 PM Ben Pfaff wrote:
> > >
> > > Let me see if I'm following this correctly. This is what currently
> > > happens:
> > >
> > > - HV1 needs a MAC address