EasyManua.ls Logo

Cisco SCE2020-4XGBE-SM - SNMP Support for VAS; Interactions between VAS Traffic Forwarding and Other SCE Platform Features; Incompatible SCE Platform Features; VAS Traffic Forwarding and Ddos Processing

Cisco SCE2020-4XGBE-SM
512 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
12-15
Cisco SCE 2000 and SCE 1000 Software Configuration Guide
OL-7827-12
Chapter 12 Value Added Services (VAS) Traffic Forwarding
SNMP Support for VAS
SNMP Support for VAS
The following items in the “PCUBE-SE-MIB” proprietary MIB support VAS traffic forwarding:
SCE-MIB object: vasTrafficForwardingGrp SCE-MIB
Object type: vasServersTable - provides information on each VAS server operational status.
SNMP Trap: vasServerOperationalStatusChangeTrap - signifies that the agent entity has detected a
change in the operational status of a VAS server.
Interactions Between VAS Traffic Forwarding and Other SCE
Platform Features
Incompatible SCE Platform Features, page 12-15
VAS Traffic Forwarding and DDoS Processing, page 12-15
VAS Traffic Forwarding and Bandwidth Management, page 12-16
Incompatible SCE Platform Features
There are certain SCE platform features that are incompatible with VAS traffic forwarding. Before
enabling VAS traffic forwarding, it is the responsibility of the user to make sure that no incompatible
features or modes are configured.
The features and modes listed below cannot coexist with VAS mode:
Line-card connection modes — receive-only, receive-only-cascade, inline-cascade
Link mode other than forwarding
All link encapsulation protocols, including VLAN, MPLS, L2TP
Traffic mirroring (see Intelligent Traffic Mirroring, page 12-47)
VAS Traffic Forwarding and DDoS Processing
VAS traffic forwarding has minor effects on the DDoS mechanisms.
Specific IP DDoS Attack Detection, page 12-15
Specific IP Attack filter, page 12-16
Specific IP DDoS Attack Detection
The specific IP DDoS mechanism uses software counters. The second pass VAS packets do not reach the
software, so they are not counted twice.
Network side packets are handled by the attack-detector in the first pass, when they open a flow, so they
also are not counted twice.

Table of Contents

Related product manuals