RE: NBAR for Security Filtering

From: Martin, David (Contractor) (David.Martin@eu.dodea.edu)
Date: Thu Dec 16 2004 - 11:37:10 GMT-3


HI Chuck and Chris,

Thankyou both. How will I know when its being dropped ? I assume the output
q count will be zero ?

See both below I and O below:

Scott CPU is around 4%, not too bad.

Here is input q:
UK-DSO#sh policy-map interface input
 FastEthernet0/0

  Service-policy input: drop_p2p

    Class-map: p2p (match-any)
      3125 packets, 1050172 bytes
      5 minute offered rate 0 bps, drop rate 0 bps
      Match: protocol fasttrack
        312 packets, 20720 bytes
        5 minute rate 0 bps
      Match: protocol gnutella
        1840 packets, 594172 bytes
        5 minute rate 0 bps
      Match: protocol edonkey
        451 packets, 402042 bytes
        5 minute rate 0 bps
      Match: protocol kazaa2
        0 packets, 0 bytes
        5 minute rate 0 bps
      Match: protocol napster
        494 packets, 31004 bytes
        5 minute rate 0 bps
      Match: protocol irc
        0 packets, 0 bytes
        5 minute rate 0 bps
      Match: protocol cuseeme
        0 packets, 0 bytes
        5 minute rate 0 bps
      police:
          cir 1000000 bps, bc 31250 bytes, be 31250 bytes
        conformed 3124 packets, 1050110 bytes; actions:
          drop
        exceeded 0 packets, 0 bytes; actions:
          drop
        violated 0 packets, 0 bytes; actions:
          drop
        conformed 0 bps, exceed 0 bps, violate 0 bps

    Class-map: class-default (match-any)
      55326852 packets, 14325915882 bytes
      5 minute offered rate 207000 bps, drop rate 0 bps
      Match: any



This archive was generated by hypermail 2.1.4 : Mon Jan 03 2005 - 10:31:27 GMT-3