Leaflet

81
OL-11615-01
Static sharing of a rate limiter with another pre-configured rate limiter—When there are not enough
adjacency-based rate limiters available, you can share a rate limiter with a pre-configured rate
limiter (target rate limiter). This example shows how to share the route-cntl rate limiter with the
default-drop target rate limiter:
Router(config)# mls rate-limit multicast ipv6 route-cntl share default-drop
If the target rate limiter is not configured, a message is displayed that indicates that the target rate
limiter must be configured for it to be shared with other rate limiters.
Dynamic sharing of rate limiters—If you are unsure about which rate limiter you should share with,
use the share auto keywords to enable dynamic sharing. When you enable dynamic sharing, the
system selects a pre-configured rate limiter and shares the given rate limiter with the pre-configured
rate limiter. This example shows how to choose dynamic sharing for the route-cntrl rate limiter:
Router(config)# mls rate-limit multicast ipv6 route-cntl share auto
This example shows how to set the rate limiters for the IPv6 multicast packets from a directly connected
source:
Router(config)# mls rate-limit multicast ipv6 connected 1500 20
This example shows how to configure a direct association of the rate limiters for a traffic class:
Router(config)# mls rate-limit multicast ipv6 default-drop 1000 20
This example shows how to configure the static sharing of a rate limiter with another pre-configured rate
limiter:
Router(config)# mls rate-limit multicast ipv6 route-cntl share default-drop
This example shows how to enable dynamic sharing for the route control rate limiter:
Router(config)# mls rate-limit multicast ipv6 route-cntl share auto
For more information on the mls rate-limit multicast ipv6 command, refer to the following URL:
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/122sx/cmdref/m1.htm#wp1719870
Routing Protocol and ARP Policing
The Catalyst 6500 Series switches provide specific hardware-based policing mechanisms that can rate
limit routing protocols and ARP packets destined to the switch. These mechanisms help protect the
switch from DoS attacks based on ARP, BGP, EIGRP, IGRP, ISIS, LDP, ND, OSPF, and RIP packets.
Note The routing protocol and ARP policers not only police traffic destined for the switch, but also traffic
crossing the switch.
This rate limiter is disabled by default. When enabled, the rate burst is automatically set to 1000 bits per
second. To set the routing protocol and ARP policing, use the mls qos protocol global configuration
command.
Router(config)# mls qos protocol
protocol-name
{pass-through | {police
rate burst
} |
{precedence
value
[police
rate burst]
}}
This example shows how to define the routing-protocol packet policing:
Router(config)# mls qos protocol arp police 43000
For more information on the mls qos protocol command, refer to the following URL: