Hey Ross,

> The low-end MXes can do a lot of things, but that doesn't mean you SHOULD 
> necessarily do them. Anything CPU-heavy is a good example. Convergence time 
> on three full feeds takes about 10-15 minutes in my experience, say in the 
> case a major upstream drops. This isn't a big deal for everyone and for my 
> employer certainly not enough to justify a bigger box on its own. One of the 
> platform's strengths is also its weakness, in that the MX104 is essentially 
> fabricless. Each of the "PIC" slots is a carved out chunk of a single 
> forwarding engine. This is why they're limited to the 2-XFP MICs for 10 GbE 
> options, unlike bigger MXes that take MICs with a much greater port density 
> and support more than 4 SFP+es. This is also why you have things that will 
> affect the entire chassis at once, such as one of my favourite optics bug 
> (plug in an SFP too slowly and all SFPs reset) and the DDoS Protection 
> feature (blackholes an entire class of traffic on ALL ports). They are not 
> suitable for core use for 
 th

DDoS protection out-of-the-box is for all practical purposes not
configured at all, which is unfortunate as that is what most people
run. When configured correctly Trio has best CoPP I know of in the
market, certainly better than Cisco or Arista have.

DDoS protection has many levels 1. aggregate 2. per-npu 3.
per-physical-interface 4. per-logical-interface 5. per-subscriber
(session).

5. is dubious, as it's easy to congest the policer counts (Attacker
changes SPORT). But 3-4 should protect you from issue you describe. If
you limit each IFL or IFD, then single IFL or IFD won't congest whole
NPU, and having for example BGP down in the IFL which is violating the
BGP policer is entirely acceptable.

-- 
  ++ytti
_______________________________________________
juniper-nsp mailing list [email protected]
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to