No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

The Traffic Through the Outgoing Interface of the NE80E as the Traffic Splitting Platform Is Far Less Than That Through the Incoming Interface

Publication Date:  2012-07-27 Views:  35 Downloads:  0
Issue Description
On the network, an NE80E acts as the traffic splitting platform, whose four 10 GB POS ports are the inbound interfaces carrying 8 GB traffic. No wrong packets exist on the POS ports. The NE80E also has a 10 GB port as the outbound interface. Only several bytes of traffic are transmitted through this port. No wrong packets exist on the Gigabit port. The problem is that the traffic through the outbound interface is far less than that through the inbound interface.
For the networking diagram, see the appendix. 
 
Alarm Information
Null
Handling Process
1. Configure an ACL rule. After the permit ip command is configured on the POS ports, collect the ACL matching statistics. It is found that no packet matches the rule.
2. Check the configuration on the POS ports of the peer equipment. It is found that the type of the POS ports is PPP. The type of the POS ports of the NE80E is HDLC.
3. Modify the POS type of the NE80E to PPP. Then the traffic through the outbound interface is equivalent to that through the inbound interface. 
 
Root Cause
1. The ACL rules configured on the NE80E filter the packets.
2. The type of the physical links to the POS ports is inconsistent with the configuration on the peer equipment. 
 
Suggestions
Generally, the inconsistency of the POS types between routers causes the ports to be unable to turn Up or large wrong packets on the ports. The equipment of the secure version collects the traffic of the two devices on the current network through the optical splitter. Even if the POS type of the traffic splitting platform is inconsistent with that of the peer equipment, data can be collected normally and the port data contains no wrong packets. Therefore, we cannot judge whether the POS type of the router of the secure version is consistent with that of the peer equipment by checking whether wrong packets exist on the port of this router. 

END