No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.

Knowledge Base

The Traffic Through the Outgoing Interface of the NE80E as the Traffic Splitting Platform Is Far Less Than That Through the Incoming Interface

Publication Date:  2012-07-27  |   Views:  167  |   Downloads:  0  |   Author:  SU1001580650  |   Document ID:  EKB0000358625


Issue Description

On the network, an NE80E acts as the traffic splitting platform, whose four 10 GB POS ports are the inbound interfaces carrying 8 GB traffic. No wrong packets exist on the POS ports. The NE80E also has a 10 GB port as the outbound interface. Only several bytes of traffic are transmitted through this port. No wrong packets exist on the Gigabit port. The problem is that the traffic through the outbound interface is far less than that through the inbound interface.
For the networking diagram, see the appendix. 

Alarm Information


Handling Process

1. Configure an ACL rule. After the permit ip command is configured on the POS ports, collect the ACL matching statistics. It is found that no packet matches the rule.
2. Check the configuration on the POS ports of the peer equipment. It is found that the type of the POS ports is PPP. The type of the POS ports of the NE80E is HDLC.
3. Modify the POS type of the NE80E to PPP. Then the traffic through the outbound interface is equivalent to that through the inbound interface. 

Root Cause

1. The ACL rules configured on the NE80E filter the packets.
2. The type of the physical links to the POS ports is inconsistent with the configuration on the peer equipment. 


Generally, the inconsistency of the POS types between routers causes the ports to be unable to turn Up or large wrong packets on the ports. The equipment of the secure version collects the traffic of the two devices on the current network through the optical splitter. Even if the POS type of the traffic splitting platform is inconsistent with that of the peer equipment, data can be collected normally and the port data contains no wrong packets. Therefore, we cannot judge whether the POS type of the router of the secure version is consistent with that of the peer equipment by checking whether wrong packets exist on the port of this router.