sysmon task-threshold
The threshold time is configured using the global configuration command
sysmon task-threshold <time>
for the active
MP and all LPs, and will be available across resets.
Syntax
sysmon task-threshold
time
no sysmon task-threshold
time
Used to unconfigure the threshold value.
Parameters
time
Sets the
threshold-time
in milliseconds.
Modes
Global configuration
Examples
The following configuration example configures the
task-threshold
to default 60ms:
device(config)#sysmon task-threshold 60
Task threshold-time is set to default value 60ms.
The following configuration example sets the
task-threshold
to 50ms:
device(config)#sysmon task-threshold 50
Task threshold-time is set to 50ms.
When hold time exceeds the configured threshold, i.e. 20ms for sfm_mgr task, the below syslog gets generated:
Nov 26 14:12:11:I:System: High CPU condition on MP, task name=sfm_mgr, max hold time=29ms, count =11
Nov 26 14:07:11:I:System: High CPU condition on MP, task name=sfm_mgr, max hold time=29ms, count =1
History
Release version
Command history
R05.8.00
This command was introduced.
MLXe BR-MLX-10Gx4-M IPsec and IKEv2
NetIron MLXe is located on the perimeter of connections to external networks. Encryption and decryption is supported for IPv4 unicast
data and control packets transmitted or received from external networks, using IPSec FPGA and IKEv2 protocols for the MLXe BR-
MLX-10Gx4-M-IPSEC.
The Public Key Infrastructure (PKI) provides a security infrastructure for secure communication. Each PKI peer holds a Digital Certificate
which holds multiple attributes that ensure the entity can be trusted, and can support secure communication.
•
IPSec FPGA protocol for the MLXe BR-MLX-10Gx4-M-IPSEC provides hardware based data encryption and decryption.
•
IKEv2 protocol for the MLXe BR-MLX-10Gx4-M-IPSEC is used to setup and manage secure tunnels across external
networks.
PKI uses the asymmetric encryption algorithm; two different keys are used to encrypt and decrypt data. The key pair consists of a private
key and a public key. The private key must be kept secret, while the public key can be distributed. Data encrypted by one of the two keys
can only be decrypted by the other. Data encrypted with a public key cannot be decrypted using a public key and vice versa. Users of a
public key are confident that the associated private key is owned by the correct remote subject.
Router modules
Brocade NetIron MLXe Series Hardware Installation Guide
53-1004203-04
45
Summary of Contents for NetIron MLXe Series
Page 8: ...Brocade NetIron MLXe Series Hardware Installation Guide 8 53 1004203 04...
Page 12: ...Brocade NetIron MLXe Series Hardware Installation Guide 12 53 1004203 04...
Page 20: ...Brocade NetIron MLXe Series Hardware Installation Guide 20 53 1004203 04...
Page 192: ...Brocade NetIron MLXe Series Hardware Installation Guide 192 53 1004203 04...
Page 270: ...Brocade NetIron MLXe Series Hardware Installation Guide 270 53 1004203 04...
Page 286: ...Brocade NetIron MLXe Series Hardware Installation Guide 286 53 1004203 04...
Page 292: ...Brocade NetIron MLXe Series Hardware Installation Guide 292 53 1004203 04...