About CoPP
Control Plane Policing (CoPP) protects the control plane and separates it from the data plane, which ensures network stability, reachability, and packet delivery.
This feature allows a policy map to be applied to the control plane. This policy map looks like a normal QoS policy and is applied to all traffic entering the switch from a non-management port. A common attack vector for network devices is the denial-of-service (DoS) attack, where excessive traffic is directed at the device interfaces.
The Cisco NX-OS device provides CoPP to prevent DoS attacks from impacting performance. Such attacks, whether inadvertent or malicious, typically involve high rates of traffic directed to the supervisor module or CPU.
The supervisor module divides the traffic that it manages into three functional components or planes:
-
Data plane—Handles all the data traffic. The basic functionality of a Cisco NX-OS device is to forward packets from one interface to another. The packets that are not meant for the switch itself are called the transit packets. These packets are handled by the data plane.
-
Control plane—Handles all routing protocol control traffic. These protocols, such as the Border Gateway Protocol (BGP) and the Open Shortest Path First (OSPF) Protocol, send control packets between devices. These packets are destined to router addresses and are called control plane packets.
-
Management plane—Runs the components meant for Cisco NX-OS device management purposes such as the command-line interface (CLI) and Simple Network Management Protocol (SNMP).
The supervisor module has both the management plane and control plane and is critical to the operation of the network. Any disruption or attacks to the supervisor module will result in serious network outages. Excessive traffic to the supervisor module could overload and slow down the performance of the entire Cisco NX-OS device. Additionally, a DoS attack on the supervisor module could generate IP traffic streams to the control plane at a very high rate. This would force the control plane to spend significant time handling these packets and prevent it from processing genuine traffic.
Examples of DoS attacks include:
-
Internet Control Message Protocol (ICMP) echo requests
-
IP fragments
-
TCP SYN flooding
These attacks can impact the device performance and have these negative effects:
-
reduced service quality (such as poor voice, video, or critical applications traffic)
-
high route processor or switch processor CPU utilization
-
route flaps due to loss of routing protocol updates or keepalives
-
unstable Layer 2 topology
-
slow or unresponsive interactive sessions with the CLI
-
processor resource exhaustion, including memory and buffer depletion
-
indiscriminate drops of incoming packets
![]() Caution |
It is important to ensure that you protect the supervisor module from accidental or malicious attacks by configuring control plane protection. |
Control Plane Protection
To protect the control plane, the Cisco NX-OS device segregates packets destined for the control plane into separate classes. After these classes are identified, the Cisco NX-OS device polices the packets to prevent the supervisor module from being overwhelmed.
Control Plan Packet Types
Different types of packets can reach the control plane.
-
Receive packets: packets that have the destination address of a router. The destination address can be a Layer 2 address (such as a router MAC address) or a Layer 3 address (such as the IP address of a router interface). These packets include router updates and keepalive messages. Multicast packets can also be in this category where packets are sent to multicast addresses that are used by a router.
-
Exception packets: packets that need special handling by the supervisor module. For example, if a destination address is not present in the Forwarding Information Base (FIB) and results in a miss, the supervisor module sends an ICMP unreachable packet back to the sender. Another example is a packet with IP options set.
These exceptions are possible from line cards only:
-
match exception ip option
-
match exception ipv6 option
-
match exception ttl-failure
These exceptions are possible from fabric modules only:
-
match exception ipv6 icmp unreachable
-
match exception ip icmp unreachable
These exceptions are possible from line cards and fabric modules:
-
match exception mtu-failure
-
-
Redirected packets: packets that are redirected to the supervisor module.
-
Glean packets: if a Layer 2 MAC address for a destination IP address is not present in the FIB, the supervisor module receives the packet and sends an ARP request to the host.
All of these different packets could be maliciously used to attack the control plane and overwhelm the Cisco NX-OS device. CoPP classifies these packets into different classes and provides a mechanism to control the rate at which the supervisor module receives each packet.
Classification for CoPP
To ensure effective protection, the device classifies packets that reach the supervisor modules. This classification allows you to apply different rate control policies based on the packet type. For example, you might be less strict with protocol packets such as Hello messages and more strict with packets sent to the supervisor module due to specific IP options. You configure packet classifications and rate control policies using class maps and policy maps.
Egress CoPP
Beginning with Cisco NX-OS Release 10.2(3)F, egress CoPP is supported on the Nexus 93180YC-EX, Nexus 93180YC-FX, Nexus 93240YC-FX2, Nexus 93360YC-FX2, Nexus 9336C-FX2, Nexus 9336C-FX2-E, Nexus 93180YC-FX3, N9K-C9316D-GX, N9K-C93600CD-GX, Nexus 9364C-GX, N9K-C9332D-GX2B , Nexus 9364C and Nexus 9332C CloudScale switches.
Egress CoPP can be applied on top of custom/default CoPP policy.
Rate Controlling Mechanisms
Once the packets are classified, the device has mechanisms to control how quickly packets reach the supervisor module. The two primary mechanisms are policing and rate limiting.
Using hardware policers, you can define actions for traffic based on whether it meets specific conditions. These actions include transmitting, marking down, or dropping the packet.
You can configure these parameters for policing:
-
Committed information rate (CIR): Desired bandwidth, specified as a bit rate or a percentage of the link rate.
-
Committed burst (BC): Size of a traffic burst that can exceed the CIR within a given unit of time and not impact scheduling.
In addition, you can configure separate actions, such as transmit or drop, for traffic that conforms or violates policy.
For more information on policing parameters, see the Cisco Nexus 9000 Series NX-OS Quality of Service Configuration Guide.
Dynamic and Static CoPP ACLs
CoPP access control lists (ACLs) are classified as either dynamic or static. Cisco Nexus 9300 and 9500 Series switches use only dynamic CoPP ACLs. Cisco Nexus 9200 Series switches use both dynamic and static CoPP ACLs.
Dynamic CoPP ACLs work only for Forwarding Information Base (FIB)-based supervisor redirected packets. Static CoPP ACLs work for ACL-based supervisor redirected packets. Dynamic CoPP ACLs are supported for myIP and link-local multicast traffic. Static CoPP ACLs are supported for all other types of traffic.
Static CoPP ACLs are identified by a substring. Any ACL that has one of these substrings is categorized as a static CoPP ACL.
MAC-based static CoPP ACL substrings:
-
acl-mac-cdp-udld-vtp
-
acl-mac-cfsoe
-
acl-mac-dot1x
-
acl-mac-l2-tunnel
-
acl-mac-l3-isis
-
acl-mac-lacp
-
acl-mac-lldp
-
acl-mac-sdp-srp
-
acl-mac-stp
-
acl-mac-undesirable
Protocol-based static CoPP ACL substrings:
-
acl-dhcp
-
acl-dhcp-relay-response
-
acl-dhcp6
-
acl-dhcp6-relay-response
-
acl-ptp
Multicast-based static CoPP ACL substrings:
-
acl-igmp
For more information on static CoPP ACLs, see CoPP configuration guidelines .
Default Policing Policies
When you start your Cisco NX-OS device for the first time, the software installs the default copp-system-p-policy-strict policy. This policy protects the supervisor module from DoS attacks. You can set the protection level by choosing a CoPP policy option from the initial setup utility:
-
Strict—This policy is 1 rate and 2 color.
-
Moderate—This policy is 1 rate and 2 color. The important class burst size is greater than that of the strict policy but less than that of the lenient policy.
-
Lenient—This policy is 1 rate and 2 color. The important class burst size is greater than that of the moderate policy but less than that of the dense policy.
-
Dense—This policy is 1 rate and 2 color. The policer CIR values are lower than those in the strict policy.
-
Skip—No control plane policy is applied. ( Cisco does not recommend using the Skip option, as it may impact the network control plane.
If you do not select an option or do not run the setup utility, the software applies strict policing. We recommend that you start with the strict policy and later modify the CoPP policies as required.
![]() Note |
Strict policing is not applied by default when using POAP, so you must configure a CoPP policy. |
The copp-system-p-policy policy has optimized values suitable for basic device operations. You must add specific class and access-control list (ACL) rules that meet your DoS protection requirements. The default CoPP policy does not change when you upgrade the software.
![]() Caution |
If you select the skip option and do not configure CoPP protection, your Cisco NX-OS device can be vulnerable to DoS attacks. |
You can reassign the default CoPP policy by runnign the setup command at the CLI prompt or by using the copp profile command.
Default Class Maps
The copp-system-class-critical class uses this configuration.
class-map type control-plane match-any copp-system-p-class-critical
match access-group name copp-system-p-acl-bgp
match access-group name copp-system-p-acl-rip
match access-group name copp-system-p-acl-vpc
match access-group name copp-system-p-acl-bgp6
match access-group name copp-system-p-acl-ospf
match access-group name copp-system-p-acl-rip6
match access-group name copp-system-p-acl-eigrp
match access-group name copp-system-p-acl-ospf6
match access-group name copp-system-p-acl-eigrp6
match access-group name copp-system-p-acl-auto-rp
match access-group name copp-system-p-acl-mac-l3-isis
The copp-system-class-exception class uses this configuration.
class-map type control-plane match-any copp-system-p-class-exception
match exception ip option
match exception ip icmp unreachable
match exception ipv6 option
match exception ipv6 icmp unreachable
The copp-system-class-exception-diag class uses this configuration.
class-map type control-plane match-any copp-system-p-class-exception-diag
match exception ttl-failure
match exception mtu-failure
The copp-system-class-important class uses this configuration.
class-map type control-plane match-any copp-system-p-class-important
match access-group name copp-system-p-acl-hsrp
match access-group name copp-system-p-acl-vrrp
match access-group name copp-system-p-acl-hsrp6
match access-group name copp-system-p-acl-vrrp6
match access-group name copp-system-p-acl-mac-lldp
The copp-system-class-l2-default class uses this configuration.
class-map type control-plane match-any copp-system-p-class-l2-default
match access-group name copp-system-p-acl-mac-undesirable
The copp-system-class-l2-unpoliced class uses this configuration.
class-map type control-plane match-any copp-system-p-class-l2-unpoliced
match access-group name copp-system-p-acl-mac-stp
match access-group name copp-system-p-acl-mac-lacp
match access-group name copp-system-p-acl-mac-cfsoe
match access-group name copp-system-p-acl-mac-sdp-srp
match access-group name copp-system-p-acl-mac-l2-tunnel
match access-group name copp-system-p-acl-mac-cdp-udld-vtp
The copp-system-class-l3mc-data class uses this configuration.
class-map type control-plane match-any copp-system-p-class-l3mc-data
match exception multicast rpf-failure
match exception multicast dest-miss
The copp-system-class-l3uc-data class uses this configuration.
class-map type control-plane match-any copp-system-p-class-l3uc-data
match exception glean
The copp-system-class-management class uses this configuration.
class-map type control-plane match-any copp-system-p-class-management
match access-group name copp-system-p-acl-ftp
match access-group name copp-system-p-acl-ntp
match access-group name copp-system-p-acl-ssh
match access-group name copp-system-p-acl-http
match access-group name copp-system-p-acl-ntp6
match access-group name copp-system-p-acl-sftp
match access-group name copp-system-p-acl-snmp
match access-group name copp-system-p-acl-ssh6
match access-group name copp-system-p-acl-tftp
match access-group name copp-system-p-acl-https
match access-group name copp-system-p-acl-snmp6
match access-group name copp-system-p-acl-tftp6
match access-group name copp-system-p-acl-radius
match access-group name copp-system-p-acl-tacacs
match access-group name copp-system-p-acl-telnet
match access-group name copp-system-p-acl-radius6
match access-group name copp-system-p-acl-tacacs6
match access-group name copp-system-p-acl-telnet6
The copp-system-class-monitoring class uses this configuration.
class-map type control-plane match-any copp-system-p-class-monitoring
match access-group name copp-system-p-acl-icmp
match access-group name copp-system-p-acl-icmp6
match access-group name copp-system-p-acl-traceroute
The copp-system-class-multicast-host class uses this configuration.
class-map type control-plane match-any copp-system-p-class-multicast-host
match access-group name copp-system-p-acl-mld
The copp-system-class-multicast-router class uses this configuration.
class-map type control-plane match-any copp-system-p-class-multicast-router
match access-group name copp-system-p-acl-pim
match access-group name copp-system-p-acl-msdp
match access-group name copp-system-p-acl-pim6
match access-group name copp-system-p-acl-pim-reg
match access-group name copp-system-p-acl-pim6-reg
match access-group name copp-system-p-acl-pim-mdt-join
The copp-system-class-nat-flow class uses this configuration.
class-map type control-plane match-any copp-system-p-class-nat-flow
match exception nat-flow
The copp-system-class-ndp class uses this configuration.
class-map type control-plane match-any copp-system-p-class-ndp
match access-group name copp-system-p-acl-ndp
The copp-system-class-normal class uses this configuration.
class-map type control-plane match-any copp-system-p-class-normal
match access-group name copp-system-p-acl-mac-dot1x
match protocol arp
The copp-system-class-normal-dhcp class uses this configuration.
class-map type control-plane match-any copp-system-p-class-normal-dhcp
match access-group name copp-system-p-acl-dhcp
match access-group name copp-system-p-acl-dhcp6
The copp-system-class-normal-dhcp-relay-response class uses this configuration.
class-map type control-plane match-any copp-system-p-class-normal-dhcp-relay-response
match access-group name copp-system-p-acl-dhcp-relay-response
match access-group name copp-system-p-acl-dhcp6-relay-response
The copp-system-class-normal-igmp class uses this configuration.
class-map type control-plane match-any copp-system-p-class-normal-igmp
match access-group name copp-system-p-acl-igmp
The copp-system-class-redirect class uses this configuration.
class-map type control-plane match-any copp-system-p-class-redirect
match access-group name copp-system-p-acl-ptp
The copp-system-class-undesirable class uses this configuration.
class-map type control-plane match-any copp-system-p-class-undesirable
match access-group name copp-system-p-acl-undesirable
match exception multicast sg-rpf-failure
The copp-system-class-fcoe class uses this configuration.
class-map type control-plane match-any copp-system-p-class-fcoe
match access-group name copp-system-p-acl-mac-fcoe
![]() Note |
The copp-system-class-fcoe class is not supported for Cisco Nexus 9200 Series switches. |
Strict Default CoPP Policy
On Cisco Nexus 9200 Series switches, the strict CoPP policy has the following configuration:
![]() Note |
The CIR value for copied or custom CoPP profiles which are pre-existing before upgrade to a new image will have the same CIR values as before. The new CoPP profiles which are copied from default profiles in the new image will have a new CIR value. |
policy-map type control-plane copp-system-p-policy-strict
class copp-system-p-class-l3uc-data
set cos 1
police cir 800 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-critical
set cos 7
police cir 36000 kbps bc 1280000 bytes conform transmit violate drop
class copp-system-p-class-important
set cos 6
police cir 2500 kbps bc 1280000 bytes conform transmit violate drop
class copp-system-p-class-multicast-router
set cos 6
police cir 2600 kbps bc 128000 bytes conform transmit violate drop
class copp-system-p-class-management
set cos 2
police cir 10000 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-multicast-host
set cos 1
police cir 1000 kbps bc 128000 bytes conform transmit violate drop
class copp-system-p-class-l3mc-data
set cos 1
police cir 2400 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-normal
set cos 1
police cir 2200 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-ndp
set cos 6
police cir 1400 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-normal-dhcp
set cos 1
police cir 1300 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-normal-dhcp-relay-response
set cos 1
police cir 1500 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-normal-igmp
set cos 3
police cir 3000 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-redirect
set cos 1
police cir 280 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-exception
set cos 1
police cir 150 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-exception-diag
set cos 1
police cir 150 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-monitoring
set cos 1
police cir 150 kbps bc 128000 bytes conform transmit violate drop
class copp-system-p-class-l2-unpoliced
set cos 7
police cir 50 mbps bc 8192000 bytes conform transmit violate drop
class copp-system-p-class-undesirable
set cos 0
police cir 200 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-nat-flow
set cos 7
police cir 800 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-l2-default
set cos 0
police cir 400 kbps bc 32000 bytes conform transmit violate drop
class class-default
set cos 0
police cir 400 kbps bc 32000 bytes conform transmit violate drop
On Nexus 9300 and 9500 Series switches, the strict CoPP policy has the following configuration:
switch# show policy-map type control-plane name copp-system-p-policy-strict
policy-map type control-plane copp-system-p-policy-strict
class copp-system-p-class-l3uc-data
set cos 1
police cir 800 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-critical
set cos 7
police cir 36000 kbps bc 1280000 bytes conform transmit violate drop
class copp-system-p-class-important
set cos 6
police cir 2500 kbps bc 1280000 bytes conform transmit violate drop
class copp-system-p-class-openflow
set cos 5
police cir 1000 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-multicast-router
set cos 6
police cir 2600 kbps bc 128000 bytes conform transmit violate drop
class copp-system-p-class-multicast-host
set cos 1
police cir 1000 kbps bc 128000 bytes conform transmit violate drop
class copp-system-p-class-l3mc-data
set cos 1
police cir 2400 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-normal
set cos 1
police cir 2200 kbps bc 128000 bytes conform transmit violate drop
class copp-system-p-class-ndp
set cos 6
police cir 1400 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-normal-dhcp
set cos 1
police cir 1300 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-normal-dhcp-relay-response
set cos 1
police cir 1500 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-normal-igmp
set cos 3
police cir 3000 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-redirect
set cos 1
police cir 1800 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-exception
set cos 1
police cir 150 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-exception-diag
set cos 1
police cir 150 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-management
set cos 2
police cir 36000 kbps bc 512000 bytes conform transmit violate drop
class copp-system-p-class-monitoring
set cos 1
police cir 360 kbps bc 128000 bytes conform transmit violate drop
class copp-system-p-class-l2-unpoliced
set cos 7
police cir 50 mbps bc 8192000 bytes conform transmit violate drop
class copp-system-p-class-undesirable
set cos 0
police cir 200 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-fcoe
set cos 6
police cir 30000 kbps bc 825000 bytes conform transmit violate drop
class copp-system-p-class-nat-flow
set cos 7
police cir 800 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-l3mcv6-data
set cos 1
police cir 2400 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-undesirablev6
set cos 0
police cir 200 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-l2-default
set cos 0
police cir 400 kbps bc 32000 bytes conform transmit violate drop
class class-default
set cos 0
police cir 400 kbps bc 32000 bytes conform transmit violate drop
![]() Note |
The values in the examples are for reference only. Actual CoPP rates may vary based on the switches deployed. |
title
On Cisco Nexus 9200 Series switches, the moderate CoPP policy has the following configuration:
policy-map type control-plane copp-system-p-policy-moderate
class copp-system-p-class-l3uc-data
set cos 1
police cir 800 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-critical
set cos 7
police cir 36000 kbps bc 1920000 bytes conform transmit violate drop
class copp-system-p-class-important
set cos 6
police cir 2500 kbps bc 1920000 bytes conform transmit violate drop
class copp-system-p-class-multicast-router
set cos 6
police cir 2600 kbps bc 192000 bytes conform transmit violate drop
class copp-system-p-class-management
set cos 2
police cir 10000 kbps bc 48000 bytes conform transmit violate drop
class copp-system-p-class-multicast-host
set cos 1
police cir 1000 kbps bc 192000 bytes conform transmit violate drop
class copp-system-p-class-l3mc-data
set cos 1
police cir 2400 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-normal
set cos 1
police cir 1400 kbps bc 48000 bytes conform transmit violate drop
class copp-system-p-class-ndp
set cos 6
police cir 1400 kbps bc 48000 bytes conform transmit violate drop
class copp-system-p-class-normal-dhcp
set cos 1
police cir 1300 kbps bc 48000 bytes conform transmit violate drop
class copp-system-p-class-normal-dhcp-relay-response
set cos 1
police cir 1500 kbps bc 96000 bytes conform transmit violate drop
class copp-system-p-class-normal-igmp
set cos 3
police cir 3000 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-redirect
set cos 1
police cir 280 kbps bc 48000 bytes conform transmit violate drop
class copp-system-p-class-exception
set cos 1
police cir 150 kbps bc 48000 bytes conform transmit violate drop
class copp-system-p-class-exception-diag
set cos 1
police cir 150 kbps bc 48000 bytes conform transmit violate drop
class copp-system-p-class-monitoring
set cos 1
police cir 150 kbps bc 192000 bytes conform transmit violate drop
class copp-system-p-class-l2-unpoliced
set cos 7
police cir 50 mbps bc 8192000 bytes conform transmit violate drop
class copp-system-p-class-undesirable
set cos 0
police cir 200 kbps bc 48000 bytes conform transmit violate drop
class copp-system-p-class-nat-flow
set cos 7
police cir 800 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-l2-default
set cos 0
police cir 400 kbps bc 48000 bytes conform transmit violate drop
class class-default
set cos 0
police cir 400 kbps bc 48000 bytes conform transmit violate drop
On Cisco Nexus 9300 and 9500 Series and 3164Q, 31128PQ, 3232C, and 3264Q switches, the moderate CoPP policy has the following configuration:
policy-map type control-plane copp-system-p-policy-moderate
class copp-system-p-class-l3uc-data
set cos 1
police cir 250 pps bc 32 packets conform transmit violate drop
class copp-system-p-class-critical
set cos 7
police cir 19000 pps bc 192 packets conform transmit violate drop
class copp-system-p-class-important
set cos 6
police cir 3000 pps bc 192 packets conform transmit violate drop
class copp-system-p-class-multicast-router
set cos 6
police cir 3000 pps bc 192 packets conform transmit violate drop
class copp-system-p-class-management
set cos 2
police cir 3000 pps bc 48 packets conform transmit violate drop
class copp-system-p-class-multicast-host
set cos 1
police cir 2000 pps bc 192 packets conform transmit violate drop
class copp-system-p-class-l3mc-data
set cos 1
police cir 3000 pps bc 32 packets conform transmit violate drop
class copp-system-p-class-normal
set cos 1
police cir 1500 pps bc 48 packets conform transmit violate drop
class copp-system-p-class-ndp
set cos 6
police cir 1500 pps bc 48 packets conform transmit violate drop
class copp-system-p-class-normal-dhcp
set cos 1
police cir 300 pps bc 48 packets conform transmit violate drop
class copp-system-p-class-normal-dhcp-relay-response
set cos 1
police cir 400 pps bc 96 packets conform transmit violate drop
class copp-system-p-class-normal-igmp
set cos 3
police cir 6000 pps bc 64 packets conform transmit violate drop
class copp-system-p-class-redirect
set cos 1
police cir 1500 pps bc 48 packets conform transmit violate drop
class copp-system-p-class-exception
set cos 1
police cir 50 pps bc 48 packets conform transmit violate drop
class copp-system-p-class-exception-diag
set cos 1
police cir 50 pps bc 48 packets conform transmit violate drop
class copp-system-p-class-monitoring
set cos 1
police cir 300 pps bc 192 packets conform transmit violate drop
class copp-system-p-class-l2-unpoliced
set cos 7
police cir 20000 pps bc 8192 packets conform transmit violate drop
class copp-system-p-class-undesirable
set cos 0
police cir 15 pps bc 48 packets conform transmit violate drop
class copp-system-p-class-fcoe
set cos 6
police cir 1500 pps bc 192 packets conform transmit violate drop
class copp-system-p-class-nat-flow
set cos 7
police cir 100 pps bc 64 packets conform transmit violate drop
class copp-system-p-class-l2-default
set cos 0
police cir 50 pps bc 48 packets conform transmit violate drop
class class-default
set cos 0
police cir 50 pps bc 48 packets conform transmit violate drop
Lenient Default CoPP Policy
On Cisco Nexus 9200 Series switches, the lenient CoPP policy has the following configuration:
policy-map type control-plane copp-system-p-policy-lenient
class copp-system-p-class-l3uc-data
set cos 1
police cir 800 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-critical
set cos 7
police cir 36000 kbps bc 2560000 bytes conform transmit violate drop
class copp-system-p-class-important
set cos 6
police cir 2500 kbps bc 2560000 bytes conform transmit violate drop
class copp-system-p-class-multicast-router
set cos 6
police cir 2600 kbps bc 256000 bytes conform transmit violate drop
class copp-system-p-class-management
set cos 2
police cir 10000 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-multicast-host
set cos 1
police cir 1000 kbps bc 256000 bytes conform transmit violate drop
class copp-system-p-class-l3mc-data
set cos 1
police cir 2400 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-normal
set cos 1
police cir 1400 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-ndp
set cos 6
police cir 1400 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-normal-dhcp
set cos 1
police cir 1300 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-normal-dhcp-relay-response
set cos 1
police cir 1500 kbps bc 128000 bytes conform transmit violate drop
class copp-system-p-class-normal-igmp
set cos 3
police cir 3000 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-redirect
set cos 1
police cir 280 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-exception
set cos 1
police cir 150 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-exception-diag
set cos 1
police cir 150 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-monitoring
set cos 1
police cir 150 kbps bc 256000 bytes conform transmit violate drop
class copp-system-p-class-l2-unpoliced
set cos 7
police cir 50 mbps bc 8192000 bytes conform transmit violate drop
class copp-system-p-class-undesirable
set cos 0
police cir 200 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-nat-flow
set cos 7
police cir 800 kbps bc 64000 bytes conform transmit violate drop
class copp-system-p-class-l2-default
set cos 0
police cir 400 kbps bc 64000 bytes conform transmit violate drop
class class-default
set cos 0
police cir 400 kbps bc 64000 bytes conform transmit violate drop
On Cisco Nexus 9300 and 9500 Series switches, the lenient CoPP policy has the following configuration:
policy-map type control-plane copp-system-p-policy-lenient
class copp-system-p-class-l3uc-data
set cos 1
police cir 250 pps bc 32 packets conform transmit violate drop
class copp-system-p-class-critical
set cos 7
police cir 19000 pps bc 256 packets conform transmit violate drop
class copp-system-p-class-important
set cos 6
police cir 3000 pps bc 256 packets conform transmit violate drop
class copp-system-p-class-multicast-router
set cos 6
police cir 3000 pps bc 256 packets conform transmit violate drop
class copp-system-p-class-management
set cos 2
police cir 3000 pps bc 64 packets conform transmit violate drop
class copp-system-p-class-multicast-host
set cos 1
police cir 2000 pps bc 256 packets conform transmit violate drop
class copp-system-p-class-l3mc-data
set cos 1
police cir 3000 pps bc 32 packets conform transmit violate drop
class copp-system-p-class-normal
set cos 1
police cir 1500 pps bc 64 packets conform transmit violate drop
class copp-system-p-class-ndp
set cos 6
police cir 1500 pps bc 64 packets conform transmit violate drop
class copp-system-p-class-normal-dhcp
set cos 1
police cir 300 pps bc 64 packets conform transmit violate drop
class copp-system-p-class-normal-dhcp-relay-response
set cos 1
police cir 400 pps bc 128 packets conform transmit violate drop
class copp-system-p-class-normal-igmp
set cos 3
police cir 6000 pps bc 64 packets conform transmit violate drop
class copp-system-p-class-redirect
set cos 1
police cir 1500 pps bc 64 packets conform transmit violate drop
class copp-system-p-class-exception
set cos 1
police cir 50 pps bc 64 packets conform transmit violate drop
class copp-system-p-class-exception-diag
set cos 1
police cir 50 pps bc 64 packets conform transmit violate drop
class copp-system-p-class-monitoring
set cos 1
police cir 300 pps bc 256 packets conform transmit violate drop
class copp-system-p-class-l2-unpoliced
set cos 7
police cir 20000 pps bc 8192 packets conform transmit violate drop
class copp-system-p-class-undesirable
set cos 0
police cir 15 pps bc 64 packets conform transmit violate drop
class copp-system-p-class-fcoe
set cos 6
police cir 1500 pps bc 256 packets conform transmit violate drop
class copp-system-p-class-nat-flow
set cos 7
police cir 100 pps bc 64 packets conform transmit violate drop
class copp-system-p-class-l2-default
set cos 0
police cir 50 pps bc 64 packets conform transmit violate drop
class class-default
set cos 0
police cir 50 pps bc 64 packets conform transmit violate drop
Dense Default CoPP Policy
On Cisco Nexus 9200 Series switches, the dense CoPP policy has the following configuration:
policy-map type control-plane copp-system-p-policy-dense
class copp-system-p-class-l3uc-data
set cos 1
police cir 800 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-critical
set cos 7
police cir 4500 kbps bc 1280000 bytes conform transmit violate drop
class copp-system-p-class-important
set cos 6
police cir 2500 kbps bc 1280000 bytes conform transmit violate drop
class copp-system-p-class-multicast-router
set cos 6
police cir 370 kbps bc 128000 bytes conform transmit violate drop
class copp-system-p-class-management
set cos 2
police cir 2500 kbps bc 128000 bytes conform transmit violate drop
class copp-system-p-class-multicast-host
set cos 2
police cir 300 kbps bc 128000 bytes conform transmit violate drop
class copp-system-p-class-l3mc-data
set cos 1
police cir 600 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-normal
set cos 1
police cir 1400 kbps bc 128000 bytes conform transmit violate drop
class copp-system-p-class-ndp
set cos 1
police cir 350 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-normal-dhcp
set cos 1
police cir 750 kbps bc 128000 bytes conform transmit violate drop
class copp-system-p-class-normal-dhcp-relay-response
set cos 1
police cir 750 kbps bc 128000 bytes conform transmit violate drop
class copp-system-p-class-normal-igmp
set cos 3
police cir 1400 kbps bc 128000 bytes conform transmit violate drop
class copp-system-p-class-redirect
set cos 1
police cir 200 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-exception
set cos 1
police cir 200 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-exception-diag
set cos 1
police cir 200 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-monitoring
set cos 1
police cir 150 kbps bc 128000 bytes conform transmit violate drop
class copp-system-p-class-l2-unpoliced
set cos 7
police cir 50 mbps bc 8192000 bytes conform transmit violate drop
class copp-system-p-class-undesirable
set cos 0
police cir 100 kbps bc 32000 bytes conform transmit violate drop
class copp-system-p-class-l2-default
set cos 0
police cir 200 kbps bc 32000 bytes conform transmit violate drop
class class-default
set cos 0
police cir 200 kbps bc 32000 bytes conform transmit violate drop
On Cisco Nexus 9300 and 9500 Series switches, the dense CoPP policy has the following configuration:
policy-map type control-plane copp-system-p-policy-dense
class copp-system-p-class-l3uc-data
set cos 1
police cir 250 pps bc 32 packets conform transmit violate drop
class copp-system-p-class-critical
set cos 7
police cir 2500 pps bc 128 packets conform transmit violate drop
class copp-system-p-class-important
set cos 6
police cir 1200 pps bc 128 packets conform transmit violate drop
class copp-system-p-class-multicast-router
set cos 6
police cir 1200 pps bc 128 packets conform transmit violate drop
class copp-system-p-class-management
set cos 2
police cir 1200 pps bc 128 packets conform transmit violate drop
class copp-system-p-class-multicast-host
set cos 2
police cir 1000 pps bc 128 packets conform transmit violate drop
class copp-system-p-class-l3mc-data
set cos 1
police cir 1200 pps bc 32 packets conform transmit violate drop
class copp-system-p-class-normal
set cos 1
police cir 750 pps bc 32 packets conform transmit violate drop
class copp-system-p-class-ndp
set cos 1
police cir 750 pps bc 32 packets conform transmit violate drop
class copp-system-p-class-normal-dhcp
set cos 1
police cir 150 pps bc 128 packets conform transmit violate drop
class copp-system-p-class-normal-dhcp-relay-response
set cos 1
police cir 200 pps bc 128 packets conform transmit violate drop
class copp-system-p-class-normal-igmp
set cos 3
police cir 2500 pps bc 128 packets conform transmit violate drop
class copp-system-p-class-redirect
set cos 1
police cir 1500 pps bc 32 packets conform transmit violate drop
class copp-system-p-class-exception
set cos 1
police cir 50 pps bc 32 packets conform transmit violate drop
class copp-system-p-class-exception-diag
set cos 1
police cir 50 pps bc 32 packets conform transmit violate drop
class copp-system-p-class-monitoring
set cos 1
police cir 50 pps bc 128 packets conform transmit violate drop
class copp-system-p-class-l2-unpoliced
set cos 7
police cir 20000 pps bc 8192 packets conform transmit violate drop
class copp-system-p-class-undesirable
set cos 0
police cir 15 pps bc 32 packets conform transmit violate drop
class copp-system-p-class-fcoe
set cos 6
police cir 750 pps bc 128 packets conform transmit violate drop
class copp-system-p-class-l2-default
set cos 0
police cir 25 pps bc 32 packets conform transmit violate drop
class class-default
set cos 0
police cir 25 pps bc 32 packets conform transmit violate drop
Packets Per Second Credit Limit
The aggregate packets per second (PPS) for a given policy (sum of PPS of each class part of the policy) is capped by an upper PPS Credit Limit (PCL). If an increase in PPS of a given class causes a PCL exceed, the configuration is rejected. To increase the desired PPS, the additional PPS beyond PCL should be decreased from other class(es).
Modular QoS Command-Line Interface
CoPP uses the Modular Quality of Service Command-Line Interface (MQC). MQC is a CLI structure that allows you to define a traffic class. You can also create a traffic policy (policy map) and attach the traffic policy to an interface. The traffic policy contains the CoPP feature, which is applied to the traffic class.
Procedure
|
Step 1 |
Define a traffic class using the class-map command. Example:
A traffic class is used to classify traffic. This example shows how to create a new class-map called copp-sample-class: |
||
|
Step 2 |
Create a traffic policy using the policy-map command. A traffic policy (policy map) contains a traffic class and one or more CoPP features that will be applied to the traffic class. The CoPP features in the traffic policy specify how to treat the classified traffic. |
||
|
Step 3 |
Attach the traffic policy (policy map) to the control plane using the control-plane and service-policy commands. Example:
|
CoPP and the Management Interface
The Cisco NX-OS device supports only hardware-based CoPP, which does not support the management interface (mgmt0). The out-of-band mgmt0 interface connects directly to the CPU and does not pass through the in-band traffic hardware where CoPP is implemented.
On the mgmt0 interface, ACLs can be configured to give or deny access to a particular type of traffic.


Feedback