For feedback and comments:
documentation.feedback@alcatel-lucent.com

Table of Contents Previous Next Index PDF


Application Assurance — Best Practices for ISA and Host IOM Overload Protection
In This Chapter
This section provides information about Application Assurance best practices for ISA and host IOM overload protection.
Topics in this section include:
Applicability
This configuration note is applicable to all 7750 SR/SR-c and 7450 ESS chassis supporting Application Assurance (AA).
The configuration was tested on release 12.0.R4.
Overview
The Multi-Service Integrated Services Adapter (MS-ISA) is a processing resource module installed in a7x50 SR/ESS system on an ISA host IOM. This example describes the best practices for configuration and monitoring of the system to ensure proper engineering of the system resources involved in AA ISA capacity planning.
As shown in Figure 185, traffic is diverted to an AA ISA by provisioning of an application profile (app-profile) for a subscriber or SAP service context. SR OS then automatically handles traffic diversion for both directions of traffic for that AA subscriber context, through one of the AA ISAs in the AA group where that app-profile is defined.
Figure 185: System Packet Datapath to AA ISA
The following elements in the 7x50 SR/ESS system must be properly engineered for any given AA deployment. Each element is described in this section:
1.
2.
3.
4.
5.
 
ISA Capacity Planning Approach
This example illustrates an approach to the configuration of the 7x50 SR/ESS AA system to address these considerations:
 
 
 
AA Overload and Resource Monitoring
Overload is a condition where the total packet processing requirements for traffic arriving on a given ISA exceeds the available resources, resulting in the host IOM egress buffers reaching a configured “overload” threshold. Above this threshold, the ISA can be configured to forward excess traffic (called overload cut-through). If cut-through is not enabled and the overload condition continues, the egress queue MBS threshold will eventually be reached, after which packets will be discarded. Even if overload cut-through is enabled, any egress traffic that exceeds the maximum bus capacity of the ISA queue discard threshold will be discarded.
ISA capacity overload events are supported within the system resource monitoring and logging capabilities if the traffic and resource load crosses any of the following high and low load thresholds on a per-ISA basis. Exceeding one of these thresholds does not in itself indicate an overload state.
a.
b.
c.
The following terms are used to describe flow resources:
d.
e.
 
 
 
ISA Overload Models
For an ISA overload strategy, there are two design options for configuring the overload behavior of the system:
Note that even with overload cut-through enabled, there is a hardware-based maximum ISA throughput of approximately 11 Gbps for MS-ISA and 40 Gbps for MS-ISA2. If this is exceeded on a sustained basis, IOM egress discards may still occur.
 
Understanding Packet and Protocol Cut-Through
Traffic can be cut-through the ISA-AA card on a packet-by-packet basis, in which case packets do not go through AA identification and subscriber application policy. The conditions that trigger cut-through include:
Note: the default subscriber policy is a set of AQP rules that apply AQP match criteria limited to Application Service Options (ASO), aa-sub, and traffic-direction starting with the first packet of a flow, with no match conditions based on AA identification (application, app-group, charging-group, IP header). Packets will be either denied_by_default_policy or cut_through_by_default_policy, depending on the policer action configuration in the AQP rules.
For cut-through traffic, no flow records exist but it is counted under per-subscriber protocol statistics as one of the following counters, depending on the case:
An example of overload cut-through statistics in the CLI is shown below:
A:BNG# show application-assurance group 1 protocol count
===============================================================================
Application-Assurance Protocol Statistics
===============================================================================
Protocol                         Disc          Octets       Packets      Flows
-------------------------------------------------------------------------------
advanced_direct_connect            0%               0             0          0
aim                                0%               0             0          0
amazon_video                       0%               0             0          0
ares                               0%               0             0          0
bbm                                0%               0             0          0
betamax_voip                       0%               0             0          0
bgp                                0%               0             0          0
bittorrent                         0%       678428534       5322929    1036129
cccam                              0%               0             0          0
citrix_ica                         0%               0             0          0
citrix_ima                         0%               0             0          0
cnnlive                            0%               0             0          0
cups                               0%               0             0          0
cut_through                        0%      5299435739      10603771          0
cut_through_by_default_policy      0%               0             0          0
cvs                                0%               0             0          0
daap                               0%               0             0          0
dcerpc                             0%               0             0          0
denied_by_default_policy           0%               0             0          0
 
 
 
Configuration
This example illustrates a typical, configuration of a 7x50 system for AA each of the configuration topics.
 
AA Traffic Load Test Environment
Application assurance identifies every byte and every packet of hundreds of real-world applications using per-flow stateful analysis techniques. It is a challenge to find test equipment that can accurately emulate full scale (10 Gbps to 40 Gbps) with traffic mixes and flow behaviors representing hundreds of thousands of end users with application clients across a range of devices. Some specialized stateful test equipment can emulate large traffic rates, but even the best will have equipment-specific patterns and behaviors not representative of live traffic. Therefore, the best scenario to engineer the AA overload configuration is by iteration in live deployments: setting an initial target and modifying the configuration based on ISA performance under load.
For a lab test of ISA throughput and loading, Alcatel-Lucent uses stateful test equipment which supports emulation of various service provider traffic mix profiles suitable for generating overload conditions; however, it is outside the scope of this document to configure AA throughput tests.
The operator should be aware that use of unrealistic, non-stateful traffic generators can result in a high level of unknown traffic, with the ISA performance impacted by continually trying to identify large numbers of packets of no real application type. This, combined with cut-through for invalid IP packets, can result in ISA overload and traffic cut-through (due to overload or invalid IP packets) at traffic levels not representative of actual ISA performance on real traffic.
 
 
ISA Capacity Cost and Load Balancing Across ISAs
These AA group-level commands define the load balancing parameters within an ISA group.
*A:BNG# configure isa 
    application-assurance-group 1 aa-sub-scale residential create
        no description
        no fail-to-open
        isa-capacity-cost-high-threshold 304000
        isa-capacity-cost-low-threshold 272000
        partitions
        divert-fc be
        no shutdown
    exit
 
The following should be noted related to this configuration:
divert-fc configuration applies to the AA group: in this example, FC BE Internet is the only diverted FC; this is typical for AA residential and WLan-GW deployments. For VPN services, typically all datapath FCs are diverted to AA.
 
ISA-AA Host IOM - Network Egress Shared Memory and QoS
The amount of shared memory allocated per port, along with the network port egress QoS policy, determine the maximum delay for traffic diverted to Application Assurance.
This maximum network port delay is typically determined by the operator and must be used to define the proper QoS configuration to apply to the ISA-AA ports; this QoS configuration may be the same (typically) as what is applied to regular network ports on the 7x50 SR/ESS.
For IOM3-XP and FP2 and higher based line cards there is shared network egress memory per ISA-AA port, with the ISA-AA is represented by two network ports on the host IOM:
 
configure isa application-assurance-group 1 
            qos 
                egress
                    from-subscriber
                        pool
                            slope-policy "default"
                            resv-cbs default
                        exit
                        queue-policy "network-facing-egress"
                        port-scheduler-policy "network-facing"
                    exit
                    to-subscriber
                        pool
                            slope-policy "default"
                            resv-cbs default
                        exit
                        queue-policy "network-facing-egress"
                        port-scheduler-policy "network-facing"
                    exit
            exit
            no shutdown
 
For IOM3-XP and FP2 and higher based line cards the amount of shared memory reserved for each egress network port is determined by the speed of the port (10 Gbps for MS-ISA and 40 Gbps for MS-ISA2) and the egr-percentage-of-rate ratio configuration.
MS-ISA uses by default 1000% and 500% of the rate respectively for to-sub and from-sub ports, while MS-ISA2 uses by default 100% for both to-sub and from-sub ports.
It is typically recommended that these values be adjusted when MS-ISA and a high-speed Ethernet MDA are mixed on the same IOM3, since in this context the amount of shared memory allocated to the Ethernet MDA should be increased by reducing the MS-ISA network ports memory allocation ratio. If two MS-ISAs are installed on the same IOM3, the system will by default allocate 50% of the network egress shared memory to each ISA. In addition, an operator may adjust these values in case the actual network-to-subscriber versus subscriber-to-network ratio is significantly different in the production network, in order to achieve the expected maximum tolerated network delay.
The operator can modify the egr-percentage-of-rate per port using the command below:
A:BNG# configure port 1/2/fm-sub 
A:BNG>config>port# info detail 
----------------------------------------------
        modify-buffer-allocation-rate
            egr-percentage-of-rate 500
        exit
----------------------------------------------
A:BNG# configure port 1/2/to-sub 
A:BNG>config>port# info detail 
----------------------------------------------
        modify-buffer-allocation-rate
            egr-percentage-of-rate 1000
        exit
 
Network egress scheduling/queuing priority is for all ISAs within a group defined at the AA ISA group level
An example below with ISA-AA and 2 x 10G Eth MDA:
7750# configure port <slot>/<isa-aa-mda>/fm-sub
    modify-buffer-allocation-rate
        egr-percentage-of-rate 65
 
7750# configure port <slot>/<isa-aa-mda>/to-sub
    modify-buffer-allocation-rate
        egr-percentage-of-rate 130
 
 
In this example, the configuration defines:
For MS-ISA2, each MS-ISM flexpath will default the buffer allocation rate to 100%, which is a suitable value assuming that both modules in a slot are MS-ISA2 (which is the MS-ISM configuration), or that the I/O module has a similar traffic rate as the MS-ISA2 (which is also the case in the 10x10GE and 1x100GE versions of the MS-ISA2 line cards).
 
 
 
Configuring ISA Resources and Stats Collection
The following are the key consumable resources in an AA ISA:
The AA group should be configured with watermark thresholds where each ISA will generate SNMP events when resources reach this level.
 
7750# configure application-assurance
----------------------------------------------
        flow-table-low-wmark 90
        flow-table-high-wmark 95
        flow-setup-high-wmark 66500
        flow-setup-low-wmark 63000
        bit-rate-high-wmark 7600
        bit-rate-low-wmark 6800
 
In this example, the usage SNMP watermarks are configured for:
The show>app-assure>group>status detail command is used to display basic ISA health status:
 
A:BNG# show application-assurance group 1 status detail 
  ===============================================================================
  Application-Assurance Status
  ===============================================================================
  Last time change affecting status : 05/30/2014 17:18:34
  Number of Active ISAs             : 4
  Flows                             : 214007945881
  Flow Resources In Use             : 2955164
  AA Subs Created                   : 70567
  AA Subs Deleted                   : 10544
  AA Subs Modified                  : 0
  Seen IP Requests Sent             : 0
  Seen IP Requests Dropped          : 0
  -------------------------------------------------------------------------------
                                      Current    Average    Peak
  -------------------------------------------------------------------------------
  Active Flows                      : 2911508    2769454    4582522
  Flow Setup Rate (per second)      : 33923      29400      67865
  Traffic Rate (Mbps)               : 7620       7238       22628
  Packet Rate (per second)          : 1254138    1182571    3044376
  AA-Subs Downloaded                : 69887      66129      70567
  Active Subs                       : 23131      19737      38114
  -------------------------------------------------------------------------------
                                      Packets               Octets
  -------------------------------------------------------------------------------
  Diverted traffic                  : 7437950197613         5530634242355947
  Diverted discards                 : 0                     0
      Congestion                    : 0                     0
      Errors                        : 0                     N/A
  Entered ISA-AAs                   : 7437950180191         5530634229794634
  Buffered in ISA-AAs               : 22                    29849
  Discarded in ISA-AAs              : 97790                 47801217
      Policy                        : 0                     0
      Congestion                    : 0                     0
      Errors                        : 97790                 47801217
  Modified in ISA-AAs
      Packet size increased         : 0                     0
      Packet size decreased         : 0                     0
  Errors (policy bypass)            : 28283549              21160338635
  Exited ISA-AAs                    : 7437950082379         5530634181963568
  Returned discards                 : 0                     0
      Congestion                    : 0                     0
      Errors                        : 0                     N/A
  Returned traffic                  : 7437950054070         5530634162337570
  ===============================================================================
 
This can also be run on a per-ISA basis:
show application-assurance group 1 status isa <slot/port> detail                          
 
Note that for MS-ISA2, there is a maximum AA packet rate of 7 M pps; under most known traffic mix scenarios, the ISA should be safely below this packet rate when at maximum bandwidth throughput. However, it is worth periodically checking this value, because if the maximum packet rate is exceeded, and overload cut-through will result. (For MS-ISA, the maximum packet rate supported is high enough to not be feasible with realistic application-based traffic mixes).
The ISA aa-performance record should always be enabled in a network for capacity planning purposes in order to properly plan when to add new ISA cards if required and to monitor the network health:
 
 
*A:BNG>config>isa# info 
----------------------------------------------
        application-assurance-group 1 aa-sub-scale residential create
            no description
            primary <slot/port> 
            backup <slot/port>
            no fail-to-open
            isa-capacity-cost-high-threshold 304000
            isa-capacity-cost-low-threshold 272000
            partitions
            statistics
                performance
                    accounting-policy 7
                    collect-stats
                exit
            exit
            divert-fc be
            no shutdown
        exit
 
The commands highlighted in bold above will export information on the total traffic load and resource utilization of the ISA card:
The AA statistics collection configuration refers to accounting policies that are also defined in the 7x50 SR/ESS system:
*A:BNG>config# log
    file-id 7 
        description "ISA Performance Stats"
        location cf2: 
        rollover 15 retention 12 
    exit 
    accounting-policy 7 
        description "ISA Performance Stats“
        collection-interval 15 
        record aa-performance 
        to file 7 
        no shutdown 
    exit 
 
From the AA performance record the following fields in Table 7 can be used as to tracking ISA load in the reporting interval (typically a 15 to 60 minute period):
The intended deployment model is for this statistic record to be collected by 5620 SAM along with all other AA records and be stored in the 5670 RAM database for subsequent analytics purposes, such as trending charts or setting thresholds of key values. It is recommended that a CRON script be used to export the AA performance record to a storage server for post processing if the 5670 RAM is not deployed:
 
 
*A:BNG# file type cf2:/script 
file copy cf2:/act/*.gz ftp://login:password@IP-ADDRESS/acct/router1/
 
*A:BNG>config>cron# info 
----------------------------------------------
        script "test-ftp-act"
            location "cf2:/script"
            no shutdown 
        exit
        action "cron1"
            results "ftp://login:password@IP-ADDRESS/results/router1-result.log"
            script "test-ftp-act"
            no shutdown 
        exit
        schedule "schedule1"
            interval 36000
            action "cron1"
            no shutdown 
        exit
 
Note that the interval 36000 is in seconds (10 hours).
With this XML to CSV export mechanism, a spreadsheet can be used by the network engineer to periodically track the ISA resource utilization.
 
ISA Overload Cut-through
The system can be configured to react to overload based on the weighted-average (WA) queue depth of the shared network port buffer pool from-sub and to-sub. Overload cut-through is typically recommended for use of AA for value-added services where, in the event of overload, the preference is for the ISA to continue to pass packets without AA processing. However, firewall use cases will prefer to drop excess traffic in the event of overload, in which case overload cut-through may not be desired.
In addition to triggering an alarm, further packets sent to the ISA after the WA high-watermark threshold is reached are cut-through immediately by the ISA card without application identification or subscriber policy processing, if the isa-overload-cut-through command is enabled.
The WA queue depth is typically configured based on the maximum tolerated delay for the service diverted and the amount of shared buffer space allocated from the IOM (only for IOM3).
AA deployment recommended settings:
The recommended high and low watermarks assume that the sum of the network port egress queues MBS size is 100% of the shared buffer. If this network queue maximum size is further reduced in the network QoS policy, the watermark values must be adapted proportionally; for example, if the total MBS size cannot exceed 50% of the shared buffer, then the watermark values would be divided by 2 => High Wmark = 16%, Low Wmark = 2%. Adjusting the MBS and the wa-shared-high-wmark and wa-shared-low-wmark values proportionately ensures that the MBS point (after which discards occur) is above the WA shared high-watermark threshold; otherwise, the ISA will not ever overload if MBS discards are occurring first.
A:BNG# configure isa application-assurance-group 1
            isa-overload-cut-through
            qos 
                egress
                    from-subscriber
                        wa-shared-high-wmark 16
                        wa-shared-low-wmark 2
                    exit
                    to-subscriber
                        wa-shared-high-wmark 16
                        wa-shared-low-wmark 2
                    exit
                exit
            exit
 
 
 
The show>isa>group commands can be used to verify that overload cut-though is enabled.
*A:BNG>show isa application-assurance-group 1
=============================================================
ISA Application-assurance-groups
=============================================================
ISA-AA Group Index          : 1
Description                 : (Not Specified)
Subscriber Scale            : residential
WLAN GW Group Index         : N/A
Primary ISA-AA              : 1/2 up/active
Backup ISA-AA               : 2/1 down
Last Active change          : 07/02/2014 12:17:45
Admin State                 : Up
Oper State                  : Up
Diverted FCs                : be
Fail to mode                : fail-to-wire
Partitions                  : enabled
QoS
  Egress from subscriber
    Pool                    : default
      Reserved Cbs          : default
      Slope Policy          : default
    Queue Policy            : default
    Scheduler Policy        :
  Egress to subscriber
    Pool                    : default
      Reserved Cbs          : default
      Slope Policy          : default
    Queue Policy            : default
    Scheduler Policy        :
Capacity Cost
    High Threshold          : 4294967295
    Low Threshold           : 0
Overload Cut Through        : enabled
Transit Prefix
    Max IPv4 entries        : 0
    Max IPv6 entries        : 0
    Max IPv6 remote entries : 0
HTTP Enrichment
    Max Packet Size         : 1500 octets
========================================================================
 
To monitor the load status of an ISA, enter the following CLI command.
*A:BNG>show application-assurance group 1 status isa 5/1 cpu 
==========================================
Application-Assurance ISA CPU Utilization
(Test time 993791 uSec)
==========================================
Management CPU Usage
------------------------------------------
Name               CPU Time    CPU Usage
                  (uSec)
------------------------------------------
System               14277         1.43%
Management           61101         6.15%
Statistics           69850         7.02%
Idle                848563        85.39%
==========================================
Datapath CPU Usage
------------------------------------------
Name              CPU Time     CPU Usage
                  (uSec)
------------------------------------------
System               14277         1.43%
Packet Processing    61101         6.15%
Application ID       69850         7.02%
Idle                848563        85.39%
 
Additionally, the system log files can be used to examine the AA overload history to determine when the overload state was entered and exited. It can be helpful to send AA events to a separate log using the following configuration:
	log 
        filter 45 
            default-action drop
            entry 10 
                action forward
                match
                    application eq "application_assurance"
                exit 
            exit 
        exit 
        log-id 45 
            description "application-assurance log"
            filter 45 
            from main 
            to memory 500
        exit 
 
The log files can then be examined to see if overload has occurred, and how frequently. If overload occurs with any regularity, it is a situation that should be addressed. Below is an example of a log file showing AA overload:
A:BNG# show log log-id 45 
===============================================================================
Event Log 45
===============================================================================
Description : application-assurance log
warning: 13 events dropped from log
Memory Log contents  [size=500   next event=16  (not wrapped)]
 
15 2014/08/14 17:00:32.66 EST WARNING: APPLICATION_ASSURANCE #4433 Base 
"ISA AA Group 1 MDA 5/1 exiting overload cut through processing."
 
14 2014/08/14 17:00:32.55 EST WARNING: APPLICATION_ASSURANCE #4431 Base 
"ISA-AA group 1 MDA 5/1 wa-shared buffer use is less than or equal to 1% in the to-subscriber direction or corresponding tmnxBsxIsaAaGrpToSbWaSBufOvld notification has been disabled."
 
13 2014/08/14 17:00:32.06 EST WARNING: APPLICATION_ASSURANCE #4432 Base 
"ISA AA Group 1 MDA 5/1 entering overload cut through processing."
 
12 2014/08/14 17:00:32.05 EST WARNING: APPLICATION_ASSURANCE #4430 Base 
"ISA-AA group 1 MDA 5/1 wa-shared buffer use is greater than or equal to 35% in the to-subscriber direction."
 
The primary indicator to look at in CLI statistics for ISA load indication is datapath CPU Usage. Regardless of the configuration and traffic profiles in use, datapath CPU usage gives a consistent indication of whether the ISA is under heavy load (the cause of overload is the inability of the ISA to perform more tasks). The idle datapath time is not proportionate to bandwidth throughput, but if idle datapath CPU usage is under 5%, this indicates an approaching maximum processing load.
At an average datapath use of 95-100% (less than 5% idle) the ISA is creating latency and backpressuring the host IOM egress. It is the best way to know how close to overload the ISA has been. Attempting to examine data throughput statistics such as bit rate, flow setup rate and packet rate to predict overload is not recommended, as these are quite variable under normal circumstances and are not directly correlated to overload. Once in overload, the data statistics (volume, setup rate, etc.) are useful for determining what threshold traps to put in place for the future, but the needed thresholds will always be specific to the live deployment traffic mix and policy configuration.
Below is an example of the status for an ISA that is fully loaded but not yet in overload:
*A:BNG>show application-assurance group 1 status isa 5/1 cpu 
==========================================
Application-Assurance ISA CPU Utilization
==========================================
 
----------------------------------------------
Management CPU Usage (Test time 999636 uSec)
----------------------------------------------
Name                  CPU Time     CPU Usage
                      (uSec)     
----------------------------------------------
System                    1540         0.15%
Management                  14        ~0.00%
Statistics              643955        64.42%
ICAP Client                603         0.06%
Idle                    353524        35.37%
----------------------------------------------
 
----------------------------------------------
Datapath CPU Usage   (Test time 999735 uSec)
----------------------------------------------
Name                  CPU Time     CPU Usage
                      (uSec)     
----------------------------------------------
System                  188374        18.84%
Packet Processing       534203        53.43%
Application ID          277158        27.72%
Idle                         0         0.00%
----------------------------------------------
 
In this example, 0% idle datapath CPU means the ISA is fully used. When the Datapath CPU Usage Idle average is in the 5-10% range consistently, the ISA should be considered “full”; to add new subscribers, more ISAs are required.
If the excessive traffic condition persists, backpressure from the ISA to the IOM will buffer packets in the egress buffers, and when the egress MBS is exceeded, the ISA host IOM will indicate Diverted discards due to congestion if cut-through is not enabled:
*A:BNG>show application-assurance group 1 status detail      
===============================================================================
Application-Assurance Status
===============================================================================
Last time change affecting status : 08/12/2014 13:16:15
Number of Active ISAs             : 1
Flows                             : 235754165
Flow Resources In Use             : 12000000
AA Subs Created                   : 14224
AA Subs Deleted                   : 0
AA Subs Modified                  : 1
Seen IP Requests Sent             : 0
Seen IP Requests Dropped          : 0
-------------------------------------------------------------------------------
                                    Current    Average    Peak
-------------------------------------------------------------------------------
Active Flows                      : 8452434    3786948    10632607
Flow Setup Rate (per second)      : 246578     65104      298677
Traffic Rate (Mbps)               : 33702      13229      35813
Packet Rate (per second)          : 6847697    2466118    6945936
AA-Subs Downloaded                : 14224      13710      14224
Active Subs                       : 14224      9934       14224
-------------------------------------------------------------------------------
                                    Packets               Octets
-------------------------------------------------------------------------------
Diverted traffic                  : 8924242848            5983284952320
Diverted discards                 : 752486                729147667
    Congestion                    : 752486                729147667
    Errors                        : 0                     N/A
Entered ISA-AAs                   : 8923417360            5982508976617
Buffered in ISA-AAs               : 57                    19277
Discarded in ISA-AAs              : 0                     0
    Policy                        : 0                     0
    Congestion                    : 0                     0
    Errors                        : 0                     0
Modified in ISA-AAs
    Packet size increased         : 0                     0
    Packet size decreased         : 0                     0
Errors (policy bypass)            : 0                     0
Exited ISA-AAs                    : 8923417303            5982508957340
Returned discards                 : 0                     0
    Congestion                    : 0                     0
    Errors                        : 0                     N/A
Returned traffic                  : 8923285123            5982432640249
===============================================================================
 
ISA Default Subscriber Policy
Default Subscriber Policy — AQP with match criteria not using App-ID or 5-tuple. Match only includes traffic direction and/or ASO characteristic and/or subscriber-name.
It is recommended that each ISA be configured with some default subscriber policies that get applied to all subscribers at all times, independent of application flow ID, and even when an ISA is in overload cut-through. These policies protect the ISA resources and provide fairness of resource allocation between subscribers by limiting the ISA resources that can be consumed by a single subscriber. A starting point for the recommended policers is (in all cases, network-specific tuning is recommended):
For a CLI example of a default subscriber policy, see Application Assurance — App-Profile, ASO and Control Policies .
 
Conclusion
Any deployment of Application Assurance should include careful capacity planning of the ISA resources, with an appropriate ISA overload strategy, whether for overload cut-through to keep excess traffic flowing, or with a discard policy engineered in the host IOM egress QoS policies.
ISA resource use should be monitored via appropriately configured resource thresholds, events, log files, XML records and show screens to ensure that sufficient ISA resources are available as required.