Description | This article describes the Traffic Shaping behavior in different platforms |
Scope | FortiGate. |
Solution |
NP6/NP6Lite/NP6xLite: The TPE Shaper implemented in NP6, NP6Lite, and NP6xLite ASICs functions primarily as a police rather than a traditional shaper. It operates effectively when packets are transmitted at a consistent rate. The TPE Shaper assesses the traffic against a predefined quota for each interval. It allows a certain amount of traffic to pass within each interval and drops any excess once the quota is met.
Example Scenario:
NP7/NP7Lite: NP7 and NP7Lite ASICs offer two shaping mechanisms:
Users can configure the desired traffic management method using:
config system npu set default-qos-type [policing|shaping] end
Shaper and Policer Use Cases:
Case1: Iperf3 No Limit and no Shaper Purpose: Establishes a baseline for the line and FortiGate's handling capacity, showing performance over 10Mbps.
Case 2: Iperf3 No Limit. 10M Upload/Download Traffic Shaping Policy (QTM Shaper). Observation: Demonstrates QTM shaper behavior with packet drops due to buffer overflow.
Case 3: Iperf3 11M Limit. 10M Upload/Download Traffic Shaping Policy (QTM Shaper). Observation: Shows reduced packet drops (193 drops) compared to Case 2 (4758 drops) with the QTM shaper.
Case 4: Iperf3 No Limit. 10M Upload/Download Traffic Shaping Policy (TPE Shaper). Observation: As a policer, the TPE shaper drops packets exceeding the policy limits. Packet drops will trigger TCP congestion control. Host TCP stack will lower the flow to half of the original throughput or lower.
Case 5: Iperf3 11M Limit. 10M Upload/Download Traffic Shaping Policy (TPE Shaper). Observation: Demonstrates fewer packet drops (1166 drops) compared to Case 4 (1884 drops) using the TPE shaper under a policer configuration.
Case 6: Iperf3 No Limit - 10M Upload/Download Traffic Shaping Policy - No NP Offloading (Kernel Shaper) Observation: Shows the Kernel Shaper's performance with no drops at the NPU level, indicating no NP offloading.
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.