| Measurement |
Description |
Measurement Unit |
Interpretation |
| ICMP_rate_threshold |
Indicates the limit of ICMP packets handled every 10 milliseconds. |
Pkts/sec |
This threshold is configurable. Once this threshold is violated, subsequent ICMP packets will be dropped by the appliance. You are hence advised to configure this limit based on the current and anticipated ICMP traffic to the NetScaler appliance. To view the configured threshold, use the show ns rateControl command. To set/alter this limit, use the set rateControl command. |
| ICMP_data_received |
Indicates the amount of ICMP data received during the last measurement period. |
MB |
These measures are good indicators of the ICMP load on the NetScaler appliance. |
| Icmp_data_transmitted |
Indicates the amount of ICMP data transmitted during the last measurement period. |
MB |
| Icmp_packets_received |
Indicates the number of ICMP packets received during the last measurement period. |
Number |
| Icmp_packets_transmit |
Indicates the number of ICMP packets transmitted during the last measurement period. |
Number |
| Icmp_echos_received |
Indicates the number of ICMP “Echo Request” and “Echo Reply” packets received during the last measurement period. |
Number |
The echo request is an ICMP message whose data is expected to be received back in an echo reply (“ping”). The host must respond to all echo requests with an echo reply containing the exact data received in the request message. |
| Icmp_echo_replies_recvd |
Indicates the number of ICMP echo replies received during the last measurement period. |
Number |
| Icmp_echo_replies_trans |
Indicates the number of ICMP echo replies transmitted during the last measurement period. |
Number |
| Icmp_port_unreach_recvd |
Indicates the number of times the “ICMP Port Unreachable” error message was received during the last measurement period. |
Number |
The ICMP Port Unreachable error is generated when there is no service running on the port.
Ideally, the value of these measures should be 0. |
| Icmp_port_unreach_gen |
Indicates the number of times the “ICMP Port Unreachable” error message was transmitted during the last measurement period. |
Number |
| Need_frag_received |
Indicates the number of times the “ICMP Fragmentation Needed” error message was received for the ICMP packets during the last measurement period. |
Number |
This measure tracks the ICMP Fragmentation Needed error messages received for packets that must be fragmented but Don't Fragment is specified in the header. |
| Icmp_rate_threshold_exce |
Indicates the number of times the value reported by the ICMP rate threshold measure has been violated. |
Number |
A high value of this measure indicates that the ICMP rate threshold has been violated often. When this happens, you must first ensure that the ICMP packets received are genuine. If they are genuine, then you must increase the current rate threshold.
Note that if the rate threshold is violated, then the appliance will drop subsequent ICMP packets it receives. To assess the impact of the threshold violation, use the ICMP packets dropped measure. If the value of this measure is very high, its a clear call for a change in the rate threshold.
To view the configured threshold, use the show ns rateControl command. To set/alter this limit, use the set rateControl command. |
| Icmp_packets_dropped |
Indicates the number of ICMP packets that were dropped during the last measurement period because the rate threshold was violated. |
Number |
A high value is a cause for concern, and presents a strong case for changing the rate threshold. |
| Bad_icmp_checksum |
Indicates the number of ICMP Fragmentation Needed error messages received with an ICMP checksum error in the last measurement period. |
Number |
Ideally, the value of this measure should be zero. |
| Pmtu_nonfirst_ip_frag |
Indicates the number of “ICMP Fragmentation Needed” error messages received for an IP fragment other than the first one upon Path MTU Discovery during the last measurement period. |
Number |
NetScalers have a feature called Path MTU Discovery, which is actually a common feature on most networking devices. Path MTU Discovery allows a networking device such as the NetScaler, or routers and switches, to determine the largest packet size allowed along an arbitrary network path. This enables network traffic to flow correctly from one endpoint to another, without any of the traffic being dropped.
The IP protocol has a mechanism for signaling that datagrams are too large to pass through an interface on a network path – when a datagram is received on a router or Layer 3 switch interface that is larger than the interface’s MTU, the device sends an Internet Control Message Protocol (ICMP) message to the previous hop device indicating that the datagram needs to be fragmented in order to pass through that interface, as well as the MTU of the interface. The previous hop device breaks the datagram into pieces that are small enough to pass the next hop interface's MTU.
While this mechanism is usually sufficient to allow traffic to continue normally, it does have some drawbacks. The increase in the number of datagrams from fragmenting means Layer 3 routing has that much more work to do in routing decisions. There is always the possibility that another device further along the network path has an interface with an even smaller MTU and requires further fragmentation, and when the destination device for these datagrams eventually receives them, all datagram fragments must be received so it can be reassembled correctly. If all fragments are not received, the entire original datagram is dropped and must be retransmitted by the sending station (and will probably be fragmented in transit again). This is why, the value of this measure should be kept at a minimum. |
| Pmtu_invalidbodylen_revd |
Indicates the number of “ICMP Fragmentation Needed” error messages received for invalid body length of the packets determined by the Path MTU Discovery during the last measurement period. |
Number |
|
| Pmtu_no_tcp_conns |
Indicates the number of “ICMP Fragmentation Needed” error messages received for TCP packets during the last measurement period. |
Number |
The state of the connection for these packets is not maintained on the NetScaler appliance. |
| Pmtu_no_udp_conns |
Indicates the number of “ICMP Fragmentation Needed” error messages received for UDP packets during the last measurement period. |
Number |
The state of the connection for these packets is not maintained on the NetScaler appliance. |
| Pmtu_invalid_tcp_seqno |
Indicates the number of “ICMP Fragmentation Needed” error messages received for the packets containing an invalid TCP address determined by the Path MTU Discovery during the last measurement period. |
Number |
|
| Invalid_next_mtu |
Indicates the number of “ICMP Fragmentation Needed” error messages received for the packets in which the Maximum Transmission Unit (MTU) for the next hop was out of range during the last measurement period. |
Number |
The range for the MTU is 576-1500. |
| Next_mtu_current_mtu |
Indicates the number of “ICMP Fragmentation Needed” error messages received in which the value for the next MTU was higher than the current MTU during the last measurement period. |
Number |
|
| Pmtu_invalid_proto_recvd |
Indicates the number of “ICMP Fragmentation Needed” error messages received for the packets containing protocols other than the TCP and UDP protocols during the last measurement period. |
Number |
|
| Pmtu_ip_checksum_error |
Indicates the number of “ICMP Fragmentation Needed” error messages received for the packets containing IP checksum errors during the last measurement period. |
Number |
|
| Pmtu_pcb_with_no_link |
Indicates the number of “ICMP Fragmentation Needed” error messages received on a Protocol Control Block (PCB) with no link during the last measurement period. |
Number |
The PCB maintains the state of the connection. |
| Pmtu_discovery_notenable |
Indicates the number of “ICMP Fragmentation Needed” error messages received when the Path MTU Discovery was not enabled during the last measurement period. |
Number |
|