Last Modified: Nov 07, 2022
Known Affected Versions:
15.1.0, 18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52, 184.108.40.206, 15.1.1, 15.1.2, 220.127.116.11, 15.1.3, 18.104.22.168, 15.1.4
Opened: Nov 30, 2020 Severity: 2-Critical
When a PUSH flood vector is programmed to hardware after a flood is detected, rate limiting is performed on all the PUSH packets even when "Only Count Suspicious Events" is enabled.
The packets with PUSH flag for the good connections also get dropped even though "Only Count Suspicious Events" is enabled.
-- Push flood vector is triggered. -- Rate limiting is enabled for the push flood vector. -- The issue is observed only on the hardware platform.
Fixed an issue with rate limiting on PUSH packets.