Page 1
CISCO CATALYST 4000 AND 4500
TROUBLESHOOTING
SESSION RST-3508
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Troubleshooting
• Connectivity
• Performance
• Unexpected feature behavior
Which then impacts connectivity and/or
performance
1
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2004 Cisco Systems, Inc. All rights reserved.
222
Page 2
Cisco Catalyst 4500 IOS Supervisor Options
Supervisor V
Optional NetFlow Daughter Card
Supervisor IV
-Based Supervisors
®
Optional NetFlow Daughter Card
Catalyst 4500 Series
Supervisor II-Plus
Cisco IOS
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
• Optimized for Large Networks (Premium HW and SW Services)
• Support for Higher Port Densities (Catalyst 4510R)
• Advanced Layer 3 Switching/Routing (OSPF, EIGRP, IS:IS)
• Highly Scalable Layer 2/3/4 Services
• Supports Up to 10 Active Slots—96Gbps + 72Mpps
• Redundancy Support in 4507R and 4510R Chassis
• Catalyst 4503, 4506, 4507R, 4510R, and 4006 Chassis
• Cisco IOS-Based
• Optimized for Medium Networks
• Advanced Layer 3 Switching/Routing (OSPF, EIGRP, IS:IS)
• Scalable Layer 2/3/4 Services
• Supports Up to 5 Active Slots—64Gbps + 48Mpps
• Redundancy Support in 4507R Chassis
• Advanced Layer 3 Switching
• Catalyst 4503, 4506, 4507R and 4006 Chassis
• Cisco IOS-Based
• Optimized for Smaller Networks
• Basic Layer 3 Switching/Routing (RIP and Static)
• Layer 2/3/4 Intelligent Services
• Supports Up to 5 Active Slots—64Gbps + 48Mpps
• Redundancy Support in 4507R Chassis
• Catalyst 4503, 4506, 4507R and 4006 Chassis
• Cisco IOS-Based
Catalyst 4500 Supervisor Engines
Key Differences Among II+, IV and V
333
Basic L2/3/4 Services Multi-Layer Switching
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Supervisor IV Supervisor II-Plus
Full L2/3/4 Services and
Routing
No No Multicast Suppression
Non-Blocking Gig Only Non-Blocking Gig Only QoS Sharing
Pass-Through Pass-Through QinQ
2 2 Active Redundant Sup Uplinks
Supervisor V
96 Gbps 64 Gbps 64 Gbps Switching Capacity
72 Mpps 48 Mpps 48 Mpps Throughput
Full L2/3/4 Services and Routing
Yes Yes No (E)IGRP,OSPF,BGP, ISIS
Yes Yes Yes RIP, Static Routes
C4006, C4503, C4505, C4507, C4510 C4006, C4503, C4505, C4507 C4006,C4503,C4505,C4507 Chassis Support
400 MHz 333 MHz 266 MHz CPU
128K 128K 32K IP CEF Entries
512 512 256 SDRAM
4K 4K 2K Active VLANs
28K(L3) 16K (L2) 28K(L3) 16K (L2) 12K(L3) 16K (L2) Multicast Entries
3K 3K 1.5K STP Instance
4K 4K 1K SVI
Yes (512KB) Yes (512KB) Flash Simulated NVRAM NVRAM
Yes (16K) Yes (16K) Yes (8K) IGMP Snooping
Yes Yes No Netflow Support
Hardware Software Software Broadcast Suppression
Yes
All Ports
In Hardware
4
444
Page 3
Catalyst 4500 Series:
Cisco IOS Software Options
• Single Cisco IOS image across all switches
• Basic (cat4000-i9s-mz) :
RIP v1/2, static routes, AppleTalk, IPX
• Enhanced (cat4000-i5s-mz)
(Supervisor engines IV, V): OSPF, (E)IGRP, BGP, IS-IS
• Crypto images basic (cat4000-i9k91s-mz ) and
enhanced (cat4000-i5k91s-mz) provide :
SSH v1
SSH v2 (12.1.19EW and higher)
• Multicast, PBR, security is included in all
images
• Redundancy is supported for all images
• Supervisor II-Plus supports only the basic
images
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Cisco IOS Versions for Cisco IOS-Based
Supervisors
• The GD train 12.1.20E is based on the
features in Cisco IOS 12.1.(12c) EW
• The Cisco IOS 12.2(18) EW release will be
the ongoing maintenance release vehicle
• For the latest features always use latest
CCO EW release
555
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2004 Cisco Systems, Inc. All rights reserved.
666
Page 4
Show Version (Sup II-Cat OS)
RST-3508
9805_05_2004_c2
cat4503> (enable) show version
WS-C4503 Software, Version NmpSW: 7.4(1)
Copyright (c) 1995-2002 by Cisco Systems, Inc.
NMP S/W compiled on Sep 20 2002, 11:46:26
GSP S/W compiled on Sep 20 2002, 11:24:50
System Bootstrap Version: 5.4(1)
Hardware Version: 2.0 Model: WS-C4503 Serial #: FOX07071SXT
Mod Port Model Serial # Versions
--- ---- ------------------ -------------------- -------------------------------
--
1 2 WS-X4013 JAB0437072X Hw : 2.0
2 48 WS-X4148 JAB034401CJ Hw : 1.6
DRAM FLASH NVRAM
Module Total Used Free Total Used Free Total Used Free
------ ------- ------- ------- ------- ------- ------- ----- ----- -----
1 65536K 39128K 26408K 16384K 10058K 6326K 480K 302K 178K
Uptime is 20 days, 14 hours, 45 minutes
© 2004 Cisco Systems, Inc. All rights reserved.
Minimum
Cat OS for
4500
Chassis
Gsp: 7.4(1.0)
Nmp: 7.4(1)
777
Show Version (Cisco IOS Supervisors)
cat4500#sh version
Cisco Internetwork Operating System Software
IOS (tm) Catalyst 4000 L3 Switch Software (cat4000-I5S-M), Version 12.2(18)EW , EARLY DEPLOYMENT RELEASE
SOFTWARE (fc1)
TAC Support: http://www.cisco.com/tac
Copyright (c) 1986-2002 by cisco Systems, Inc.
Compiled Fri 20-Dec-02 13:52 by eaarmas
Image text-base: 0x00000000, data-base: 0x00E638AC
Compiled Fri 30-Jan-04 01:55 by hqluong
Image text-base: 0x00000000, data-base: 0x010B0624
ROM: 12.1(12r)EW
Dagobah Revision 90, Swamp Revision 24
r3_4507R_S4 uptime is 3 weeks, 6 days, 18 hours, 39 minutes
System returned to ROM by reload
System restarted at 17:00:36 PST Wed Mar 24 2004
System image file is "bootflash:cat4000-i5s-mz.122-18.EW.bin“
cisco WS-C4507R (XPC8245) processor (revision 4) with 524288K bytes of memory .
Processor board ID FOX062105FU
Last reset from Redundancy Reset
76 Gigabit Ethernet/IEEE 802.3 interface(s)
403K bytes of non-volatile configuration memory.
Configuration register is 0x2102
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Minimum
IOS is
12.1(12c)EW
for 4500
Chassis
888
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 5
Disaster Recovery: Using Management
Port, fa1, for Network Boot
rommon 2 >set
rommon 5 >set interface fa1 172.20.64.158 255.255.255.0
rommon 3 >set ip route def ault 172.20.64.1
rommon 7 >set TftpServer 1 72.20.64.136
rommon 6 >ping 172.20.64.1 36
Host 172.20.64.136 is alive
rommon 11 >boot tftp://172.20.64.136/tftpboot/cat4000-i5s-mz.122-18.EW.bin
Tftp Session details are ....
Filename : /tftpboot/cat 4000-i5s-mz.122-18.EW.bin
IP Address : 172.20.64.158
Loading from TftpServer: 172 .20.64.136
Received data packet # 20019
Loaded 10249540 bytes successfully .
RST-3508
9805_05_2004_c2
use the set command w no options to check for and verify IP settings
© 2004 Cisco Systems, Inc. All rights reserved.
999
Agenda
• Redundancy
• Hardware and Related Issues
• Unicast Packet Forwarding
• Multicast Packet Forwarding
• ACLs
• QoS
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
101010
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 6
REDUNDANCY
RST-3508
9805_05_2004_c2
© 2003, Cisco Systems, Inc. All rights reserved.
Supervisor Redundancy (4507R/4510R)
• Route Processor Redundancy (RPR)
• One supervisor active
• Other supervisor suspended during bootup
Console to standby supervisor not available thereafter
Cisco Internetwork Operating System Software
IOS (tm) Catalyst 4000 L3 Switch Software (cat4000-I5S-M), Version 12.2(18)EW,
EARLY DEPLOYMENT RELEASE SOFTWARE (fc1)
TAC Support: http://www.cisco.com/tac
Copyright (c) 1986-2004 by cisco Systems, Inc.
Compiled Fri 30-Jan-04 01:55 by hqluong
Image text-base: 0x00000000, data-base: 0x010B0624
***********************************
* STANDBY SUPERVISOR *
* REDUNDANCY mode is RPR *
* Waiting for Switchover Activity *
***********************************
111111
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
121212
Page 7
Supervisor Redundancy
During Switchover the Standby Supervisor
• Completes the booting sequence
***********************************
* STANDBY SUPERVISOR *
* REDUNDANCY mode is RPR *
* Waiting for Switchover Activity *
***********************************
cisco WS-C4507R (MPC8245) processor (revision 4) with 524288K bytes of memory.
Processor board ID FOX062105G1
Last reset from Reload
1 Virtual Ethernet/IEEE 802.3 interface(s)
96 FastEthernet/IEEE 802.3 interface(s)
26 Gigabit Ethernet/IEEE 802.3 interface(s)
403K bytes of non-volatile configuration memory.
Uncompressed configuration from 7028 bytes to 17442 bytes
• Resets the modules so they can perform self diagnostics
• Parses the configuration
• Waits for the modules to come online and links to get
established
• Builds routing tables, MAC-address tables, and other dynamic
protocols
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
131313
Cisco Catalyst 4507R/4510R Supervisor
Redundancy
What Is Synchronized?
• Startup configuration
(by issuing the write memory command)
• Boot-variable
• Configuration-register
• Calendar
• VLAN database
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
141414
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 8
Cisco Catalyst 4507R/4510R Supervisor
Redundancy
What Is Not Synchronized?
• Running configurations
• Routing table/FIB/adjacency table
• MAC-address table
• Cisco IOS images: Should be the same
(not enforced by software)
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Accessing the Standby Supervisor
Console Port Is Not Available After Initialization State
Commands
dir slavebootflash:
dir slaveslot0:
del slave bootflash: < filename>
del slaveslot0: < filename>
squeeze slavebootflash:
squeeze slaveslot0:
format slavebootflash:
format slaveslot0:
copy <source> slavebootflash:
copy <source>slaveslot0:
Performs Squeeze Function After
Delete to Recover Device Space
Supervisor Files or TFTP Server
Description
Lists Contents
Deletes Specific Files
Format the Standby
Source Could Be Active
151515
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2004 Cisco Systems, Inc. All rights reserved.
161616
Page 9
Supervisor Redundancy
cat4507R#sh module
Chassis Type : WS-C4507R
Power consumed by backplane : 40 Watts
Mod Ports Card Type Model Serial No.
---+-----+--------------------------------------+------------------+-----------
1 2 1000BaseX (GBIC) Supervisor(active) WS-X4013+ JAB071904FP
2 2 1000BaseX (GBIC) Supervisor(standby) WS-X4013+ JAB071904FD
3 48 10/100BaseTX (RJ45)V, Cisco/IEEE WS-X4248-RJ45V JAB074005BE
M MAC addresses Hw Fw Sw Status
--+--------------------------------+---+------------+----------------+---------
1 0009.e845.6300 to 0009.e845.6301 0.3 12.1(20r)EW 12.2(18)EW, EARL Ok
2 0009.e845.6302 to 0009.e845.6303 0.3 12.1(19r)EW 12.2(18)EW, Ok
3 0005.9a80.3c00 to 0005.9a80.3c2f 0.9 Ok
System Failures:
----------------
Power Supply: bad/off (see 'show power')
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
171717
Supervisor Redundancy
cat4507R#sh mod
Chassis Type : WS-C4507R
Power consumed by backplan e : 40 Watts
Mod Ports Card Type Model Serial No.
---+-----+---------------- ----------------------+------------------+-----------
1 2 1000BaseX (GBIC) Su pervisor(active) WS-X4013+ JAB071904FP
2 Standby Supervisor
3 48 10/100BaseTX (RJ45)V, Cisco/IEEE WS-X4248-RJ45V JAB074005BE
M MAC addresses Hw Fw Sw Status
--+----------------------- ---------+---+------------+----------------+---------
1 0009.e845.6300 to 0009.e845.6301 0.3 12.1(20r)EW 12.2(18)EW, EARL Ok
2 Unknown Unknown Unknown Other
3 0005.9a80.3c00 to 0005.9a80.3c2f 0.9 Ok
System Failures:
----------------
Power Supply: bad/off (see 'show power')
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
181818
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 10
Power Supply Redundancy
cat4500(config)#power redundancy-mode ?
combined combine power supply outputs (no redundancy)
redundant either power supply can operate system (redundancy)
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Power Supply Redundancy
cat4507R#show power
Power Fan Inline
Supply Model No Type Status Sensor Status
------ ---------------- --------- ----------- ------- -------
PS1 PWR-C45-2800AC AC 2800W bad/off bad/off bad/off
PS2 PWR-C45-1400AC AC 1400W good good n.a.
*** Power Supplies of different type have been detected***
Power supplies needed by system : 2
Power supplies currently available : 1
*** Insufficient power supplies present for specified configuration ***
Power Summary Maximum
(in Watts) Used Available
---------------------- ---- ---------
System Power (12V) 335 1360
Inline Power (-50V) 0 0
Backplane Power (3.3V) 40 40
---------------------- ----
Total Used 375 (not to exceed Total Maximum Available = 1400)
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
191919
202020
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 11
HSRP Redundancy
• HSRP configured between supervisors on
different Catalyst 4500 chassis
• HSRP configured between a Catalyst 4500
and an external router
• No HSRP between two supervisors on the
same chassis since the standby supervisor
is in suspended mode
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Port Channel Redundancy
• Layer 2 EtherChannel
All interfaces in the same VLAN or trunks with trunking mode the same on
both ends
When trunking…allowed ranges of VLANs must be the same
• Layer 3 EtherChannel bundles
Port channel must be created first; then...
Use “no switchport” to create the layer 3 ports in the channel
• Supervisor Engine ports in an EtherChannel
Supervisor II: Both ports can be in the EtherChannel
Single Cisco IOS supervisor in slot 1 or 2: gi1/1–2 or gi2/1–2 active
With Sup II-Plus or IV Dual Supervisors, only gig1/1 AND gig2/1 active; but
gig1/2 and gig2/2 can be placed in an EtherChannel bundle for backup
With Supervisor V, all four uplinks are active
®
bundles
212121
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2004 Cisco Systems, Inc. All rights reserved.
222222
Page 12
Channel Troubleshooting
Commands Similar to the PAgP Commands Are Available for LACP
r3_4506#sh etherchannel summary(truncated output)
Flags: D - down P - in port-channel
I - stand-alone s - suspended
R - Layer3 S - Layer2
U - in use
Number of channel-groups in use: 2
Number of aggregators: 2
Group Port-channel Protocol Ports
------+-------------+-----------+--------------------------1 Po1(S U) PAgP Gi1/1(P) Gi1/2(P)
2 Po2(R U) PAgP Fa3/46(P) Fa3/47(P)
r3_4507R_S4#sh int gig1/1 etherchannel (truncated)
Port state = Up Cnt-bndl Suspend Not-in-Bndl
Flags: S - Device is sending Slow hello. C - Device is in Consistent state.
A - Device is in Auto mode. P - Device learns on physical port.
d - PAgP is down.
Local information:
Port Flags State Timers Interval Count Priority Method Ifindex
Gi1/1 d U1/S1 1s 0 128 Any 0
Age of the port in the current state: 27d:19h:18m:59s
Probable reason: Source monitor interfaces are not allowed to be part of an
etherchannel
Hello Partner PAgP Learning Group
Ages Every 30 Secs
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
r3_4506 #sh int port-channel 1 ( truncated)
Port-channel1 is up, line protocol is up (connected)
Description: to cat4507R
MTU 1500 bytes, BW 2000000 Kbit, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Full-duplex, 1000Mb/s, media type is N/A
Members in this channel: Gi1/1 Gi1/2
r3_4506(config)#port-channel load-balance ?
r3_4506sh etherchannel load-balance
Source XOR Destination IP address
r3_4506#sh pagp neighbor
Flags: S - Device is sending Slow hello. C - Device is in Consistent state.
A - Device is in Auto mode. P - Device learns on physical port.
Channel group 1 neighbors
Partner Partner Partner Partner Group
Port Name Device ID Port Age Flags Cap.
Gi1/1 r3_4507R_S4.cisco.co 0009.e845.5f00 Gi1/1 17s SC 10001
Gi1/2 r3_4507R_S4.cisco.co 0009.e845.5f00 Gi2/1 24s SC 10001
Global Command
dst-ip Dst IP Addr
dst-mac Dst Mac Addr
dst-port Dst TCP/UDP Port
src-dst-ip Src XOR Dst IP Addr
src-dst-mac Src XOR Dst Mac Addr
src-dst-port Src XOR Dst TCP/UDP Port
src-ip Src IP Addr
src-mac Src Mac Addr
src-port Src TCP/UDP Port
23 23 23
HARDWARE AND
RELATED ISSUES
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2003, Cisco Systems, Inc. All rights reserved.
242424
Page 13
Switch Management Interfaces
Cisco Catalyst OS
Cat4K-c (enable) sh int
sl0: flags=50<DOWN,POINTOPOINT,RUNNING>
slip 0.0.0.0 dest 0.0.0.0
sc0: flags=63<UP ,BROADCAST,RUNNING>
vlan 1 inet 1.1.1.3 netmask 255.255.255.0 broadcast 1.1.1.255
me1: flags=62<DOWN ,BROADCAST,RUNNING>
inet 0.0.0.0 netmask 0.0.0.0 broadcast 0.0.0.0
• sc0 inband management interface
• sc0 connects to switching fabric
• sc0 participates in STP, CDP, VLAN membership
• sl0 and me1 out-of-band management interfaces
• sl0 and me1 do not connect to switching fabric
• sl0 and me1 do not participate in STP, CDP, VLAN membership
• Only one out of sc0 and me1 can be up
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
252525
Switch Ports/Interfaces
• On Cisco Catalyst OS switches these are
Layer 2 ports
• On Cisco IOS switches these can be
Layer 3 routed interfaces
Layer 3 Switched Virtual interfaces (SVIs)
Layer 3 portchannel interfaces
Layer 2 switchport interfaces—access or trunk
Layer 2 portchannel interfaces
• By default on Cisco IOS switches the interfaces are
Layer 2 switchport interfaces
• “no switchport ” command converts these to Layer
3 routed interfaces
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
262626
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 14
High CPU Usage-Supervisor II
Console> (enable) show proc cpu
PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process
--- ----------- ---------- -------- ------- ------- ------- --- ---------------
(truncated)
98 23438905 7904296 9352 86.64% 89.57% 87.50% 0 Switching overhead
99 2271479 1443242 57968 1.19% 1.04% 0.98% 0 Admin overhead
(truncated)
Remember: Kernel and Idle CPU Usage Is the Percentage of Time the CPU Was Idle
Console> (enable) sh proc cpu
(truncated)
CPU utilization for five seconds: 14.45%
PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process
--- ----------- ---------- -------- ------- ------- ------- --- --------------1 345976604 0 0 85.55% 85.00% 85.00% -2 Kernel and Idle
RST-3508
9805_05_2004_c2
one minute: 15.00%
five minutes: 15.00%
© 2004 Cisco Systems, Inc. All rights reserved.
272727
High CPU Usage-Supervisor II
• Switching overhead
Address learning (path setup) for new MAC addresses
Normal host entry aging, as well as fast aging due to reception of
STP topology Change notification
Packet processing for control traffic such as STP BPDUs, CDP,
VTP, DTP, PAgP, and so forth
Packet processing for management traffic such as telnet, SNMP,
and HTTP
• Admin overhead
Switch fabric Application Specific Integrated Circuit (ASIC) and
other hardware management
Line card ASIC management
Port monitoring
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
282828
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 15
Cisco IOS Supervisor CPU Usage
Total CPU Utilization (Process + Interrupt)
cat4500# sh proc cpu
CPU utilization for five seconds: 73%/17%; one minute: 74%; five minutes: 76%
PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process
1 2358396 1705816 1382 0.32% 1.17% 0.68% 0 IP-EIGRP Router
2 2337276 21210 110196 0.00% 0.80% 0.89% 0 Check heaps
8 6551276 3786002 1730 3.05% 4.41% 4.70% 0 IP Input
9 24211844 1644250 14725 27.91% 26.06% 25.45% 0
22 15663744 474459 33014 19.71% 20.67% 21.89% 0 TCP Driver
32 508 36 14111 5.07% 0.73% 0.15% 13 Virtual Exec
Interrupt level
Average
Interrupt level
Processing Time
• Make sure to distinguish interrupt and process level
• A CPU utilization value of 20% to 50% is normal, even under
minimal load with Power over Ethernet (PoE) line cards
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
TCP Timer
292929
CPU Troubleshooting Commands:
Cisco IOS Supervisor
cat4500# sh proc cpu
CPU utilization for five seconds: 99%/0 %; one minute: 27%; five minutes: 15%
PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process
(truncated)
25 1599072 5303348 301 10.01% 9.20% 8.20% 0 Cat4k Mgmt HiPri
26 1869444 522959 3574 86.16% 78.67% 36.07% 0 Cat4k Mgmt LoPri
• The Mgt Hi-Priority and Mgt Low-Priority are two processes
that Cisco Catalyst 4500 platform code runs
• These two processes share total CPU usage among other
Cisco IOS processes
The reason there are two processes is when a job in Cisco Catalyst 4500
platform takes longer time than expected or exceeds the max allocated
CPU time, the job would be run under low-priority for sometime until it's
usage is reduced, this would give other higher priority (IOS) process a
chance to run
• If the above two processes consume most of the CPU time
further investigation is now needed
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
303030
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 16
High CPU Usage: Cisco IOS Supervisors
• CPU usage is not indicative of forwarding
performance on any supervisor
• Forwarding decisions are made in hardware
• Packets sent to the CPU
Control packets: STP, CDP, PAgP, LACP, UDLD
Routing protocol updates
IPX/Appletalk
SNMP/telnet/
ARP responses to ARP requests
Packets with IP options/expired TTL or non-ARPA encaps
Packets with special handling, i.e. tunneling, encryption
ACL logging enabled
Input ACL drops
MTU check failure
Adjacency same interface
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
313131
Extras: QoS on the CPU Port
0: ESMP
1: Control
Packets to
the CPU
…
CPU Queues
• Protects important traffic when CPU usage is high
BPDUs/routing updates get priority
R S T - 3508
9805 _05 _20 04_ c2
Can still telnet or SNMP query when CPU is high
© 200 4 C i sco S y stem s, Inc . A l l ri gh ts r e se rved .
2: Host Learning
3– 5: L3 Forwarding
9– 10: L3 Rx (Telnet/SNMP)
15: MTU Fail/Invalid
32 32 32
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 17
Show Platform CPU Statistics Fields:
• ESMP:
Even Simpler Management Protocol…used by the CPU for reading line card status:
link, speed, led, etc.
• Control:
L2 control plane packets go here—STP, CDP, PaGP, LACP, UDLD, etc.
• Host learning:
Packets with unknown L2 source address are copied to CPU to build CAM table
• L3 fwd:
GRE tunnels
Gleaning
• L2 fwd: Any non-IP switchable packet
IPX/Appletalk
Zero TTL field
Non-ARPA encapsulated packets
ARP’s
• L3 Rx:
L3 packets to the switch—SNMP, telnet, ping
• ACL forward
RST-3508
9805_05_2004_c2
EIGRP/OSPF updates
© 2004 Cisco Systems, Inc. All rights reserved.
333333
CPU Troubleshooting Commands:
Cisco IOS Supervisor
cat4500# show platform cpu packet statistics (all)>>> lots of output, look for
Total packet queues 16
Packets Received by Packet Queue
Queue Total 5 sec avg 1 min avg 5 min avg 1 hour avg
---------------------- --------------- --------- --------- --------- ---------Esmp 42808 38 38 34 6
Control 9919 11 10 8 1
Host Learning 39 0 0 0 0
L3 Fwd High 0 0 0 0 0
L3 Fwd Medium 0 0 0 0 0
L3 Fwd Low 0 0 0 0 0
L2 Fwd High 0 0 0 0 0
L2 Fwd Medium 0 0 0 0 0
L2 Fwd Low 99929 0 5 92 17
L3 Rx High 0 0 0 0 0
L3 Rx Low 36 0 0 0 0
RPF Failure 0 0 0 0 0
ACL fwd(snooping) 1165 1 1 1 0
ACL log, unreach 0 0 0 0 0
ACL sw processing 0 0 0 0 0
MTU Fail/Invalid 0 0 0 0 0
L2 and L3 High, Medium, and Low Are Based on the DSCP/COS
Field of the Packet
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
343434
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 18
CPU Troubleshooting Commands:
Cisco IOS Supervisor
Look for Received Packets and Rx Drops
cat4500# sh platform cpu packet driver
( truncated)
Queue rxTail received all guar allJ gurJ rxDrops rxDelays
0 Esmp 63A6B70 25708 100 100 0 5 0 0
1 Control 63A6CF4 5405 595 600 0 5 0 0
2 Host Learning 63A76A0 24 500 500 0 5 0 0
3 L3 Fwd High 63A7E10 0 300 300 0 5 0 0
4 L3 Fwd Medium 63A82C0 0 500 500 0 5 0 0
5 L3 Fwd Low 63A8A90 0 900 900 0 5 0 0
6 L2 Fwd High 63A98A0 0 300 300 0 5 0 0
7 L2 Fwd Medium 63A9D50 0 500 500 0 5 0 0
8 L2 Fwd Low 63AB2E4 99929 899 900 0 5 434063 0
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Monitor the CPU on Cisco Catalyst 4500
• Incoming packets are allowed on SPAN destination port
• Monitor the CPU port (excellent in capturing high CPU util)
• Cisco Catalyst 4500: Only LAN Switch where you can monitor on the CPU port
MAC
MAC
Table
Table
FFE
FFE
CPU
CPU
Source Port/
VLAN
RST-3508
9805_05_2004_c2
Monitor
Destination
Port
Modules
Input
Packet
Enable
Inpkts
© 2004 Cisco Systems, Inc. All rights reserved.
Switch Fabric
Switch Fabric
PPE
PPE
Packet
Packet
Memory
Memory
Mirror Source Ports, VLANs, CPU With
SPAN Capabilities on Catalyst 4500
ACL
ACL
TCAM
TCAM
353535
363636
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 19
Monitoring the CPU on Cisco Catalyst 4500
IOS Supervisors
r3_4506 #sh monitor session 1
Session 1
--------Type : Local Session
Source Ports :
RX Only : CPU(Queues: 32)
Destination Ports : Fa3/37
Encapsulation : Native
Ingress : Disabled
Learning : Disabled
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
C(config)#monitor session 1 source cpu queue ?
<1-32> SPAN source CPU queue numbers
acl Input and output ACL [13-20]
adj-same-if Packets routed to the incoming interface
[7]
all All queues [1-32]
bridged L2/bridged packets [29-32]
control-packet Layer 2 Control Packets [5]
mtu-exceeded Output interface MTU exceeded [9]
nfl Packets sent to CPU by netflow (unused) [8]
routed L3/routed packets [21-28]
rpf-failure Multicast RPF Failures [6]
span SPAN to CPU (unused) [11]
unknown-sa Packets with missing source address [10]
373737
Ping Latency
• Low priority task on the CPU
• Response times of 7–10 ms are typical on
an idle switch
• Pings through the switch are handled as
ordinary data packets and switched in HW
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
383838
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 20
Best Practices
• Baseline the CPU in steady state
Normally which processes are causing the highest CPU usage
• When troubleshooting
Are high CPU processes different from the baseline?
Is the CPU consistently elevated or just spiking?
Are there TCNs in the network caused by flapping ports?
Is there excessive broadcast or multicast traffic in the
management subnet or VLAN?
Is there excessive management traffic such as SNMP polling?
• Isolate the management VLAN from VLANs with
user data traffic
Particularly heavy broadcast traffic such as IPX or AppleTalk
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Cisco Catalyst 4500 Architecture
• 3-slot, 6-slot chassis—one supervisor
with two or five module slots
• 7-slot chassis—one or two
supervisors with five module slots
• 10-slot chassis—one or two
supervisors (Supervisor V only) with
eight module slots
• Cisco IOS supervisors provide:
Central forwarding engine
(Fast Forwarding Engine, FFE)
Buffering and 64 Gbps fabric (Packet
Processing Engine, PPE)…96 Gbps
fabric with Supervisor V and PPE2
• 12 Gbps bandwidth to each module
• Auto MDIX on 10/100/1000 Ports
• Modules are transparent:
Contain simple “stub” ASICs, PHYs
RST-3508
9805_05_2004_c2
No buffering or local switching
© 2004 Cisco Systems, Inc. All rights reserved.
Switching
Switching
Module
Module
Note: Supervisor Engine V Supports
3 Additional Line Card Slots
Forwarding Engine (FFE)
Forwarding Engine (FFE)
Shared Memory
Shared Memory
Fabric (PPE)
Fabric (PPE)
12 Gbps
Switching
Switching
Module
Module
12 Gbps
Switching
Switching
Module
Module
12 Gbps
Switching
Switching
Module
Module
12 Gbps
393939
12 Gbps
Switching
Switching
Module
Module
404040
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 21
Blocking and Non-Blocking GigE Ports
• A port that does not oversubscribe
access to the switching fabric is a nonblocking port
• A port that oversubscribes access to the
switching fabric is a blocking port
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Cisco Catalyst 4000/4500 Linecards
• Six full-duplex GbE connections to switch fabric
• Transparent
No local forwarding—all packets go to supervisor
• GbE connections from switch fabric straight to
front-panel port or connect to stubs
Supervisor Switch Fabric
Six Full-Duplex Gbps
Connections to
Supervisor Switch
Fabric
414141
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2004 Cisco Systems, Inc. All rights reserved.
424242
Page 22
Stub ASIC Overview
• Fans out GigE ports from
switch fabric
• Up to 8 front-panel ports;
10/100, 1000-only, or
10/100/1000
• Flow control on gigabit
interfaces
• Ports can be used in an
EtherChannel
• Not always oversubscribed
e.g. 10/100
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
GbE to/from
Switch Fabric
Up to 8 Front-Panel
Ports, 10/100/1000
434343
IEEE 802.3x Flow Control
• Standards-based mechanism used to control data flow
• Basic steps
1) Data flows to switch
2) Switch congested so “pause” frame sent
3) End station waits required time before sending
4) IOS supervisors support both Tx and Rx pause frames
Gigabit Ethernet
Switch
1. Data Flows
to Switch
Port Rx-No-Pkt-Buff RxPauseFrames TxPauseFrames PauseFramesDrop
Gi4/7 0 35648 4854 0
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
2. Switch Congested
“Pause” Frame Sent
3. End Station Waits
Required Time
Before Sending
File Server
444444
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 23
Blocking and Non-Blocking Ports
Non-Blocking Gigabit Line Cards
Supervisor Uplink Ports
WS-X4306-GB—All Ports
Two 1000 Base-X Ports on the
WS-X4232-GB-RJ
First Two Ports on WS-X4418-
GB
WS-X4302-GB—Both Ports
• Oversubscribed GbE modules are ideal
for deployments that are more bursty in
nature such as Gigabit to the Desktop
and Servers
• These interfaces are not recommended
for uplinks or sustained connections
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Blocking Gigabit
Line Card
All Ports on the WS-
X4424-GB-RJ45
X4448-GB-RJ45
All Ports on the WS-
X4448-GB-LX
Last 16 Ports on the WS-
X4418-GB
1000 BT Ports on the WS-
X4412-2GB-TX
All ports on the WS-
X4424-GB-RJ45
Oversubscription
Ratio for Blocking
Line Cards
4:1
8:1 All Ports on the WS-
8:1 WS-X4548-GB-RJ45V
8:1
4:1
4:1
4:1
454545
Dot 1Q/ISL/Jumbo Frame Support:
• Dot 1Q is supported on all ports: Non blocking
and stub ASIC
• With Supervisor II+/IV/V ISL is supported on all
linecards except
WS-X4418-GB (ISL on ports 1 and 2 only)
WS-X4412-2GB (ISL on ports 13 and 14 only)
• Supervisor I/II
ISL only on front panel gig E ports of WS-X4232-L3
• Jumbo frames are supported on non-blocking
ports and only on IOS supervisors
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
464646
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 24
L2 Forwarding Tables to Verify
Reachability
cat4500#show mac-address-table dynamic
Unicast Entries
vlan mac address type protocols port
-------+---------------+--------+---------------------+-------------------1 0000.0c07.ac01 dynamic ip FastEthernet3/37
1 0009.e845.64bf dynamic ip FastEthernet3/37
1 0030.7b4e.340a dynamic ip,assigned FastEthernet3/37
41 0000.0c07.ac29 dynamic ip FastEthernet3/19
50 0000.0c07.ac32 dynamic ip FastEthernet3/19
50 000a.4172.df7f dynamic ip FastEthernet3/19
cat4500#show mac-address-table address 0000.0c07.ac29
Unicast Entries
vlan mac address type protocols port
-------+---------------+--------+---------------------+--------------------
41 0000.0c07.ac29 dynamic ip FastEthernet3/19
cat4500#show mac-address-table count
MAC Entries for all vlans:
Dynamic Unicast Address Count: 6
Static Unicast Address (User-defi ned) Count: 0
Static Unicast Address (System-de fined) Count: 1
Total Unicast MAC Addresses In Use: 7
Total Unicast MAC Addresses Available: 32768
Multicast MAC Address Count: 11
Total Multicast MAC Addresses Available: 16384
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
474747
Show Interface Error Counters
• FCS-err is the number of valid size frames with FCS (frame check sequence) errors but no
framing errors; this is typically a physical issue (cabling, bad port, NIC card,…) but can also
indicate a duplex mismatch
• Align-err is the number of frames with alignment errors (frames that do not end with an even
number of octets and have a bad CRC) received on the port; these usually indicate a physical
problem (cabling, bad port, NIC card,…) but can also indicate a duplex mismatch; when the
cable is first connected to the port, some of these errors may occur; also, if there is a hub
connected to the port then collisions between other devices on the hub may cause these errors
• Late-coll (late collisions) is the number of times that a collision is detected on a particular port
late in the transmission process; for a 10Mbit/s port this is later than 512 bit-times into the
transmission of a packet; five hundred and twelve bit-times corresponds to 51.2 microseconds
on a 10 Mbit/s system; this error can indicate a duplex mismatch among other things; for the
duplex mismatch scenario the late collision would be seen on the half duplex side; as the half
duplex side is transmitting, the full duplex side does not wait its turn and transmits
simultaneously causing a late collision; late collisions can also indicate an Ethernet
cable/segment that is too long; collisions should not be seen on ports configured as full duplex
• Single-coll (single collision) is the number of times one collision occurred before the port
transmitted a frame to the media successfully; collisions are normal for port configured as half
duplex but should not be seen on full duplex ports; if collisions are increasing dramatically this
points to a highly utilized link or possibly a duplex mismatch with the attached device
• Multi-coll (multiple collision) is the number of times multiple collisions occurred before the port
transmitted a frame to the media successfully; collisions are normal for port configured as half
duplex but should not be seen on full duplex ports; if collisions are increasing dramatically this
points to a highly utilized link or possibly a duplex mismatch with the attached device
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
484848
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 25
Show Interface Error Counters (Cont.)
• Excess-coll (excessive collisions) is a count of frames for which transmission on a
particular port fails due to excessive collisions; an excessive collision happens when a
packet has a collision 16 times in a row; the packet is then dropped; excessive collisions
is typically an indication that the load on the segment needs to be split across multiple
segments but can also point to a duplex mismatch with the attached device; collisions
should not be seen on ports configured as full duplex
• Carri-sen (carrier sense) occurs everytime an Ethernet controller wants to send data on a
half duplex connection; the controller senses the wire and check if it is not busy before
transmitting; this is normal on an half-duplex Ethernet segment
• Undersize are frames received that are smaller than the minimum IEEE 802.3 frame size
of 64 bytes long (excluding framing bits, but including FCS octets) that were otherwise
well formed; check the device sending out these frames
• Runts are frames received that are smaller than the minimum IEEE 802.3 frame size
(64bytes for Ethernet) and with a bad CRC; this can be caused by duplex mismatch and
physical problems like a bad cable, port, or NIC card on the attached device
• Giants exceed the maximum IEEE 802.3 frame size (1518 bytes for non-jumbo Ethernet);
try to find the offending device and remove it from the network
• http://www.cisco.com/warp/public/473/164.html#show_interface
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Useful Port Troubleshooting Commands
for Connectivity
r3_c4k_s2> (enable) sh port 3 (Cat OS)
* = Configured MAC Address
Port Name Status Vlan Level Duplex Speed Type
----- ------------------ ---------- ---------- ------ ------ ----- -----------3/1 connected 201 normal full 100 10/100BaseTX
3/4 notconnect 20 normal auto auto 10/100BaseTX
Port States:
1. Connected: Operational
2. Not connected: Check cables
3. Faulty: Use a sh test mod #
4. Disabled: Admin down
5. Inactive: Typically VLAN doesn’t exist
6. Errdisable: EtherChannel mismatch; duplex mismatch causing
excessive late collisions; UDLD; BPDU Guard
494949
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
505050
Page 26
Useful Port Troubleshooting Commands
for Performance and Connectivity
cat4003> (enable) sh mac 2/1 ( CAT OS)
Port Rcv-Unicast Rcv-Multicast Rcv-Broadcast
-------- -------------------- -------------------- --------------------
2/1 100999222 91857174 460433
Port Xmit-Unicast Xmit-Multicast Xmit-Broadcast
-------- -------------------- -------------------- --------------------
2/1 51713414 26520362 32
Port Rcv-Octet Xmit-Octet
-------- -------------------- --------------------
2/1 132521131606 96814952585
MAC Dely-Exced MTU-Exced In-Discard Lrn-Discrd In-Lost Out-Lost
-------- ---------- ---------- ---------- ---------- ---------- ----------
2/1 0 0 0 0 87 419821
Last-Time-Cleared
--------------------------
Thu Mar 20 2003, 12:09:25
Useful to Verify Traffic Flow Through an Interface
• In-discards: Traffic on a trunk VLAN but no switchports in the VLAN or if trunk is blocking
• In-lost: Packets dropped in the Receive Path; Rx-No-Packet Buffer Avail, Rx Crc Error, Rx Fragments, etc
• Out-lost: Output buffer is full...oversubscription of the output port
• Lrn-discard: Not able to learn a MAC address due to CAM table full or hash index collision
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
515151
Useful Port Troubleshooting Commands
for Performance
cat4003> (enable) show port counters 2/1 (CAT OS)
Port Align-Err FCS-Err Xmit-Err Rcv-Err UnderSize
----- ---------- ---------- ---------- ---------- ---------
2/1 - 2 419824 2 0
Port Single-Col Multi-Col l Late-Coll Excess-Col Carri-Sen Runts Giants
----- ---------- ---------- ---------- ---------- ---- ----- --------- ---------
2/1 0 0 20215 0 1 0 0
Last-Time-Cleared
--------------------------
Thu Mar 20 2003, 12:09:25
Error Rate Should Be Less Than 3% of Traffic
• FCS_err: Due to bad CRC…faulty NIC or cable
• Xmit-err: Internal transmit buffer is full; oversubscription
• Rcv-err: Rx buffer is full
• Late collisions : Duplex mismatch
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
525252
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 27
Port Troubleshooting Commands
for Connectivity and Performance
cat4500#sh int gig 4/7 (IOS)
GigabitEthernet4/7 is up, line protocol is up (connected)
Hardware is Gigabit Ethernet Port, address is 0009.e845.5f3f (bia 0009.e845.5f3f)
Internet address is 10.17.1.1/24
MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec,
reliability 255/255, txload 12/255, rxload 6/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Full-duplex, 1000Mb/s, link type is auto, media type is SX
output flow-control is off, input flow-control is off
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:46:11, output never, output hang never
Last clearing of "show interface" counters 00:00:59
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 1234242
Queueing strategy: fifo
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 48766000 bits/sec, 82367 packets/sec
L3 in Switched: ucast: 0 pkt, 0 bytes - mcast: 0 pkt, 0 bytes
L3 out Switched: ucast: 20000000 pkt, 1120000000 bytes - mcast: 0 pkt, 0 bytes
0 packets input, 37973544 bytes, 0 no buffer
Received 0 broadcasts (0 IP multicast)
0 runts, 0 giants, 0 throttles
513156 input errors, 513156 CRC, 0 frame, 0 overrun, 0 ignored
0 input packets with dribble condition detected
18765774 packets output, 1388667646 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out
If Down or Faulty
Check Physical
Connection
Sh Diagnostic
Result Module #
Oversubscription
Is Traffic Flowing
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Input Errors: CRC; Alignment Errors
Port Troubleshooting Commands
for Performance
cat4500#sh int gig 4/7 counters detail
(truncated)
Port InBytes InUcastPkts InMcastPkts InBcastPkts
Gi4/7 146 1 1 0
Port OutBytes OutUcastPkts OutMcastPkts OutBcastPkts
Gi4/7 1078309438 14563961 5579 5
Port InPkts 64 OutPkts 64 InPkts 65-127 OutPkts 65-127
Gi4/7 1 1 1 14569125
Port InPkts 128-255 OutPkts 128-255 InPkts 256-511 OutPkts 256-511
Gi4/7 0 0 0 415
Port InPkts 512-1023 OutPkts 512-1023
Gi4/7 0 4
Port InPkts 1024-1522 OutPkts 1024-1522 InPkts 1523-1600 OutPkts 1523-1600
Gi4/7 0 0 0 0
Port Tx-Bytes-Queue-1 Tx-Bytes-Queue-2 Tx-Bytes-Queue-3 Tx-Bytes-Queue-4
Gi4/7 783454686 0 294281044 573772
Port Tx-Drops-Queue-1 Tx-Drops-Queue-2 Tx-Drops-Queue-3 Tx-Drops-Queue-4
Gi4/7 340119 0 43128 0
Port Dbl-Drops-Queue-1 Dbl-Drops-Queue-2 Dbl-Drops-Queue-3 Dbl-Drops-Q ueue-4
Gi4/7 0 0 0 0
Port Rx-No-Pkt-Buff RxPauseFrames TxPauseFrames PauseFramesDrop
Gi4/7 0 35648 0 0
535353
Packet Size
Distribution
Lots of Small
Packets: Could
Be DoS Attack
Which Q’s Are
Dropping
Flow
Control
Frames
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
545454
Page 28
Port Troubleshooting Commands
for Performance
cat4500#sh int gig 4/3 counter errors
Port CrcAlign-Err Dropped-Bad-Pkts Collisions Symbol-Err
Gi4/3 2225010 0 0 0
Port Undersize Oversize Fragments Jabbers
Gi4/3 0 0 5947414 0
Port Single-Col Multi-Col Late-Col Excess-Col
Gi4/3 0 0 0 0
Port Deferred-Col False-Car Carri-Sen Sequence-Err
Gi4/3 0 0 0 0
• Symbol error: Physical problem with GBIC or fiber
• CRC/fragments: Physical layer or NIC
• Collisions: Typically duplex mismatch
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Documentation in a Show Command
cat4500#show interfaces capabilities module 3
FastEthernet3/1
Model: WS-X4248-RJ45V-RJ-45
Type: 10/100BaseTX
Speed: 10,100,auto
Duplex: half,full,auto
Trunk encap. type: 802.1Q,ISL
Trunk mode: on,off,desirable,nonegotiate
Channel: yes
Broadcast suppression: percentage(0-100), sw
Flowcontrol: rx-(none),tx-(none)
VLAN Membership: static, dynamic
Fast Start: yes
Queuing: rx-(N/A), tx-(1p3q1t, Shaping)
CoS rewrite: yes
ToS rewrite: yes
Inline power: yes (Cisco Voice Protocol/IEEE Protoco l 802.3af)
SPAN: source/destination
UDLD: yes
Link Debounce: no
Link Debounce Time: no
Port Security: yes
Dot1x: yes
Maximum MTU: 1552 bytes (Baby Giants)
(truncated)
555555
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
565656
Page 29
Trunk Troubleshooting
cat4500#sh int fa3/19 trunk
Port Mode Encapsulation Status Native vlan
Fa3/19 on 802.1q trunking 1
Port Vlans allowed on trunk
Fa3/19 1-4094
Port Vlans allowed and active in management domain
Fa3/19 1-3,10,41,49-50,100-102,104
Port Vlans in spanning tree forwarding state and not pruned
Fa3/19 1-3,10,41,49-50,100-102,104
cat4500# show interface fast 0/1 switchport
Name: Fa0/1
Switchport: Enabled
Administrative Mode: trunk
Operational Mode: trunk
Administrative Trunking Encapsulation: dot1q
Operational Trunking Encapsulation: dot1q
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
Voice VLAN: none
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Operational private-vlan: none
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture Mode Disabled
RST-3508
9805_05_2004_c2
Capture VLANs Allowed: ALL
© 2004 Cisco Systems, Inc. All rights reserved.
cat4500#sh run int fa3/19
Building configuration...
Current configuration : 95 bytes
!
interface FastEthernet3/19
switchport trunk encapsulation dot1q
switchport mode trunk
end
Useful for STP Optimization Prune
Unneeded VLANs
Check Operational State
575757
Spanning Tree Support
Cisco Catalyst OS and Cisco IOS
Supervisor STP Support
• 802.1d Spanning Tree
• 802.1d PVST
• Uplink Fast
• Backbone Fast
• 802.1w(RST)/802.1s(MST)
• Rapid PVST+
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
• Port fast
• Port fast BPDU Guard
• Port fast BPDU Filter
• Root Guard
• UDLD
585858
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 30
Spanning Tree Support
r3_4507R_S4# sh spanning-tree summary totals( sh spantree summary on CAT OS)
Switch is in pvst mode
Root bridge for: VLAN0001-VLAN0003, VLAN0020
Extended system ID is enabled
Portfast Default is disabled
PortFast BPDU Guard Default is disabled
Portfast BPDU Filter Default is disabled
Loopguard Default is disabled
EtherChannel misconfig guard is enabled
UplinkFast is disabled
BackboneFast is disabled
Pathcost method used is short
Name Blocking Listening Learning Forwarding STP Active
---------------------- -------- --------- -------- ---------- ---------4 vlans 0 0 0 10 10
• Ensure the sum of the logical interfaces across all instances of Spanning Tree for
different VLANs does not exceed 3,000 for Supervisor IV/V , 1500 for Supervisor II-Plus ;
Supervisor I and II support 400 PVST+ instances and 300 Rapid PVST+ instances
• Sum of logical interfaces = (# of trunks) x (# of active VLANs per trunk) + (non-trunking
interfaces)
• If greater use MST mode
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
595959
UNICAST PACKET
FORWARDING
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2003, Cisco Systems, Inc. All rights reserved.
606060
Page 31
Unicast Forwarding Example Topology
C4500 A
Fas 3/1 Fas 3/3
Gig 5/1 Gig 5/2
20.2.1.0 /24
10.6.1.2
Host A
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Unicast Forwarding: CEF
C4500 B
10.5.1.2
Host B
616161
SW
Routing ARP
FIB ADJ
HW
• Check the routing, ARP, CEF, ADJ info in the supervisor
• For both unicast and multicast, the SW and HW tables should always
be consistent...if not…hardware table is full
128k entries for Supervisor IV/V and 32k entries for Supervisor II-Plus
C4K_L3HWFORWARDING-2-FWDCAMFULL
HW adjacency table has 32K entries
C4K_L3HWFORWARDING-3-NOMOREK2FIBADJS
• If table is not full…possibly a hardware issue...contact TAC
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2004 Cisco Systems, Inc. All rights reserved.
626262
Page 32
Checking Hardware FIB Table
Apr 28 15:19:31.478 PDT: %C4K_L3HWFORWARDING-2-FWDCAMFULL:
L3 routing table is full.
Switching to software forwarding
4500#show platform hardware ip route summary ( truncated)
8169 blocks used out of 8192 (99.71%)
130245 K2Fib TCAM entries used out of 131072 (99.36%)
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Check the Routing Table (SW)
Cat4500 A # sh ip route 10.5.1.0
Routing entry for 10.5.1.0/24
Known via "eigrp 100", distance 90, metric 28672, type internal
Redistributing via eigrp 100
Last update from 20.2.1.2 on GigabitEthernet5/2, 00:23:23 ago
Routing Descriptor Blocks:
* 20.2.1.2, from 20.2.1.2 , 00:23:23 ago, via GigabitEthernet5/2
Route metric is 28672, traffic share count is 1
Total delay is 120 microseconds, minimum bandwidth is 100000 Kbit
Reliability 255/255, minimum MTU 1500 bytes
Loading 1/255, Hops 2
Fas 3/1
C4500 A
Gig 5/1
Gig 5/2
20.2.1.0/24
C4500 B
636363
Fas 3/3
10.6.1.2
Host A
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
10.5.1.2
Host B
646464
Page 33
Check the FIB Table (HW)
Cat4500 A # sh ip cef 10.5.1.2 detail
10.5.1.0/24, version 963, epoch 0, cached adjacency
20.2.1.2
0 packets, 0 bytes
via 20.2.1.2, GigabitEthernet5/2, 0 dependencies
next hop 20.2.1.2, GigabitEthernet5/2
valid cached adjacency
RST-3508
9805_05_2004_c2
Host A
C4500 A
Fas 3/1
10.6.1.2
© 2004 Cisco Systems, Inc. All rights reserved.
Gig 5/1
Gig 5/2
20.2.1.0/24
C4500 B
Fas 3/3
10.5.1.2
Host B
Check the ARP Table for Next Hop
Neighbor (SW)
Cat4500 A # sh ip arp 20.2.1.2
Protocol Address Age (min) Hardware Addr Type Interface
Internet 20.2.1.2 233 000b.fdb3.9400 ARPA GigabitEthernet5/2
656565
C4500 A
Fas 3/1
10.6.1.2
Host A
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Gig 5/1
Gig 5/2
20.2.1.0/24
C4500 B
Fas 3/3
10.5.1.2
Host B
666666
Page 34
Check the Adjacency Table (HW)
Cat4500 A # sh adjacency detail
Protocol Interface Address
IP GigabitEthernet5/2 20.2.1.2(19)
5099680 packets, 234585280 bytes
000BFDB39400000A4172E8BF0800
ARP 00:24:51
Epoch: 0
C4500 A
Fas 3/1
10.6.1.2
Host A
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
MULTICAST PACKET
FORWARDING
Gig 5/1
Gig 5/2
20.2.1.0/24
C4500 B
Fas 3/3
10.5.1.2
Host B
676767
RST-3508
9805_05_2004_c2
© 2003, Cisco Systems, Inc. All rights reserved.
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
686868
Page 35
World of Multicast
Multicast Routing
PIM
IGMP
Snooping
CGMP
IGMP
IGMP—Router ↔ Source/Receiver
CGMP—Router → Switch
IGMP Snooping—Switch Eavesdrops on IGMP
PIM—Router ↔ Router
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
CGMP Outputs on Supervisor II:
Cisco Catalyst OS
Console> (enable) show multicast protocols status
CGMP enabled
CGMP leave disabled
GMRP disabled
696969
Console> (enable) show cgmp leave
CGMP: enabled
CGMP leave: disabled
CGMP FastLeave: enabled
No IGMP Snooping Support on Sup I/II
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
707070
Page 36
Check Mcast Group and Mcast Router
Console> (enable) sh multicast group
VLAN Dest MAC/Route Des [CoS] Destination Ports or VCs /
[Protocol Type]
---- ------------------ ----- ----------------------------------
---------
4 01-00-5e-00-01-28 2/1
4 01-00-5e-01-01-01 2/1-2
Total Number of Entries = 2
Console> (enable) sh multicast router
Port Vlan
RST-3508
9805_05_2004_c2
-------------- ----------------
2/1 4
Total Number of Entries = 1
'*' - Configured
'+' - RGMP-capable
'#' - Channeled Port
© 2004 Cisco Systems, Inc. All rights reserved.
A CGMP Server Is Required
717171
Cisco Catalyst 4500 IOS Supervisor
Multicast Features
• For Cisco IOS Supervisor Engines
PIM-SM, PIM-DM, MSDP, MBGP, IGMP (v3), DVMRP, SSM
(Source Specific Mcast)
(OSPF, EIGRP, BGP,...)
MBGP; MSDP; PGM supported on Supervisor IV and V only
• Full bridging feature set
IGMP snooping v1, 2, 3, CGMP server
(STP, SPAN, PAgP, private VLANs,...)
• Full QoS support for multicast, 4 queues per port
• All features done in hardware
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
727272
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 37
Multicast Forwarding Example Topology
Catalyst 4507R A
Catalyst
4507R B
Switchport Fas 4/3
VLAN 3
10.1.3.100
VLAN 3
Routed Port Gig 4/1
202.202.202.100
Multicast Group
224.1.1.1
RST-3508
9805_05_2004_c2
Switchport Gig 1/1
VLAN 201
Multicast Source
201.201.201.1
© 2004 Cisco Systems, Inc. All rights reserved.
Check IGMP Group to Verify the Receiver
Has Joined the Multicast Group
737373
cat4507R B #show ip igmp group
IGMP Connected Group Membership
Group Address Interface Uptime Expires Last
224.0.1.40 Vlan3 03:16:16 00:02:50 10.1.3.1
224.1.1.1 Vlan3 00:00:03 00:02:56 10.1.3.100
224.1.1.1 GigabitEthernet4/1 00:00:39 00:02:20 202.202.202.100
Note: IGMP Report from a Receiver on a Port on VLAN 3 (Fas 4/3)
IGMP Report from a Receiver on a Routed Port Gig E 4/1
Switchport Gig 1/1
VLAN 201
© 2004 Cisco Systems, Inc. All rights reserved.
RST-3508
9805_05_2004_c2
Multicast Source
201.201.201.1
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Reporter
Catalyst 4507R B Catalyst 4507R A
Switchport Fas 4/3
10.1.3.100
VLAN 3
Routed Port Gig 4/1
202.202.202.100
Multicast Group
224.1.1.1
747474
Page 38
Check Multicast MAC Address
cat4507R B # show mac-address-table int fast4/3
Unicast Entries
vlan mac address type protocols port
-------+---------------+--------+---------------------+-------------------3 0000.0000.1501 dynamic ip FastEthernet4/3
Multicast Entries
vlan mac address type ports
-------+---------------+-------+------------------------------------------3 0100.5e01.0101 igmp Switch,Fa4/3
3 ffff.ffff.ffff system Switch,Fa4/3
The Entry We Are Looking for Has Fast 4/3 in the Port List
Catalyst 4507R B Catalyst 4507R A
Switchport Fas 4/3
10.1.3.100
VLAN 3
Routed Port Gig 4/1
202.202.202.100
Multicast Group
224.1.1.1
RST-3508
9805_05_2004_c2
Switchport Gig 1/1
VLAN 201
Multicast Source
201.201.201.1
© 2004 Cisco Systems, Inc. All rights reserved.
Check Cisco IOS Multicast Routing
Table (SW)
cat4507R B # show ip mroute 224.1.1.1
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, s - SSM Group, C - Connected, L - Local,
P - Pruned, R - RP-bit set, F - Register flag, T - SPT-bit set,
J - Join SPT, M - MSDP created entry, X - Proxy Join Timer Running
A - Advertised via MSDP, U - URD, I - Received Source Specific Host
Outgoing interface flags: H - Hardware switched
Timers: Uptime/Expires
Interface state: Interface, Next- Hop or VCD, State/Mode
(*, 224.1.1.1), 00:14:24/00:02:59, RP 10.1.3.3, flags: SJC
Incoming interface: Vlan3, RPF nbr 10. 1.3.3
Outgoing interface list:
(201.201.201.1, 224.1.1.1 ) , 00:14:23/00:02:57, flags: CJT
Incoming interface: Vlan3, RPF nbr 1.1 .3.3
Outgoing interface list:
RST-3508
9805_05_2004_c2
Report
GigabitEthernet4/1, Forward/Sparse, 00:14:24/00:02:33, H
GigabitEthernet4/1,Forward/Sparse,00:14:23/00:02:33, H
Catalyst 4507R B Catalyst 4507R A
Switchport Gig 1/1
VLAN 201
Multicast Source
201.201.201.1
© 2004 Cisco Systems, Inc. All rights reserved.
Switchport Fas 4/3
10.1.3.100
VLAN 3
Routed Port Gig 4/1
202.202.202.100
Multicast Group
224.1.1.1
757575
Note:
FastEthernet
4/3 on VLAN 3
Is Not Listed
as It Is an L2
Switchport
767676
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 39
Check MFIB Table (HW)
cat4507R B # show ip mfib 224.1.1.1
IP Multicast Forwarding Information Base
Entry Flags: C - Directly Connected, S - Signal, IC - Internal Copy
Interface Flags: A - Accept, F - Forward, S - Signal
IC - Internal Copy, NP - Not Platform fast-switched
Packets: Fast/Partial/Slow Bytes: Fast/Partial/Slow
(*, 224.1.1.1), flags ()
Packets: 2708/1/0, Bytes: 124568/46/0
Vlan3 (A S)
GigabitEthernet4/1 (F S)
(201.201.201.1, 224.1.1.1 ), flags () <--check to see if the S,G entry exists
Packets: 20111339 /1504/7, Bytes: 925121594 /69184/322
Vlan3 (A) <---rpf vlan is correct
GigabitEthernet4/1 (F S)
RST-3508
9805_05_2004_c2
Only the first part should increment if it is fully HW switched
Gigabit 4/1 is correct and flag 'F' means forwarding is in HW
FastEthernet 4/3 is not listed as it is a switchport and it is part of
vlan 3 which is the incoming vlan. If the switchport was for eg on vlan4,
then you would see vlan 4 in the OIF as a forwarding interface
Catalyst 4507R B Catalyst 4507R A
VLAN 3
Switchport Gig 1/1
VLAN 201
Multicast Source
201.201.201.1
© 2004 Cisco Systems, Inc. All rights reserved.
Switchport Fas 4/3
10.1.3.100
VLAN 3
Routed Port Gig 4/1
202.202.202.100
Multicast Group
224.1.1.1
777777
ACLS
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2003, Cisco Systems, Inc. All rights reserved.
787878
Page 40
Different Types of ACLs
Mac Access Control
List (MACL)
VLAN Access Map
(VACL )
Port Access
Control List (PACL)
Router Access
Control List (RACL)
QOS Access Control Lists Control Traffic via Classification
and Policing Using Modular QOS CLI (MQC) Configuration
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Types of ACLs
Where Applied
L2 Switch Port
VLAN List
L2 Switch Port
L3 Switch Port or
SVI
L2 and Non-IP
L2 and Non-IP
and L3/4 IP
L3/L4 IP
L3/L4 IP
Direction Traffic Control ACL Type
Inbound
Outbound
Directionless
Inbound
Outbound
Inbound
Outbound
797979
RACL—
VLAN 10
VLAN 10 VLAN 20
VACL—
VLAN 10
VLAN 10
PACL/MACL—
Fa 4/1
The above diagram is a logical model
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2004 Cisco Systems, Inc. All rights reserved.
Switch
Router
RACL-
VLAN 20
VACL—
VLAN 20
VLAN 20
Routed Packet Bridged Packet
808080
Page 41
ACL Hardware Programming
• TCAM: Ternary Content Addressable Memory
Value, Mask and Result values are used
Value and Mask used to identify L2/L3/L4 flows of interest
Result can be…permit or deny for security ACL
Result can be…classification or policing for QoS ACL
• Security and QoS ACLs get programmed into
dedicated TCAMs
• TCAM is a finite HW resource
• Advantage: ACLs are implemented in HW, therefore
no performance penalty
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Cisco IOS Supervisor ACL TCAM Details
Security
32000 Patterns
Supervisor
Engine
IV/V*
4000 Masks
QoS
32000 Patterns
4000 Masks
• Security ACLs TCAM is used for RACLs, VACLs, PACLs,
MAC-based ACLs, time of the day ACLs and security
features like DHCP Snooping; Dynamic ARP Inspection and IP
Source Guard
2 x 1 Banks of TCAM
1 x Used for QoS
1 x Used for Security ACLs
818181
• QoS TCAM is used for QoS functions: Classification,
Service Policies
*Supervisor Engine II-Plus as of IOS 12.2.18EW has 1/8 the TCAM entries
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2004 Cisco Systems, Inc. All rights reserved.
828282
Page 42
Applying a RACL/PACL
interface Vlan4
ip address 4.4.4.1 255.255.255.0
end
Counters
Done in
HW
cat4507R#show ip access-lists
Extended IP access list 101
deny tcp host 200.200.200.1 any neq 80 (5 matches)
permit ip any any (11915 matches)
Cat4507(config)#interface vlan 4
Cat4507(config-if)#ip access-group 101 in
Cat4507(config-if)#
Cat4507(config)#interface fa 4/23
Cat4507(config-if)#swichport access vlan 4
Cat4507(config-if)#ip access-group 101 in
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Layer 4 Operators (L4 Ops)
• The (operator, operand) tuples for TCP and UDP
port numbers
RACL
PACL
838383
• These ACL operators are considered L4 Ops:
gt
lt
neq
range
access-list 106 permit tcp any range 100 120 any range
120 140
• Greater than 6 L4 ops limit in an ACL…results in
ACE expansion or more TCAM entries being used
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat4000/12_2_18/config/secure.htm#1050515
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2004 Cisco Systems, Inc. All rights reserved.
848484
Page 43
MAC ACLs
• MAC ACLs can be used to filter non-IP traffic
• MAC ACLs do not filter IP traffic
cat4507R# sh access-lists
Extended IP access list 101
permit ip host 4.4.4.3 any
Extended MAC access list decnet_acl
deny any any protocol-family decnet
permit any any
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
VLAN ACL Map (VACL)
mac access-list extended drop-appletalk
permit any any protocol-family
appletalk
ip access-list extended ip2
permit ip any any
vlan access-map vacl-100 15
action drop
match mac address drop-appletalk
vlan access-map vacl-100 20
action forward
match ip address ip2
!
vlan filter vacl-100 vlan-list 201
858585
• VACLs match all
packets on the VLAN
• VACLs may have IP
based and MAC based
ACLs, with implicit
deny all at the end
• This example will
permit IP and drop all
Appletalk frames on
VLAN 201
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2004 Cisco Systems, Inc. All rights reserved.
868686
Page 44
ACL Main Issues
• High CPU
• Misbehaving ACLs
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
ACL…High CPU
• Denied traffic in an input/output RACL
This is rate controlled starting in IOS 12.1.13 EW(1)
No effect on counter accuracy
Do not need “no ip unreachables” option with above release or
higher
• ACEs requiring logging (“log” keyword)
This is rate controlled starting in IOS 12.1.13 EW(1)
No effect on counter accuracy
• Match on TCP flags other than “established”
• Policy-routed traffic (SW switched for “set ip df”...ingress
packet size is greater than egress port MTU)
878787
• TCAM full due to excessive L4 ops expansion
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2004 Cisco Systems, Inc. All rights reserved.
888888
Page 45
Checking TCAM Usage
Apr 22 09:25:13.626 PDT: %C4K_HWACLMAN-4-ACLHWPROGERR: Input Security: 199 - hardware TCAM limit, some
packet processing will be software switched.
Apr 22 09:25:13.626 PDT: %C4K_HWACLMAN-4-ACLHWPROGERRREASON: Input Security: 199 - out of hardware TCAM
entries.
r3_4507R_S4#sh platform hardware acl statistics utilization (truncated output from
Supervisor II-Plus)
Software Usage Statistics
Input FeatureCam
PortAndVlan Entries 0 ( 0.0) 1024 (100.0) 1024
PortAndVlan Masks 0 ( 0.0) 128 (100.0) 128
PortOrVlan Entries 231 ( 22.5) 793 ( 77.4) 1024
PortOrVlan Masks 128 (100.0) 0 ( 0.0) 128
Output FeatureCam
PortAndVlan Entries 0 ( 0.0) 1024 (100.0) 1024
PortAndVlan Masks 0 ( 0.0) 128 (100.0) 1
PortOrVlan Entries 11 ( 1.0) 1013 ( 98.9) 1024
PortOrVlan Masks 11 ( 8.5) 117 ( 91.4) 128
Supervisor IV and V Have Larger TCAMs
• Input feature TCAM is used for security based features: PACL; RACL; DHCP
Snooping; Dynamic ARP Inspection; IP Source Guard
• Output feature TCAM is used for outbound RACLs and PACLs; DHCP
Snooping
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Used (%) Free (%) Total
-------------- -------------- ------
898989
Security ACL Feature TCAM
• Be careful when using L4 ops collapse contiguous
ranges into a single ACE if possible or use eq
operator
• Check TCAM usage as ACLs being added
• Consider a Supervisor IV or V with larger TCAM
space than Supervisor II-Plus
• Mask allocation optimization is in latest IOS
release, 12.2.20 EW
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
909090
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 46
When ACLs Are Misbehaving
ACLs Passing or Dropping Traffic when They Are
Not Supposed to
• Remove ACL and see if drops are still there
• Check access-list counters
Use clear access-list counters command, and then check the statistics
with show access-list
Counters update every 15 seconds
If the packets are hitting some deny entry, then the packet will be
dropped…check your configuration
• Check interface counters to make sure that the box is indeed
receiving packets
• Remember implicit IP deny any any at the end of an ACL—
make it explicit
• Check CPU utilization
If packets are being processed in software...there can be drops
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
919191
Miscellaneous ACL Considerations
• Fragments are being permitted
Layer 4 information is available only in the first fragment
• Fragments are being dropped
Tiny fragments are dropped to prevent DOS attacks
• TOS/DSCP fields are not being matched correctly
Check the trust state of the port
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
929292
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 47
QoS
RST-3508
9805_05_2004_c2
© 2003, Cisco Systems, Inc. All rights reserved.
QoS Terminology
• QoS labels are used to prioritize traffic
COS, TOS, DSCP
• Classification is selection of traffic based on
labels, policy
• Marking is application of QoS labels to traffic
• Policing is process by which the switch limits the
bandwidth consumed by a flow of traffic
• Queuing is placing of traffic in different
transmit queues
939393
• Scheduling is process of emptying the
transmit queues
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2004 Cisco Systems, Inc. All rights reserved.
949494
Page 48
Catalyst 4500 QoS Capabilities
Supervisor II (CAT OS)
• Layer 2 only
• System-wide QoS
• Dual queues per port
Queue 1
Queue 2
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Cisco IOS Supervisors
• Layer 2, 3, or 4 QoS
• Per-port QoS
• Four Tx queues per port
• Strict priority queue
• Dynamic queue memory
allocation
• Packet classification and
marking
• Policing/bursting
• Shaping/sharing
Queue 4
Queue 1
Queue 3
Queue 2
959595
QoS on Supervisor I/II (Catalyst OS)
• System-wide QoS configuration
• Global configuration applies to all ports on
the switch
• Disabling QoS configuration disables QoS on
all ports
• By default a port state is untrusted
• Ports can be set to have a default CoS on a
system-wide basis
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
969696
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 49
Supervisor II QoS
Cat4K-c (enable) sh qos info runtime
Run time setting of QoS:
QoS is disabled
Cat4K-c (enable) set qos enable
QoS is enabled.
Console> (enable) sh qos info runtime
Run time setting of QoS:
QoS is enabled
All ports have 2 transmit queues with 1 drop thresholds (2q1t).
Default CoS = 0
Queue and Threshold Mapping:
Queue Threshold CoS
----- --------- --------------1 1 0 1 2 3 4 5 6 7
2 1
Throughput Has Just
Been Halved!!
Must Re-Map CoS
Values to Queue 2
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Supervisor II QoS
Console> (enable) set qos map 2q1t 2 1 cos 4-7
Qos tx priority queue and threshold mapped to cos successfully.
Console> (enable) sh qos info runtime
Queue Threshold CoS
----- --------- --------------1 1 0 1 2 3
2 1 4 5 6 7
Cat4K (enable) set qos defaultcos 7
qos defaultcos set to 7
Cat4K (enable)
Cat4k (enable) sh qos info runtime
Run time setting of QoS:
QoS is enabled
All ports have 2 transmit queues with 1 drop thresholds (2q1t).
Default CoS = 7
Queue and Threshold Mapping:
Queue Threshold CoS
----- --------- --------------1 1 0 1 2 3
2 1 4 5 6 7
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Re-Mapping CoS Values
to Queue 2
System Wide CoS
979797
Mapping
989898
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 50
Cisco IOS-Based Supervisor
QoS Flow Summary
Policing via ACLs
Police Action:
Mark
Classification Based on:
Default DSCP Port Setting
Port “Trusted” CoS or DSCP
Layer 2/3/4 ACLs
Shared
RX
Memory
Classify
Drop
Based:
Byte Rate
Burst
(Token Bucket)
Police
DBL
Rewrite
Info
Sharing and Shaping
and Strict Priority Q3
to Schedule Between
Output Queues
Queue 1
Queue 2
Queue 3
Queue 4
Sched TX
In-Coming
Encapsulation
Can Be 802.1Q,
802.1p, ISL,
or None
RST-3508
9805_05_2004_c2
Dynamic Buffer Limiting
(Supervisor II Plus
Supervisor IV
Supervisor V )
Congestion Avoidance
© 2004 Cisco Systems, Inc. All rights reserved.
Rewrites TOS
Field in IP
Header and
802.1p/ISL
CoS Field
Tx Queuing and Scheduling
Q1
Q2
DSCP to
Queue Map
Q3
Shaping
Q4
• Queue selection based on “internal DSCP”
Default DSCP on port
Trust CoS/DSCP
Via service policies
• Switch-wide DSCP to Tx queue map, not per-port!
• Shaping: Max rate per queue
• Sharing: Min rate per queue
• Strict priority on queue 3
• All in hardware at wire rate
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Strict Priority
Sharing,
Out-Going
Encapsulation
Can Be 802.1Q,
802.1p, ISL,
or None
999999
Ethernet
MAC
100100100
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 51
Scheduling: Shaping
• Max rate (10K to 1 Gbps)
Shaped queue like a “virtual wire”
Packets clock out exactly at shaped rate
• Hold packets in queue when rate exceeded
• Example use:
Shape a bursty application to 1 Mbps to smooth it
• Supported on all ports, typically used with strict
priority queue
Shaper (Specifies Max BW)
TX Port Q
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Scheduling: Sharing
• Minimum rate (32 Kbps to 1 Gbps)
Rate is guaranteed minimum
• Scheduling algorithm:
If below share rate, queue is high priority
High priority queues serviced first
• Sharing only on non-blocking gigabit ports in Supervisor IV
and II-Plus
• Supported on ALL ports on Supervisor Engine V
Shaper (Specifies Max BW)
Non-Blocking
Port
TX Port Q
Sharer (Specifies Min Guaranteed BW)
101101101
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
102102102
Page 52
QoS Issues: First Check if QoS Is Enabled
By Default QoS Is Disabled and All Port
Trust States Are Trusted
cat4500#show qos
QoS is enabled globally
IP header DSCP rewrite is enabled
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Check the Port
What Is the Port’s Trust State?
cat4500#show qos interface gig6/4
QoS is enabled globally
Port QoS is enabled
Port Trust State: 'dscp'
Default DSCP: 0 Default CoS: 0
Appliance trust: none
Tx-Queue Bandwidth ShapeRate Priority QueueSize
(bps) (bps) (packets)
1 250000000 disabled N/A 1920
2 250000000 disabled N/A 1920
3 250000000 50000000 high 1920
4 250000000 disabled N/A 1920
103103103
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
104104104
Page 53
Packet Classification and Marking
Check the Service-Policy
Qos
access-list 100 permit udp any any
!
class-map match-all class_setprec
match ip access group 100
!
policy-map pol_setprec
class class_setprec
set ip precedence 3
interface Vlan4
ip address 4.4.4.1 255.255.255.0
service-policy input pol_setprec
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Packet Classification and Marking
Is the Class Map Defined Properly?
Cat4500# show policy-map interface vlan 4
Interface vlan 4
service-policy input: pol_setprec
class-map: class_setprec (match-all)
0 packets
match: ip access group 100
police: Per-interface
Conform: 0 bytes Exceed: 0 bytes
class-map: class-default (match-any)
32423 packets
match: any
0 packets
105105105
No Packets Match!
Check ACL
• Check class map statistics
• The packet statistics are on a per-class-map basis, and NOT
on a per-interface basis
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2004 Cisco Systems, Inc. All rights reserved.
106106106
Page 54
Check QoS TCAM
r3_4507R#sh platform hardware acl statistics utilization
( truncated output from Supervisor II-Plus)
Used (%) Free (%) Total
Input QosCam
PortAndVlan Entries 0 ( 0.0) 1024 (100.0) 1024
PortAndVlan Masks 0 ( 0.0) 128 (100.0) 128
PortOrVlan Entries 493 ( 48.1) 531 ( 51.8) 1024
PortOrVlan Masks 121 ( 94.5) 7 ( 5.4) 128
Output QosCAM
PortAndVlan Entries 0 ( 0.0) 1024 (100.0) 1024
PortAndVlan Masks 0 ( 0.0) 128 (100.0) 128
PortOrVlan Entries 0 ( 0.0) 1024 (100.0) 1024
PortOrVlan Masks 0 ( 0.0) 128 (100.0) 128
Note: Supervisor IV and V have larger TCAM’s
D-4500(config)#int fastEthernet 2/1
D-4500(config-if)# service-policy input classVOIP
D-4500(config-if)# 00:43:58: %C4K_HWACLMAN-4-ACLHWPROGERR:
Input Policy Map: classVOIP - hardware TCAM limit, qos being
disabled on relevant interface. 00:43:58:
%C4K_HWACLMAN-4-ACLHWPROGERRREASON: Input Policy Map: classVOIP -
RST-3508
9805_05_2004_c2
out of hardware TCAM entries.
© 2004 Cisco Systems, Inc. All rights reserved.
------------- ---------- ---- ------
107107107
Optimize QoS TCAM Utilization
r3_4507R#sh platform hardware acl statistics utilization
With the default port based QoS
------------- -------------- -----PortOrVlan Entries 521 ( 50.8) 503( 49.1) 1024
PortOrVlan Masks 124 ( 96.8) 4( 3.1 )1 2 8
With VLAN based QoS ..the same Service Policy is configured on a SVI...
PortOrVlan Entries 21 ( 2.0) 1003 ( 97.9 )1 0 2 4
PortOrVlan Masks 19 ( 14.8) 109 ( 85.1 )1 2 8
• Use VLAN based QoS…if classification rules are the same within the VLAN
• General Policy should use VLAN based QoS…exceptions use port based QoS
QoS Policy on the
RST-3508
9805_05_2004_c2
Port
© 2004 Cisco Systems, Inc. All rights reserved.
Service Policy
Applied to the VLAN
Used (%) Free (%) Total
Service Policy
Applied to the Port
Service Policy Used
VLAN BasedYes Yes VLAN-Based
Port BasedYes Yes Port-Based (Default)
108108108
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 55
COS/DSCP Mapping
Check if COS to DSCP and DSCP to COS Mapping
Is Configured Properly
Cat4500(config)# qos map cos 7 to dscp 40
r3_4507R_S4#sh qos maps cos dscp
CoS-DSCP Mapping Table
CoS: 0 1 2 3 4 5 6 7
-------------------------------DSCP: 0 8 16 24 32 40 48 40
• If a L2 trunk port is configured to "trust dscp",
If the packet is an IP packet, then it will use the DSCP from the IP header
If not, it will use the port default DSCP (configured via qos dscp <val>)
• If a L2 trunk port is configured to "trust cos",
If the packet is tagged it will map the CoS to an internal DSCP (as per CoS-to-DSCP
mapping table) and then use the DSCP-to-TxQ mapping to determine queue and the
DSCP-to-CoS table to determine egress CoS
• If the packet is untagged, it uses the port default CoS and then the
other mapping tables as explained above
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_configuration_guide_chapter09186a00801cddc9.html#1223900
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Cat4500(config)#qos map dscp 40 to cos 7
Cat4500#sh qos maps dscp cos( truncated)
DSCP-CoS Mapping Table (dscp = d1d2)
d1 : d2 0 1 2 3 4 5 6 7 8 9
------------------------------------4 : 07 05 05 05 05 05 05 05 06 06
5 : 06 06 06 06 06 06 07 07 07 07
109109109
Classification/TOS Re-Write Summary
• Determine the “internal DSCP” value—this
depends on the policy-map and port trust
configuration
• If a packet encounters both input and
output classification policy:
Output policy has precedence
If no output policy then input policy has
precedence
If no output/input policy then RX port trust
is used
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
110110110
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 56
Policing on the Supervisor II+/IV/V
• Two types of policers
Individual: Acts on each of the applied ports/VLAN
Aggregate: Acts on all of the applied ports/VLAN
• Two policer parameters: Rate and burst
Rate from 32kbps to 32gbps, burst in bytes
• Two actions
exceed-action: drop, transmit, markdown
conform-action: drop, transmit
• Input and output policing on every packet
1020 input, 1020 output policers, sharable: Sup IV/V
510 input, 510 output policers, sharable: Sup II Plus
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Policing Issues
Check QoS Policer Utilization
cat4500# show platform hardware qos policers utilization ( truncated)
Software Usage Statistics
Used (%) Free (%) Total
-------------- -------------- ------
Input Policers 4 ( 0.3) 1020 ( 99.6) 1024
Output Policers 5 ( 0.4) 1019 ( 99.5) 1024
111111111
*Above output from Supervisor IV/V; Supervisor II-Plus has half the entries
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2004 Cisco Systems, Inc. All rights reserved.
112112112
Page 57
Policing Issues
Make Sure the Correct Type of Policer Is Used
Cat4500# show policy-map interface Gig1/1
GigabitEthernet1/1
service-policy input: p1
class-map: c1 (match-all)
3435 packets
match: access-group 100
police: Per-interface <----- This is a individual policer .
Conform: 45454 bytes Exceed: 56345 bytes
Cat4500# show policy-map interface Gig1/2
GigabitEthernet1/1
service-policy input: p1
class-map: c1 (match-all)
335 packets
match: access-group 100
police: policer1 <----- This is an aggregate or named policer.
Conform: 4554 bytes Exceed: 563 bytes
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Policing Issues
Check the Service Policy
Qos
access-list 100 permit udp any any
!
class-map match-all class_udp
match ip access group 100
!
policy-map pol_udp
class class_udp
police 500 kbps 1000 byte conform-action transmit exceed-action
interface Vlan4
ip address 4.4.4.1 255.255.255.0
service-policy input pol_udp
Use the Show Policy-Map Interface Command to Check for Class Map Hits
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
policed-dscp-transmit
113113113
114114114
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 58
Policing: How to Set the Burst Size?
• Too small: And policer drops due to burstiness inherent in all
networks
• Too large: And the entire transfer fits in the burst (especially for TCP)
• Small burst size [n*max pkt size] ok for video, voice
• Larger burst needed for TCP: 2 x [RTT * rate], good starting point
• Must evaluate how UDP traffic will react to a packet drop
• Right answer depends on the network
• Starting with IOS release 12.1.19EW1 and higher, the policer calculations can
include the 14 byte Ethernet header field and 4 byte FCS field when policing
packets; this would be enabled using the global command: qos account
layer2 encapsulation length 18
• Releases prior to this do not include these fields; the policing rate and
burst parameters configured needed to deduct the layer 2 encapsulation
length when determining the policing rate and burst, otherwise
“underpolicing” would result, particularly for smaller packet sizes in the 64
byte to 256 byte range
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
115115115
Policed DSCP Mapping
Check if the Policed DSCP Table is
Correctly Programmed
Cat4500(config)# qos map dscp policed 24 to dscp 16
Sup4#sh qos maps dscp policed
Policed DSCP Mapping Table (dscp = d1d2)
d1 : d2 0 1 2 3 4 5 6 7 8 9
------------------------------------0 : 00 01 02 03 04 05 06 07 08 09
1 : 10 11 12 13 14 15 16 17 18 19
2 : 20 21 22 23 16 25 26 27 28 29
3 : 30 31 32 33 34 35 36 37 38 39
4 : 40 41 42 43 44 45 46 47 48 49
5 : 50 51 52 53 54 55 56 57 58 59
6 : 60 61 62 63
When the Rate Is Exceeded DSCP of 24 Is Marked Down to 16
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
116116116
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 59
Packet Transmit Queuing
Check DSCP to TX Queue Mappings
cat4500(config)# qos map dscp 50 to tx-queue 2
cat4500# sh qos maps dscp tx-queue
DSCP-TxQueue Mapping Table (dscp = d1d2)
d1 : d2 0 1 2 3 4 5 6 7 8 9
-------------------------------------
0 : 01 01 01 01 01 01 01 01 01 01
1 : 01 01 01 01 01 01 02 02 02 02
2 : 02 02 02 02 02 02 02 02 02 02
3 : 02 02 03 03 03 03 03 03 03 03
4 : 03 03 03 03 03 03 03 03 04 04
5 : 02 04 04 04 04 04 04 04 04 04
6 : 04 04 04 04
For DSCP of
50
TX Queue Is 2
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Input/Output Policer Rules Summary
If a Packet Encounters Both Input and
Output Policy:
Ingress Policy
117117117
Mark Markdown Drop TransmitEgress Policy
Mark Markdown Drop Transmit Transmit
Drop Drop Drop Drop Drop
Markdown Markdown Drop Markdown Markdown
RST-3508
The Most Severe Action Is Taken
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2004 Cisco Systems, Inc. All rights reserved.
Mark Mark Drop Mark Mark
118118118
Page 60
Dynamic Buffer Limiting (DBL)
• Congestion avoidance technique
• Flow based and maintains flow table per queue
• Operates by tracking buffer usage and credits
• If buffer usage exceeds dynamically computed
limit, DBL can either drop or set explicit congestion
notification
• Implemented in Cisco IOS supervisor hardware with
line-rate performance
• The default DBL computation is very reliable; the
rule is not to tune the algorithm unless it is really
required and the reason understood
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Dynamic Buffer Limiting
Drop One
Packet
BUFFERS
Aggressive
Buffer Limit
2 Pkts
CREDITS
Max Credits
15 (Default)
Aggressive
Credit
Limit 10
DBL
FLOW
119119119
Classified NAF
T0 T1 T2 T3 T4
NAF: Non Adaptive Flow
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2004 Cisco Systems, Inc. All rights reserved.
Time
120120120
Page 61
Enabling QoS and DBL
on Cisco IOS Supervisors
The Information Is Applied per Port per Queue
Cat4500(config)#qos
Cat4500(config)#qos dbl
Cat4500# show qos dbl
DBL is enabled globally
DBL flow includes vlan
DBL flow includes layer4-ports
DBL does not use ecn to indicate congestion
DBL exceed-action probability: 15%
DBL max credits: 15
DBL aggressive credit limit: 10 // NAF
threshold
DBL aggressive buffer limit: 2 packets // NAF’s
are limited
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
121121121
Dynamic Buffer Limiting…Activated
C4506(config)# policy-map LAB-POLICY
C4506(config-pmap)# class UDP
C4506(config-pmap-c)# dbl
C4506(config-pmap)# class FTP
C4506(config-pmap-c)# dbl
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
C4506# show policy
Policy Map LAB-POLICY
class FTP
class UDP
class WEB
class TELNET
set ip dscp 0
dbl
set ip dscp 0
dbl
set ip dscp 16
set ip dscp 48
122122122
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 62
DBL Troubleshooting: Is It Working?
Cat4500#sh int gig4/1 count detail
( truncated )
Port Tx-Bytes-Queue-1 Tx-Bytes-Queue-2 Tx-Bytes-Queue-3 Tx-Bytes-Queue-4
Gi4/1 11114432 0 64000 0
Port Tx-Drops-Queue-1 Tx-Drops-Queue-2 Tx-Drops-Queue-3 Tx-Drops-Queue-4
Gi4/1 99925 0 0 0
Port Dbl-Drops-Queue-1 Dbl-Drops-Queue-2 Dbl-Drops-Queue-3 Dbl-Drops-Queue
Gi4/1 73425 0 0
DBL Drops
0
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Associated Sessions
• RST-3511: Troubleshooting LAN Protocols
• RST-3509: Catalyst 6500 Troubleshooting
• RST-3507: Catalyst 2900 and Catalyst 3500
Troubleshooting
123123123
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
124124124
Page 63
For More Information:
• Understanding and Configuring QoS on Catalyst 4500 Series Switches
http://www.cisco.com/en/US/partner/products/hw/switches/ps4324/products_regional_sales_pr
omotion09186a00801fcabd.html
• Understanding and Configuring IP Multicast on Catalyst 4000 Series
Switches
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat4000/12_2_18EW/config/mcastmls.htm
• Security Best Practices on Catalyst 4500 Series Switches
http://www.cisco.com/en/US/partner/products/hw/switches/ps4324/products_regional_sales_pr
omotion09186a00801fcabd.html
• Catalyst 4500 Power over Ethernet Capabilities
http://www.cisco.com/en/US/partner/products/hw/switches/ps4324/products_regional_sales_pr
omotion09186a00801fcabd.html
• Hardware Troubleshooting for Catalyst 4000/4912G/2980G/2948G Series
Switches
http://www.cisco.com/warp/customer/473/121.html
• Troubleshooting Hardware and Related Issues on Catalyst 4000 and 4500
Supervisor III and IV
http://www.cisco.com/warp/customer/473/165.html
• Catalyst 4000 Series Documnetation
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat4000/index.htm
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
125125125
Troubleshooting Support for Cisco Catalyst 4000 Series
Switches: Cisco Technical Support Website
www.cisco.com/techsupport
Troubleshooting Section Includes:
• Known problems
(e.g., release notes,
field notices,
security advisories)
• Troubleshooting
resources for
common error
messages, CPU
utilization, etc., and
troubleshooting
tools (e.g., TAC
case collection)
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Troubleshooting
Resources
126126126
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
Page 64
Troubleshooting Support for Cisco Catalyst 4000 Series
Switches: Cisco Technical Support Website
www.cisco.com/techsupport
Troubleshooting Section Includes:
• Known problems
(e.g., release notes,
field notices,
security advisories)
• Troubleshooting
resources for
common error
messages, CPU
utilization, etc., and
troubleshooting
tools (e.g., TAC
case collection)
Troubleshoot
ing
Resources
RST-3508
9805_05_2004_c2
Q AND A
© 2004 Cisco Systems, Inc. All rights reserved.
127127127
RST-3508
9805_05_2004_c2
© 2003, Cisco Systems, Inc. All rights reserved.
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
128128128
Page 65
Recommended Reading
• Continue your
Networkers learning
experience with further
reading for this session
from Cisco Press.
• Check the
Recommended
Reading flyer for
suggested books.
Available on-site at the Cisco Company Store
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved.
Complete Your Online Session Evaluation!
WHAT: Complete an online session evaluation
and your name will be entered into a
daily drawing
WHY: Win fabulous prizes! Give us your feedback!
WHERE: Go to the Internet stations located
throughout the Convention Center
HOW: Winners will be posted on the onsite
Networkers Website; four winners per day
129129129
RST-3508
9805_05_2004_c2
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr
© 2004 Cisco Systems, Inc. All rights reserved.
130130130
Page 66
RST-3508
9805_05_2004_c2
© 2003, Cisco Systems, Inc. All rights reserved.
131131131
© 2004 Cisco Systems, Inc. All rights reserved. Printed in USA.
Presentation_ID.scr