Deploying Performance Routing
Deploying Performance Routing
BRKRST-2362
Cisco Public
Public/Hybrid Cloud
SaaS/IaaS
Storage
Users/ Machines
Proliferation of Devices
THE NETWORK
Private Cloud
VDI | IaaS
Database
Cisco Public
WAN Challenges
Data Centers
Public SaaS
WAN
Internet
Network Admin
BRKRST-2362
Cisco Public
Visibility
Control
Report
BRKRST-2362
Cisco Public
WAE Cluster
Email VMs
ISR G2
ASR1K ASR1K
Internet DMVPN
Branch
PfR MC/BR
PfR BRs
Headquarter
ASR1K ASR1K
BRKRST-2362
Cisco Public
BRKRST-2362
Cisco Public
Optimize by:
Reachability, Delay, Loss, Jitter, MOS, Throughput, Load, and/or $Cost
WAN1 WAN2
BRKRST-2362
Cisco Public
Enterprise WAN
MC/BR
Branch
WAN1
(IP-VPN)
BR BR
MC
BR
MC/BR
WAN2
MC
BR
(IPVPN, DMVPN)
BR
MC/BR
HQ
Optimize by: Reachability, Loss, Delay, Jitter, MOS, Throughput, Load, and/or $Cost
2013 Cisco and/or its affiliates. All rights reserved.
BRKRST-2362
Cisco Public
Basic Configuration
MC (Decision Maker)
key chain pfr key 0 key-string cisco ! pfr master ! border 10.4.5.4 key-chain pfr interface Ethernet0/0 internal interface Ethernet0/1 external border 10.4.5.5 key-chain pfr interface Ethernet0/0 internal interface Ethernet0/1 external ! learn throughput ! max-range-utilization 15 ! ! Load-Balancing enabled by default !
HQ
BR (Forwarding Path)
MC
! key chain pfr key 0 key-string cisco ! pfr border local Ethernet0/0 master 10.2.3.3 key-chain pfr !
WAN1 (IP-VPN)
BR
BR
MC/BR
MC/BR
BR
BRKRST-2362
Cisco Public
10
PfR cannot control WAAS Express traffic which is sourced from the router
pfr master border 192.168.254.2 key-chain pfr-keychain interface GigabitEthernet0/2 external max-xmit-utilization percentage 80 link-group secondary interface GigabitEthernet0/1.34 internal interface GigabitEthernet0/1.32 internal interface Tunnel0 internal interface Tunnel2 internal
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
11
Learning
BRKRST-2362
Cisco Public
12
Step #1 Learning
Automatic vs Static
Traffic Classes
MC
HQ
Learning
Prefixes ACL DSCP Based Applications Static Automatic
WAN1 (IP-VPN) WAN2 (IPVPN, DMVPN)
BR
BR
BR
BRKRST-2362
Cisco Public
13
Learning
PfR Operates on Traffic Classes
PfR determines the traffic classes from the
Traffic Classes
MC
HQ
traffic flowing through the border routers Subsets of the total traffic must be identified, and these traffic subsets are named traffic classes
Dest. IP DSCP Delay 0 Loss Jitter BW
BR
BR
Prefixes or
10.2.2.0/24
WAN1 (IP-VPN)
Dest. IP 10.2.2.0/24
DSCP EF
AppID
Delay 0
Loss
Jitter
BW
Applications
Dest. IP 10.2.2.0/24 DSCP AF31 AppID Delay 0 Loss Jitter BW
MC/BR
MC/BR
MC/BR
BR
10.1.1.0/24 10.1.2.0/24
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
10.2.1.0/24 10.2.9.0/24
14
HQ
Learn
Global
BR
BR
WAN1 (IP-VPN)
MC/BR
MC/BR
BR
BRKRST-2362
Cisco Public
15
HQ
Voice - Video
Service Class
BR
BR
WAN1 (IP-VPN)
Allows to define:
Specific policies per group
MC/BR MC/BR MC/BR
BR
Cisco Public
16
10.1.1.0/24 dscp ef
10.1.1.0/24 dst-port 50 10.1.1.0/24 telnet
Well-Known
20.1.0.0/16 ssh
10.1.1.0/24 nbar RTP 20.1.1.0/24 nbar citrix
NBAR
BRKRST-2362
Cisco Public
17
HQ
learn throughput
list seq 10 refname <CLASS_NAME_1> traffic-class access-list <ACL1> filter <PREFIX_LIST1> aggregation-type prefix-length <LENGTH1> throughput list seq 20 refname <CLASS_NAME_2> traffic-class access-list <ACL2> filter <PREFIX_LIST2> aggregation-type prefix-length <LENGTH2> throughput [Rest of the traffic]
MC/BR
BR
BR
#1
WAN1 (IP-VPN)
#2
MC/BR
MC/BR
BR
DEFAULT
BRKRST-2362
Cisco Public
18
HQ
BR
WAN1 (IP-VPN)
BR
When you want to use PfR for a subset of the traffic (ie Voice traffic only, rest is controlled by the routing protocol)
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
19
HQ
MC
Id
Delay
Loss
Ingress
Egress
BW
BW
BR
Exit
NetFlow Cache
Traffic Classes
WAN1 (IP-VPN)
BR
BR
NetFlow Cache
Automatic Learning is enabled by default once you enable PfR and add the Border Routers MC commands BRs to learn Traffic Classes
MC/BR
MC/BR
MC/BR
BR
BRKRST-2362
Cisco Public
20
HQ
20.2.1.0/24
30.1.1.0/24
AF31
0
BR2
BR1
E0/0
E0/0
NetFlow Cache
BR
BR
NetFlow Cache
Traffic Classes
WAN1 (IP-VPN) WAN2 (IPVPN, DMVPN)
BRs aggregate based on the configured destination mask Send the reports to the MC every minute
MC/BR
MC/BR
MC/BR
BR
BRKRST-2362
Cisco Public
21
Step #2 Measurement
Passive Monitoring
Traffic Classes
MC
HQ
Passive
Reachability Egress BW PfR Netflow Monitoring Flows Need not be symmetrical Delay Loss Ingress BW
NetFlow Cache
BR
BR
NetFlow Cache
WAN1 (IP-VPN)
Learning Monitoring (Passive Active) Choosing Your Policies Enforcing the Path
MC/BR MC/BR MC/BR
BR
BRKRST-2362
Cisco Public
22
HQ
BR
BR
0
BR BR1 BR2 Links Gig1/1 Gig1/2 Ingress
BR2
Egress
Gi1/1
Traffic Classes
WAN1 (IP-VPN)
PfR uses NetFlow to collect and aggregate passive monitoring statistics on a per traffic class basis.
MC Instructs BRs to monitor the performance
MC/BR
MC/BR
MC/BR
BR
BRKRST-2362
Cisco Public
23
HQ
89
BR BR1 BR2
1
Links Gig1/1 Gig1/2
34
10
Ingress 200 130
BR2
Egress 40 60
Gi1/1
Traffic Classes
NetFlow Cache
BR
BR
NetFlow Cache
WAN1 (IP-VPN)
Border routers collect and report passive monitoring statistics to the master controller approximately once per minute.
BRs gather performance measurements using Netflow BRs report Performance Metrics for Traffic Classes to the Master Controller
MC/BR
MC/BR
MC/BR
BR
BRKRST-2362
Cisco Public
24
Step #2 Measurement
Active Mode
Active
Reachability Jitter Delay Loss MOS
Traffic Classes Active Performance Metrics
MC
HQ
SLA
IP SLA Responder
BR
BR
Learning Monitoring (Passive - Active) Choosing Your Policies Enforcing the Path
MC/BR MC/BR MC/BR
BR
BRKRST-2362
Cisco Public
25
HQ
SLA
BR
BR
MC/BR
MC/BR
MC/BR
BR
Cisco Public
26
HQ
SLA
Destination Prefix
DSCP
Delay
Jitter
Loss
BR
Exit
10.1.1.1/32
10.1.10.0/24
EF
AF31 0
BR1
BR1 BR2
Gi1/1
Gi1/2 Gi1/1
BR
BR
Traffic Classes
WAN1 (IP-VPN) WAN2 (IPVPN, DMVPN)
Active monitoring involves creating a stream of synthetic traffic (IP SLA probes) that replicates a traffic class as closely as possible. MC Instructs BRs to monitor the performance
MC/BR MC/BR MC/BR
BR
BRKRST-2362
Cisco Public
27
HQ
SLA
Destination Prefix
DSCP
Delay
Jitter
Loss
BR
Exit
10.1.1.1/32
10.1.10.0/24
EF
AF31 0
60
110 89
10
15 26
0
0 1
20
52 34
40
60 10
BR1
BR1 BR2
Gi1/1
Gi1/2 Gi1/1
BR
BR
Traffic Classes
WAN1 (IP-VPN) WAN2 (IPVPN, DMVPN)
BRS gather performance measurements using IP SLA probes The performance metrics of the synthetic traffic are measured The results are applied to the traffic class entry in the Master Controller database BRs report Performance Metrics for Traffic Classes
MC/BR MC/BR MC/BR
BR
BRKRST-2362
Cisco Public
28
Unreachable
Jitter
MOS
Bandwidth
Monitor Mode
When to use?
Passive
Internet presence deployment Destination prefixes are all over the internet. These destinations may not respond to ICMP probes. Traffic is TCP traffic Enterprise deployment Traffic is Between Head-quarter/Branch. If there is TCP traffic Traffic is Between Head-quarter/Branch. The only optimization criteria is traffic-class performance (i.e. no optimization based on bandwidth).
Both
Active
Active Throughput
Fast
BRKRST-2362
Cisco Public
29
HQ
Link
Load balancing Max utilization Link grouping $Cost
Application Performance
Reachability
Delay Loss MOS Voice, Video, Critical
BR BR
Jitter
WAN1 (IP-VPN)
Learning Monitoring (Passive Active) Choosing Your Policies Enforcing the Path
MC/BR MC/BR MC/BR
BR
BRKRST-2362
Cisco Public
30
HQ
Voice - Video
BR
BR
Critical Application
2. Loss 4. Delay
WAN1 (IP-VPN)
Load-Balancing
MC/BR MC/BR MC/BR
Multiple resolvers can be assigned Set of Policies per Application Group Resolver Priority
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
BR
Cisco Public
31
HQ
MC
pfr master max-range-utilization percent 30 delay relative 200 loss threshold 50000 mode <monitor-mode> resolve delay resolve loss
Per Interface
BR
BR
WAN1 (IP-VPN)
pfr master border 10.2.4.4 interface Ethernet0/1 external max-xmit-utilization percentage 80 maximum utilization receive percentage 80 link-group WAN1
IOS 15.2(3)T
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
MC/BR
MC/BR
MC/BR
BR
Cisco Public
32
HQ
MC
pfr-map MYMAP 10 match pfr learn list <CLASS_NAME_1> <Threshold definitions> <Monitoring mode definition> <Policy definitions> <Preferred Path and Fallback option> <Probe frequency> <Periodic timer definition>
Application Group #2
WAN1 (IP-VPN)
BR
BR
pfr-map MYMAP 20 match pfr learn list <CLASS_NAME_2> <Threshold definitions> <Monitoring mode definition> <Policy definitions> <Preferred Path and Fallback option> <Probe frequency> <Periodic timer definition>
IOS 15.2(3)T
MC/BR
MC/BR
MC/BR
BR
BRKRST-2362
Cisco Public
33
Delay Absolute 70 60 50 40 30 20 10 0 1 3 5 7 9 11 13 15 17 19
Delay Relative
Threshold 35 ms
20 10 0
21 23
25 27 29
31 33
BRKRST-2362
Cisco Public
HQ
Destination Prefix
BGP
Egress: route injection or Modifying the BGP Local Preference attribute Ingress: BGP AS-PATH Prepend or AS Community
Application
Dynamic PBR NBAR/CCE
BR BR
Learning Monitoring (Passive Active) Choosing Your Policies Enforcing the Path
35
MC/BR
MC/BR
MC/BR
BR
BRKRST-2362
Cisco Public
Learning
Automatic, PBR
BRKRST-2362
Cisco Public
36
BRKRST-2362
Cisco Public
Active Mode
Simplifying the Configuration
Active Fast Active Throughput TCP, UDP, JITTER probe need ip sla responder Whats needed: Configure a pfr-map that matches prefixes or applications @ Remote-site1 Define the policies Define the jitter probes And REPEAT for each remote site
MC/BR
HQ pfr-map MYMAP 10 match pfr learn list LEARN_LIST_VIDEO_BRANCH1 set periodic 90 set delay threshold 200 MC set loss threshold 50000 IP SLA Responder SLA set jitter threshold 30 set mode monitor fast set resolve loss priority 2 variance 5 set resolve jitter priority 3 variance 5 set resolve delay priority 4BR variance 5 BR no set resolve range no set resolve utilization set probe frequency 4 set active-probe jitter 20.9.9.9 target-port 2000
WAN1 (IP-VPN)
MC/BR
MC/BR
BR
BRKRST-2362
Cisco Public
38
HQ
MC
SLA
IP SLA Responder
BR
BR
MC/BR
MC/BR
BR
IP SLA Responder
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
39
PfR Domain
HQ
Site HQ
MC
SLA
BR
Each MC announces its inside prefixes, together with probe target address and site names
MC/BR
WAN1 (IP-VPN)
Site 1
Site 2
MC/BR
MC/BR
Site 3
BR
IP SLA Responder
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
40
PfR Domain
Target Discovery
HQ
MC
SLA
BR
BR
Mapping table built on each site Allows automatic jitter probe configuration
MC/BR
MC/BR
MC/BR
BR
BRKRST-2362
Cisco Public
41
pfr-map MAP-TEST3 15 pfr-map MAP-TEST3 15 match pfr learn list LEARN_LIST_BRANCH2 pfr-map MAP-TEST3 15 match pfr learn list LEARN_LIST_BRANCH2 pfr-map MAP-TEST3 15 match pfr learn list LEARN_LIST_BRANCH2 set periodic 90 pfr-map MAP-TEST3 15 match pfr-map pfr learnMAP-TEST3 list LEARN_LIST_BRANCH2 set periodic 90 15 match pfr learn list LEARN_LIST_BRANCH2 set periodic 90 set delay threshold 200 pfr-map MAP-TEST3 15 match pfr learn list LEARN_LIST_BRANCH2 set periodic 90 set delay threshold 200 pfr-map MAP-TEST3 15 match pfr learnMAP-TEST3 list LEARN_LIST_BRANCH2 set periodic 90 set threshold delay threshold 200 pfr-map 15 set loss 50000 match pfr learn list LEARN_LIST_BRANCH2 set periodic 90 set delay threshold 200 pfr-map MAP-TEST3 15 set lossset threshold 50000 match pfr learnMAP-TEST3 list LEARN_LIST_BRANCH2 set periodic 90 delay threshold 200 pfr-map MAP-TEST3 pfr-map 1515 set loss threshold 50000 match pfr learn list LEARN_LIST_BRANCH2 set jitter threshold 30 set periodic 90 set delay threshold 200 set loss threshold 50000 match pfr learn list LEARN_LIST_BRANCH2 set jitter threshold 30 set periodic 90 set delay threshold 200 set loss threshold 50000 match pfr learn LEARN_LIST_BRANCH2 match pfr learn listlist LEARN_LIST_BRANCH2 set jitter threshold 30 set periodic 90 set mode fast set delay threshold 200 set loss threshold 50000 setmonitor jitter threshold 30 set periodic 90 set mode monitor fast set delay threshold 200 set loss threshold 50000 set jitter threshold 30 set periodic 90 set periodic 90 200 set mode monitor fast set delay threshold set resolve loss priority 2 threshold variance 5 set loss 50000 set jitter threshold 30 set mode monitor fast set delay threshold 200 set resolve loss priority 2 threshold variance 5 set loss 50000 set jitter threshold 30 set mode monitor fast set mode control set delay threshold 200 set resolve loss priority 2 threshold variance 5 set 50000 set resolve jitter priority 3loss variance 5 set jitter threshold 30 route set mode monitor fast set resolve loss priority 2 variance 5 set loss threshold 50000 set resolve jitter priority 3 variance 5 set jitter threshold 30 set mode monitor fast set resolve loss priority 2 threshold variance set delay threshold 200 set loss 50000 set resolve jitter priority 3 variance 5 set jitter threshold 30 5 set resolve delay priority 4 variance 5 variance set mode monitor fast set resolve loss priority 2 set resolve jitter priority 3 threshold variance 5 set jitter 30 5 5 set resolve delay priority 4 variance 5 set mode monitor fast set resolve loss priority 2 variance set resolve jitter priority 3 threshold variance 5 set loss threshold set jitter 3050000 set resolve delay priority 4 variance 5 variance set mode monitor fast no set resolve set resolve loss priority 2 setrange resolve jitter priority 3 variance 5 5 5 set resolve delay priority 4 variance 5 variance set mode monitor fast no set resolve range set resolve loss priority 2 set resolve jitter priority 3 variance set resolve delay priority 4 variance 5 set jitter threshold 305 5 5 set mode monitor fast no set resolve range set resolve loss priority 2 variance no set resolve utilization set resolve jitter priority 3 variance set resolve delay priority 4 variance 5 variance no set resolve range set resolve loss priority 2 no set resolve utilization set resolve jitter priority 3 variance 5 5 set resolve delay priority 4 variance 5 variance no set resolve range set mode monitor fast set resolve loss priority 2 no set resolve utilization set resolve jitter priority 3 variance set probe frequency 4 set resolve delay priority 4 variance 5 5 55 no set resolve range no set resolve utilization set resolve jitter priority 3 variance set probe 4utilization set resolve delay priority 4 variance 5 no set resolve range no frequency set resolve set resolve loss priority 2 variance resolve jitter priority 3 variance set probe 4set set resolve delay priority 4 variance 5 55 set active-probe jitter 20.9.9.9 target-port 2000 no set resolve range no frequency set resolve utilization set probe frequency 4 set resolve delay priority 4 variance 5 set active-probe jitter 20.9.9.9 target-port 2000 no set resolve range no set resolve utilization set probe frequency 4utilization set resolve jitter priority variance set resolve delay priority variance 55 set active-probe jitter 20.9.9.9 target-port 2000 43 no set resolve range no set resolve set probe frequency 4 set active-probe jitter 20.9.9.9 target-port 2000 no set resolve range no set resolve utilization set probe frequency 4 set active-probe jitter 20.9.9.9 target-port 2000 set resolve delay priority 4 variance 5 no set resolve range no set resolve utilization set probe frequency 4utilization set active-probe jitter 20.9.9.9 target-port 2000 no set resolve set probe frequency 4 set active-probe jitter 20.9.9.9 target-port 2000 set resolve nono set resolve utilization set probe frequency 4range set active-probe 20.9.9.9 2000 set probe jitter frequency 4 target-port set active-probe jitter 20.9.9.9 target-port 2000 no set resolve utilization set probe frequency 4 set active-probe jitter 20.9.9.9 target-port 2000 set active-probe jitter 20.9.9.9 target-port 2000 set probe frequency 4 set active-probe jitter 20.9.9.9 target-port 2000 2000 BRKRST-2362 set active-probe jitter 20.9.9.9 target-port 2013
set periodic 90 set delay threshold 200 set loss threshold 50000 set jitter threshold 30 set mode monitor fast set resolve loss priority 2 variance 5 set resolve jitter priority 3 variance 5 set resolve delay priority 4 variance 5 no set resolve range no set resolve utilization set probe frequency 4
Cisco Public
42
BRKRST-2362
Cisco Public
43
BRKRST-2362
Cisco Public
ISP1
ISP2
MC/BR
WAN1
(IP-VPN)
BR BR
MC BR
MC/BR
WAN2
MC
BR
(IPVPN, DMVPN)
BR
MC/BR
HQ
BRKRST-2362
Cisco Public
45
ISP Y
Manual Solution
Consider The Traffic Patterns of the Enterprise.
Does the Enterprise Host Content? Does the Enterprise Access Content?
ISP A
ISP B
Not Sure?
Graph Interface Byte Count Use NetFlow Even better, use Flexible NetFlow
Egress
1GE
R1
100M
R2
In General, sites have a 80:20 traffic volume (in bytes) mix. Fix only the 80% Direction.
20% direction doesnt matter unless links are widely varying speeds.
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
Ingress
Cisco Public
46
Implementation
Static or Redistribution / Received
Direction Applied: Inbound Direction Applied: Outbound
Inbound
Inbound
BRKRST-2362
Cisco Public
47
HQ
R3
iBGP
R4 R5
eBGP
eBGP
ISP2
ISP5
Cisco Public
48
HQ
Learning
iBGP
R5
Monitoring
55% 45%
eBGP
ISP2
ISP5
BRKRST-2362
Cisco Public
49
Internet Presence
Outbound Load Balancing Only
pfr master max-range-utilization percent 25 logging ! border 10.4.5.4 key-chain pfr interface Ethernet0/0 internal interface Ethernet0/1 external max-xmit-utilization percentage 90 ! border 10.4.5.5 key-chain pfr interface Ethernet0/0 internal interface Ethernet0/1 external max-xmit-utilization percentage 90 ! learn prefixes 1000 applications 0 expire after time 300 ! ! max prefix total 10000 learn 10000 exporter MYEXPORTER mode monitor passive periodic 600
Link Range Utilization Keep the usage on a set of exit links within a certain percentage range of each other
Max Link Utilization Upper threshold on the amount of traffic a specific link can carry
Max Prefixes Learn 1000 Prefixes Delete Prefix if not relearned in 60 Minutes
Global Policies Load Balancing enabled by default Link OOP if : % Util > Lowest + 10 % Util > 90 Revaluate Exit every 10 Minutes
2013 Cisco and/or its affiliates. All rights reserved.
BRKRST-2362
Cisco Public
50
HQ
Learning
iBGP
R5
Monitoring
20%
17%
eBGP
ISP2
ISP5
BGP Community
BRKRST-2362
Cisco Public
51
Internet Presence
Inbound Load Balancing
Learning Inside Prefix
pfr master policy-rules MYMAP max-range-utilization percent 25 logging ! [BR PROVISIONNING] ! learn inside bgp prefixes 1000 applications 0 expire after time 300 ! max prefix total 10000 learn 10000 max range receive percent 35 exporter MYEXPORTER mode monitor passive periodic 600 ! pfr-map MYMAP 10 match pfr learn inside !
Link Range Utilization - Ingress Keep the usage on a set of exit links within a certain percentage range of each other
BRKRST-2362
Cisco Public
52
Internet Presence
Downgrade Method
AS-PATH PREPEND BGP Community pfr master max-range-utilization percent 10 logging ! border 10.4.5.4 key-chain pfr interface Ethernet0/0 internal interface Ethernet0/1 external downgrade bgp community 3:100 ! border 10.4.5.5 key-chain pfr interface Ethernet0/0 internal interface Ethernet0/1 external downgrade bgp community 4:200 !
Nothing required
Send-community enabled under bgp neighbor <ip> soft-reconfiguration inbound per neighbor max range receive percent X under pfr master
Cisco Public
53
N N N INPOLICY 59 105 0 0 N N N
N NN 10.5.5.5 Et0/1 0 0 27 N N
BGP 1
PfR has calculated the per traffic class (which is per /24 destination in this case) egress bandwidth usage as well as the ingress
BRKRST-2362
Cisco Public
54
Traffic-class: Destination Prefix : 20.20.0.0/24 Source Prefix : N/A Destination Port : N/A Source Port : N/A DSCP :N Protocol : N/A Application Name: : N/A
General: Control State : Controlled using BGP Traffic-class status : INPOLICY Current Exit : BR 10.4.4.4 interface Et0/1, Tie breaker was Range Time on current exit : 0d 0:4:49 Time remaining in current state : @10 seconds Traffic-class type : Learned Improper config : None Last Out-of-Policy event: No Out-of-Policy Event Average Passive Performance Current Exit: (Average for last 5 minutes) Unreachable : 0% -- Threshold: 50% Delay : 60% -- Threshold: 50% Loss : 0% -- Threshold: 10% Egress BW : 13 kbps Ingress BW : 1 kbps Time since last update : 0d 0:0:15
TC Performance Performance Details Last Resolver decisions Filter on any type of traffic
Average Active Performance Current Exit: (Average for last 5 minutes) Unreachable : 0% -- Threshold: 50% Delay : 50% -- Threshold: 50%
============================================================================================== R3#
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
55
Load Balancing
Checking Load Balancing Accuracy
R3#sh pfr master exits ============================================================================================== PfR Master Controller Exits:
General Info: ============= E - External I - Internal N/A - Not Applicable Up/ ID Name Border Interface ifIdx IP Address Mask Policy Type Down --- ------------ --------------- ----------- ----- --------------- ---- ----------- ---- ---2 10.4.4.4 Et0/1 2 100.4.81.4 24 Util E UP 1 10.5.5.5 Et0/1 2 100.5.82.5 24 Util E UP Global Exit Policy: =================== Cost: In Policy Exits Performance: ================== Egress Ingress ---------------------------------------------------- -----------------------------------ID Capacity MaxUtil Usage % RSVP POOL OOP Capacity MaxUtil Usage % OOP --- -------- -------- -------- --- -------------- ----- -------- -------- -------- --- ----2 1000 900 232 23 N/A N/A 1000 1000 42 4 N/A 1 1000 900 317 31 N/A N/A 1000 1000 16 1 N/A TC and BW Distribution: ======================= # of TCs BW (kbps) Probe Active Name/ID Current Controlled InPolicy Controlled Total Failed Unreach (count) (fpm) ---- ---------------------------- ---------------------- ------ -------2 23 23 23 509 232 0 0 1 26 26 26 1203 317 0 0 Exit Related TC Stats: ====================== Priority highest nth -----------------Number of TCs with range: 0 Number of TCs with util: 0 Number of TCs with cost: 0
HQ
R3
iBGP
R4 R5
eBGP
eBGP
ISP2
ISP5
0 0 0
59
2013 Cisco and/or its affiliates. All rights reserved.
BRKRST-2362
Cisco Public
56
Enterprise WAN
Application Based Routing
BRKRST-2362
Cisco Public
ISP1
ISP2
Enterprise WAN
MC/BR
Branch
WAN1
(IP-VPN)
BR BR
MC BR
MC/BR
WAN2
MC
BR
(IPVPN, DMVPN)
BR
MC/BR
HQ
BRKRST-2362
Cisco Public
58
Voice - Video
Critical Application Rest of the Traffic
MC
HQ
BR
BR
MC/BR
MC/BR
MC/BR
BR
Cisco Public
59
WAN1
(IP-VPN)
BR BR
MC
Voice - Video
MC/BR
BR
WAN2
MC
BR
(IPVPN, DMVPN)
BR
HQ
MC/BR
Multisite MC Peering Framework MC to MC Peering Framework can be used to exchange policies, services and feedback Remote Site Discovery Simplifies Configuration prefix and target discovery Probing Efficiency sharing of probe data across policies
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
60
HQ
10.10.0.0/16
10.3.3.3
SLA BR
BR
WAN1 (IP-VPN)
MC/BR
MC/BR
MC/BR
BR
20.9.9.9
30.10.10.10
20.20.0.0/16
Cisco Public
30.30.0.0/16
61
Target Discovery
Configuration Example
! pfr master policy-rules MYMAP mc-peer head-end Loopback0 target-discovery <responder-list HQ_TARGET> <insideprefixes HQ_PREFIX> border 10.4.4.4 key-chain pfr interface Ethernet0/0 internal interface Ethernet0/1 external link-group SP1 ! border 10.5.5.5 key-chain pfr interface Ethernet0/0 internal interface Ethernet0/1 external link-group SP2 ! MC
HQ
10.10.0.0/16 10.3.3.3
SLA BR BR
WAN1 (IP-VPN)
MC/BR
MC/BR
MC/BR
BR
20.9.9.9
IOS 15.2(3)T
30.10.10.10
20.20.0.0/16
2013 Cisco and/or its affiliates. All rights reserved.
30.30.0.0/16
62
Cisco Public
Target Discovery
Hub Site
MC
HQ
10.10.0.0/16 10.3.3.3
SLA BR BR
R3#sh pfr master target-discovery PfR Target-Discovery Services Mode: Static Domain: 59501 Responder list: HQ_TARGET Inside-prefixes list: HQ_PREFIX SvcRtg: client-handle: 7 sub-handle: 6 pub-seq: 1
PfR Target-Discovery Database (local) Local-ID: 10.3.3.3 Desc: R3 Target-list: 10.4.5.5, 10.4.5.4 Prefix-list: 10.10.4.0/24, 10.10.3.0/24, 10.10.2.0/24, 10.10.1.0/24 PfR Target-Discovery Database (remote) MC-peer: 30.10.10.10 Target-list: 30.30.0.10 Prefix-list: 30.30.0.0/16 Desc: R10
WAN1 (IP-VPN)
MC/BR
MC/BR
MC/BR
BR
20.9.9.9
30.10.10.10
20.20.0.0/16
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
30.30.0.0/16
63
Cisco Public
Target Discovery
Branch
MC
HQ
10.10.0.0/16 10.3.3.3
SLA BR BR
R10#sh pfr master target-discovery PfR Target-Discovery Services Mode: Dynamic Domain: 59501 SvcRtg: client-handle: 2 sub-handle: 1 pub-seq: 1
PfR Target-Discovery Database (local)
WAN1 (IP-VPN)
BR
20.9.9.9
30.10.10.10
20.20.0.0/16
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
30.30.0.0/16
64
Cisco Public
HQ
SLA
Critical Application
BR BR
MC/BR
MC/BR
MC/BR
BR
10.10.1.0/24 10.10.2.0/24
2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
10.20.1.0/24 10.20.9.0/24
65
HQ
SLA BR BR
learn throughput ! list seq 10 refname LEARN_VOICE_VIDEO traffic-class access-list VOICE_VIDEO filter BRANCH_PREFIX aggregation-type prefix-length <LENGTH> throughput ! list seq 20 refname LEARN_CRITICAL traffic-class access-list CRITICAL filter BRANCH_PREFIX aggregation-type prefix-length <LENGTH> throughput
! [Rest of the traffic]
WAN1 (IP-VPN)
MC/BR
MC/BR
MC/BR
BR
BRKRST-2362
Cisco Public
66
HQ
SLA BR BR
WAN1 (IP-VPN)
ip prefix-list BRANCH_PREFIX seq 5 permit 20.20.0.0/16 ip prefix-list BRANCH_PREFIX seq 10 permit 30.30.0.0/16 !
MC/BR
MC/BR
MC/BR
BR
Cisco Public
67
HQ
! pfr master learn list seq 10 refname VOICE_VIDEO traffic-class application nbar rtp-audio filter BRANCH thoughput list seq 20 refname CRITICAL traffic-class application nbar citrix filter BRANCH thoughput !
SLA BR BR
WAN1 (IP-VPN)
BR
BRKRST-2362
Cisco Public
68
HQ
MC SLA BR BR
WAN1 (IP-VPN)
MC/BR
MC/BR
MC/BR
BR
Cisco Public
69
HQ
Monitoring
TD Enabled
Fast Voice/Video
NetFlow
SLA BR BR
Probes
Probes
WAN1 (IP-VPN)
EF
DSCP App Id
89
Delay 60 110 89
35
Loss 0 0 1
34
Ingress BW 20 52 34
10
Egress BW 40 60 10
BR2
BR BR1 BR1 BR2
Gi1/1
Exit Gi1/1 Gi1/2 Gi1/1 MC/BR MC/BR MC/BR
BR
BRKRST-2362
Cisco Public
70
Step3 Policies
Define your policies per group
MC
HQ
Policies
Voice, Video, Critical
BR BR
SLA
1. Link-Group
Voice - Video
Critical Application
2. Loss 4. Delay
MC/BR MC/BR MC/BR
BR
Load-Balancing
BRKRST-2362
Cisco Public
71
Configuration Sample
Policies Voice and Video
Policies Thresholds Applied to the voice and video traffic Loss, delay and jitter Monitor mode fast Actively probe all exits to get performance metrics Policies Definition List all policies Assign priority Administrative policy: SP1 is the primary path, fallback to SP2 if OOP
Jitter Probe Target Discovery is used No need to manually define the probe target
BRKRST-2362
Cisco Public
72
Configuration Sample
Policies Critical Applications
Policies Thresholds Applied to the voice and video traffic Loss, delay and jitter
pfr-map MYMAP 20 match pfr learn list LEARN_CRITICAL set delay threshold 120 set loss threshold 200000 set mode monitor active throughput set resolve delay priority 1 variance 20 set resolve loss priority 5 variance 10 set link-group SP1 fallback SP2 set probe frequency 4 set periodic 90
Monitor mode Active Actively probe the current exit to get performance metrics. Mode fast is also an option
Policies Definition List all policies Assign priority Administrative policy: SP1 is the primary path, fallback to SP2 if OOP
IOS 15.2(3)T
BRKRST-2362
Cisco Public
73
Configuration Sample
Policies Rest of the Traffic
! pfr master policy-rules MYMAP max-range-utilization percent 22 ! mc-peer head-end Loopback0 target-discovery ! logging ! ! Default Policies ! mode route protocol pbr !
IOS 15.2(3)T
Link Range Utilization Keep the usage on a set of exit links within a certain percentage range of each other
Global Policies Apply for the rest of the traffic Load Balancing enabled by default
BRKRST-2362
Cisco Public
74
Target Discovery
Hub Site Jitter probes Generated
R3#sh pfr master active-probes target-discovery PfR Master Controller active-probes (TD) Border = Border Roter running this probe MC-Peer = Remote MC associated with this target Type = Probe Type Target = Target Address TPort = Target Port N - Not applicable Destination Site Peer Addresses: MC-Peer 30.10.10.10 20.9.9.9 Targets 30.30.0.10 20.20.0.9
WAN1 (IP-VPN)
HQ
10.10.0.0/16 10.3.3.3
SLA BR BR
MC
The following Probes are running: Border 10.4.4.4 10.4.4.4 10.5.5.5 10.4.4.4 10.4.4.4 10.5.5.5 R3#
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
Idx 2 2 2 2 2 2
State MC-Peer TD-Actv 30.10.10.10 TD-Actv 30.10.10.10 TD-Actv 30.10.10.10 TD-Actv 20.9.9.9 TD-Actv 20.9.9.9 TD-Actv 20.9.9.9
Type Target TPort jitter 30.30.0.10 5000 jitter 30.30.0.10 5000 jitter 30.30.0.10 5000 jitter 20.20.0.9 5000 jitter 20.20.0.9 5000 jitter 20.20.0.9 5000
MC/BR
MC/BR
MC/BR
BR
20.9.9.9
30.10.10.10
20.20.0.0/16
Cisco Public
30.30.0.0/16
75
PBR
PBR
PfR has calculated the per traffic class (which is per /24 destination in this case) egress bandwidth usage as well as the ingress
BRKRST-2362
Cisco Public
76
TC Performance Performance Details Last Resolver decisions Filter on any type of traffic
Cisco Public
77
HQ
MC
BR
BR
MC/BR
MC/BR
MC/BR
BR
BRKRST-2362
Cisco Public
78
PBR Example
Troubleshooting Path Enforcement
R4#sh route-map dynamic route-map OER_INTERNAL_RMAP, permit, sequence 0, identifier 402653185 Match clauses: ip address (access-lists): oer#1 Set clauses: ip next-hop 10.4.5.5 interface Ethernet0/0 Policy routing matches: 98809 packets, 67823285 bytes route-map OER_INTERNAL_RMAP, permit, sequence 1, identifier 3439329282 Match clauses: ip address (access-lists): oer#2 Set clauses: ip next-hop 100.4.8.8 interface Ethernet0/1 Policy routing matches: 75247 packets, 51786342 bytes Current active dynamic routemaps = 1 R4#
A dynamic route-map is created by PfR to enforce traffic to the chosen exit point Next hop = R5 A dynamic route-map is created by PfR to enforce traffic to the chosen exit point Next hop = WAN
BRKRST-2362
R4#sh ip access-lists dynamic Extended IP access list oer#1 67108863 permit ip any 30.1.6.0 0.0.0.255 dscp af31 (17981 matches) 134217727 permit ip any 30.1.4.0 0.0.0.255 dscp af31 (17984 matches) 268435455 permit ip any 30.1.5.0 0.0.0.255 dscp af31 (17975 matches) 536870911 permit ip any 30.1.2.0 0.0.0.255 dscp ef (17938 matches) 1073741823 permit ip any 30.1.1.0 0.0.0.255 dscp ef (18002 matches) Extended IP access list oer#2 67108863 permit ip any 30.1.3.0 0.0.0.255 dscp af31 (15000 matches) 134217727 permit ip any 30.1.7.0 0.0.0.255 dscp default (15034 matches) 268435455 permit ip any 30.1.10.0 0.0.0.255 dscp default (15958 matches) 536870911 permit ip any 30.1.9.0 0.0.0.255 dscp default (15937 matches) 1073741823 permit ip any 30.1.8.0 0.0.0.255 dscp default (15966 matches) R4#
Cisco Public
Design Considerations
Scalability on the hub
Number of jitter probes
CPU impact on the BRs
Traffic Classes
MC
HQ
SLA BR BR
Probe Frequency
CPU impact on the BRs
Probes
Probes
BR
BRKRST-2362
Cisco Public
80
Network Management
NetFlow v9 Export
SNMP MIB
BRKRST-2362
Cisco Public
HQ
NetFlow
MC
SNMP Read
BR
MC/BR
MC/BR
MC/BR
BR
BRKRST-2362
Cisco Public
82
Type (1 Byte) Type: Type=1: Passive Update, Type=2: Passive Performance, Type=3: Active Update, Type=4: Active Performance, Type=5: Traffic-Class Event
BRKRST-2362
Cisco Public
83
Policy Config
BR address, External interface id, BR interface name, Link capacity, RSVP reserved bandwidth pool, Maximum ingress bandwidth, Maximum egress bandwidth, BGP Community Link group Name, Cost nickname, Cost type Cost discard rollup count
Policy id pfr-map name State Threshold Priority Variance MOS Link group Name
Reason Config
http://docwiki.cisco.com/wiki/AVC-Export:PfR
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
84
Passive/Active Reports
Passive Update Encoded Traffic-Class ID BR Address, External interface ID, Direction State First switched time Last switched time Sum of round-trip-time, Samples, Loss, Unreachable, Bytes, Packets, Flows, Next hop address Passive Performance Encoded Traffic-Class ID BR Address, External interface ID Direction Routing protocol State Reason ID Timestamp Left time Passive short-term unreachable Passive short-term loss Passive short-term round-trip-time Passive long-term unreachable Passive long-term loss Passive long-term round-trip-time Egress bandwidth Ingress bandwidth BGP Prepend BGP Community Active Update Encoded Traffic-Class ID BR Address External Interface ID State Average round-trip-time Minimum round-trip-time Maximum round-trip-time Sum of round-trip-time Unreachable Loss Jitter MOS below counts MOS total counts Initiations Completes Passive Performance Encoded Traffic-Class ID BR Address External interface ID Routing protocol State Reason ID Timestamp Left time Active short-term unreachable Active short-term loss Active short-term round-trip-time Active short-term jitter Active Short-term MOS Active long-term unreachable Active long-term loss Active long-term round-trip-time
http://docwiki.cisco.com/wiki/AVC-Export:PfR
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
85
http://docwiki.cisco.com/wiki/AVC-Export:PfR
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
86
Denial of Service
Billing
Cisco Public
87
LiveAction
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
88
Conclusion
Platform Support
Software Packages
URLs
BRKRST-2362
Cisco Public
Cisco 3900
Cisco 3900 Cisco 3800 12.4, 12.4T 15M/T
Cisco 6500
12.2(33)SXH (Deprecated)
Cisco 2900
Cisco 1900 Cisco 1800 12.4, 12.4T, 15M/T Cisco 2800 12.4, 12.4T 15M/T
Cisco 7600
12.2(33)SRB (Limited Support)
BRKRST-2362
Cisco Public
90
Services (AES) technology package license All other ASR1000 (ASR1002-F, ASR1002, ASR1004, ASR1006, ASR1013): Use Advanced IP Services (AIS/AISK9) or Advanced Enterprise Services (AES/AESK9) images
BRKRST-2362 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
91
Technical References
Docwiki Performance Routing Home
Technology Overview, Solution Guides, Troubleshooting Guides, FAQ
http://docwiki.cisco.com/wiki/PfR:Home
Configuration
Understanding Performance Routing
http://www.cisco.com/en/US/docs/ios/pfr/configuration/guide/pfr-understand.html
Basic Configuration
http://www.cisco.com/en/US/docs/ios/pfr/configuration/guide/pfr-basic.html
Advanced Configuration
http://www.cisco.com/en/US/docs/ios/pfr/configuration/guide/pfr-advanced.html
BRKRST-2362
Cisco Public
92
BRKRST-2362
Cisco Public
93
Call to Action
Get hands-on experience attending one of the Walk-in Labs Schedule face to face meeting with one of Ciscos engineers at the Meet the Engineer center Discuss your projects challenges at the Technical Solutions Clinics
BRKRST-2362
Cisco Public
94
BRKRST-2362
Cisco Public
95