Pfrv3 Work Flow Guide
Pfrv3 Work Flow Guide
Version:
1.0 November 2014
Contents
1
3.2
3.3
3.4
5.1
5.2
5.3
5.4
5.5
5.6
Monitoring Operation...........................................................................................................................................32
6.1
6.2
6.3
Troubleshooting....................................................................................................................................................66
7.1
7.2
7.3
7.4
8.2
8.3
8.4
8.5
1 What is PfRv3?
PfR v3 is the evolution of Performance Routing (PfR). It is a one-touch provisioning and multisite coordination
solution that simplifies network provisioning. PfRv3 is an DSCP and application-based policy framework that
provides a multi-site aware bandwidth and path control optimization for WAN and cloud-based applications. It is
integrated with existing AVC components such as Performance Monitoring, QoS, and NBAR2. This is extremely
useful for enterprise and managed service providers who are looking for methods to increase the WAN reliability
and availability while saving cost.
Intelligent Path Control using Cisco Performance Routing (PfR) improves application delivery and WAN
efficiency. PfR enables intelligence of Cisco IOS routers to improve application performance and
availability. PfR allows customers to protect critical applications from fluctuating WAN performance
while intelligently load balancing traffic over all WAN paths. PfR monitors network performance and
selects the best path for each application based on advanced criteria such as reachability, delay, jitter
and loss.
In this workflow, we focus on the step-by-step workflow guide for PfRv3 provision, operation and
troubleshooting on IOS-XE platforms. Basic VPN configuration is not covered in this document, for more
information about VPN WAN Design configuration, see the latest Cisco Validated Designs for Enterprise
WAN.
Hub Master Controller (Hub MC) - The master controller at the hub site, which can be either a
data center or a head quarter. All policies are configured on the hub MC. It acts as master
controller for the site and makes optimization decision.
Hub Border Router (Hub BR) - The border controller at the hub site. WAN interface terminates
in the hub border routers. PfRv3 is enabled on these interfaces. You can configure more than
one WAN interface on the same device. You can have multiple hub border devices.
Branch Master Controller (Branch MC) - The branch master controller is the master controller
at the branch site. There is no policy configuration on this device. It receives policy from the hub
MC. This device acts as master controller for that site for making optimization decision.
Branch Border Router (Branch BR) - The border device at the branch site. There is no
configuration other than enabling of PfRv3 border MC on the device. The WAN interface that
terminates on the device is detected automatically.
In general, Hub Master Controller like CSR1000v or ASR1002x router with 8G/16G DRAM memory size,
and RP2/ESP100, RP2/ESP200 as Hub Border Router can support up to 2000 branch sites deployment.
On the branch site, ISR G2 or ISR4400/4300 Series Router can be deployed depending on performance
requirements.
Notes:
Site-prefix prefix-list define static site-prefix for local-site, and this disable automatic site-prefix
learning on the border router;
Static site-prefixes prefix-list is only required for transit sites like DMVPN Hub site for spoke to
spoke traffic which disable Automatic prefix learn;
Enterprise-prefix prefix-list define the boundary for all inside enterprise prefix; any prefix out
range of these prefix-list and not advertised by any remote sites are considered as internet
prefix, and should be controlled and routed over internet-bound links;
EIGRP SAF auto-configuration enabled and unicast-listen request from remote site when domain
hub master configured.
The border routers on the central site register to the central MC with their external interface definition
together with their path names. You can use the global routing table (default VRF) or define specific
VRFs for hub border routers.
BR1 example configuration:
!
interface Loopback0
ip address 10.8.1.1 255.255.255.255
!
domain one
vrf default
border
source-interface Loopback0
master 10.8.3.3
!
!
interface Tunnel100
bandwidth 100000
ip address 10.0.100.84 255.255.255.0
no ip redirects
ip mtu 1400
ip nhrp authentication cisco
ip nhrp map multicast dynamic
ip nhrp network-id 1
ip nhrp holdtime 600
ip tcp adjust-mss 1360
load-interval 30
tunnel source GigabitEthernet3
tunnel mode gre multipoint
tunnel key 100
tunnel protection ipsec profile DMVPN-PROFILE1
domain one path MPLS
!
Notes:
When config path name, there are two kinds of external interfaces, one is enterprise link by
default which is normally a DMVPN Tunnel overlay interface connected with remote branch
sites here; the other is internet link with internet-bound option which is used only for internet
edge load balance.
internet-bound external interface is enabled on Hub site only for internet edge deployment,
and cannot be discovered by any branch site.
bandwidth 100000 indicates the bandwidth capacity on the tunnel interface, and this BW
exported to Hub MC each 30 seconds, and used for bandwidth control and optimization. By
default, it is 100kbps, and should be configured based on the bandwidth provided by Service
Provider.
ip mtu 1400 and ip tcp mss 1360 are suggested MTU settings to avoid fragmentation,
please refer to latest IWAN technology design and deployment guide.
Notes:
For enterprise links over Internet ISP, we suggest to enable front VRF on the tunnel interface for
security, please refer to latest IWAN technology design and deployment guide.
This is a one-time configuration. Once done, all changes will be centralized on the Hub MC.
Notes:
On branch MC/BR, the MC and BR is co-located on the same router, branch MC peer and get
connected with hub MC to receive updates for policy and services.
There is no explicit configured domain name CLI on the WAN interface as hub BR, they are
discovered automatically and reported to local branch master controller.
Notes:
For medium or large branch site, dual border routers get deployed like above configuration, R12
is a co-located MC/BR peering with hub MC, and R13 is a separate BR with front VRF design over
internet Service provider.
10
Voice
Real-time-video
Low-latency-data
Bulk-data
Best-effort
Threshold Definition
priority 1 one-way-delay threshold 150 threshold 150 (msec)
priority 2 packet-loss-rate threshold 1 (%)
priority 2 byte-loss-rate threshold 1 (%)
priority 3 jitter 30 (msec)
priority 1 packet-loss-rate threshold 1 (%)
priority 1 byte-loss-rate threshold 1 (%)
priority 2 one-way-delay threshold 150 (msec)
priority 3 jitter 20 (msec)
priority 1 one-way-delay threshold 100 (msec)
priority 2 byte-loss-rate threshold 5 (%)
priority 2 packet-loss-rate threshold 5 (%)
priority 1 one-way-delay threshold 300 (msec)
priority 2 byte-loss-rate threshold 5 (%)
priority 2 packet-loss-rate threshold 5 (%)
priority 1 one-way-delay threshold 500 (msec)
priority 2 byte-loss-rate threshold 10 (%)
priority 2 packet-loss-rate threshold 10 (%)
Scavenger
custom
11
load-balance
class VOICE sequence 10
match dscp ef policy voice
path-preference MPLS fallback INET
class VIDEO sequence 20
match dscp af41 policy real-time-video
match dscp cs4 policy real-time-video
path-preference INET fallback MPLS
class CRITICAL sequence 30
match dscp af31 policy custom
priority 2 loss threshold 10
priority 1 one-way-delay threshold 600
path-preference MPLS fallback INET
!
Notes:
Configures policy on per DSCP basis only - The assumption is that DSCP marking is done on
ingress (LAN interface of the BRs) or even within the site (access switch).
Path preference for MPLS for all voice/video and critical applications.
Predefined or custom policies can be used.
Monitor interval is set to 2 second for critical applications. Default is 30 seconds. You can lower
the monitor interval for a couple of critical applications in order to achieve a fast failover to the
secondary path. This is called quick monitor.
Load balancing is enabled for default class traffic. When load balancing is enabled, PfR adds a
default class for match all DSCP (lowest priority compared to all the other classes) and
influences this traffic. When load balancing is disabled, PfR deletes this default class and as a
part of that frees up the TCs that was learnt as a part of LB they follow the routing table.
You can check the detail policy by using the show domain <name> master policy command
HubMC#show domain one master policy
No Policy publish pending
-------------------------------------------------------------------------------class VOICE sequence 10
path-preference MPLS fallback INET
class type: Dscp Based
match dscp ef policy custom
priority 2 packet-loss-rate threshold 5.0 percent
priority 1 one-way-delay threshold 150 msec
priority 2 byte-loss-rate threshold 5.0 percent
Number of Traffic classes using this policy: 1
class VIDEO sequence 20
path-preference INET fallback MPLS
class type: Dscp Based
match dscp af41 policy custom
priority 2 packet-loss-rate threshold 5.0 percent
priority 1 one-way-delay threshold 150 msec
priority 2 byte-loss-rate threshold 5.0 percent
Number of Traffic classes using this policy: 1
match dscp cs4 policy custom
priority 2 packet-loss-rate threshold 5.0 percent
priority 1 one-way-delay threshold 150 msec
priority 2 byte-loss-rate threshold 5.0 percent
12
Notes:
13
Notes:
Notes:
Notes:
15
Notes:
Notes:
To check the CENT border status on ASR1000 platform, we need IOS-XE platform specific show
command:
HubBR2#show platform software pfrv3 rp active smart-probe
CENT smart probe parameters :
Total number of CENT smart probe: 1
Parameters :
vrf id = 0
16
Notes:
17
RTO
100
100
100
100
Q
Cnt
0
0
0
0
Seq
Num
11
16
4
7
Notes:
18
At this point the Hub BRs can generate Discovery Probes (Smart Probes) to all remote sites to help them
discover their external interfaces and their path names.
Notes:
19
Check that external interfaces are listed with their correct path names. That means smart
probes are correctly received and decoded by local BRs. If external interfaces are not correctly
discovered, that means smart probes are not correctly received:
Check that remote MC address is reachable over all external interfaces
Check that Smart Probes are correctly received
Check path names are correct. If path names are not listed check that smart probes are received
from the hub. Branch MC loopback address has to be announced and routable from the hub
Border Routers.
To check the smart probes packets (SMP) are correctly received on each external interface, one can
define an access-list to match SMP packets:
access-list 100 permit udp any eq 18000 any eq 19000
show ip access-list to check whether the counter keeps increasing, you could also use conditional
debug or embedded packet capture(EPC) to capture the smart-probe packets on the external interface
either on source or destination border router, please refer to section 7.4 Embedded Packet Capture
(EPC).
Check Policy is received from the hub MC: show domain <name> master policy
Branch10#show domain one master policy
-------------------------------------------------------------------------------class VOICE sequence 10
path-preference MPLS fallback INET
class type: Dscp Based
match dscp ef policy custom
priority 2 packet-loss-rate threshold 5.0 percent
priority 1 one-way-delay threshold 150 msec
priority 2 byte-loss-rate threshold 5.0 percent
Number of Traffic classes using this policy: 1
class VIDEO sequence 20
path-preference INET fallback MPLS
class type: Dscp Based
match dscp af41 policy custom
priority 2 packet-loss-rate threshold 5.0 percent
priority 1 one-way-delay threshold 150 msec
priority 2 byte-loss-rate threshold 5.0 percent
match dscp cs4 policy custom
priority 2 packet-loss-rate threshold 5.0 percent
priority 1 one-way-delay threshold 150 msec
priority 2 byte-loss-rate threshold 5.0 percent
Number of Traffic classes using this policy: 1
class CRITICAL sequence 30
path-preference MPLS fallback INET
class type: Dscp Based
match dscp af31 policy custom
priority 2 packet-loss-rate threshold 10.0 percent
priority 1 one-way-delay threshold 600 msec
priority 2 byte-loss-rate threshold 10.0 percent
class default
match dscp all
20
-------------------------------------------------------------------------------Branch10#
Step 1. Check that external interfaces are listed with their correct path names. That means smart probes
are correctly received and decoded by local BRs.
Step 2. Check path names are correct. If path names are not listed check that smart probes are received
from the hub. Branch MC loopback address has to be announced and routable from the hub Border
Routers.
Step 3. Check that Minimum requirement met.
If the minimum requirement is not MET, check the SAF peering on the local master it should correctly
peer with the hub MC:
Branch10#show eigrp service-family ipv4 neighbors detail
EIGRP-SFv4 VR(#AUTOCFG#) Service-Family Neighbors for AS(59501)
H
Address
Interface
Hold Uptime
SRTT
(sec)
(ms)
0
10.8.3.3
Lo0
497 02:12:18
5
Remote Static neighbor (static multihop)
Version 17.0/4.0, Retrans: 0, Retries: 0, Prefixes: 6
RTO
Q Seq
Cnt Num
100 0 31
21
Check PfRv3 peering on the local master: show domain <name> master peering
Branch10#show domain one master peering
Peering state: Enabled
Origin:
Loopback0(10.2.10.10)
Peering type:
Listener, Peer(With 10.8.3.3)
Subscribed service:
cent-policy (2) :
Last Notification Info: 00:24:15 ago, Size: 2244, Compressed size: 488, Status:
No Error, Count: 5
site-prefix (1) :
Last Notification Info: 00:24:15 ago, Size: 128, Compressed size: 134, Status:
No Error, Count: 35
service-provider (4) :
globals (5) :
Last Notification Info: 00:24:15 ago, Size: 325, Compressed size: 218, Status:
No Error, Count: 19
Published service:
site-prefix (1) :
Last Publish Info: 00:49:11 ago, Size: 160, Compressed size: 124, Status: No
Error
globals (5) :
Last Publish Info: 10:29:09 ago, Size: 325, Compressed size: 198, Status: No
Error
Branch10#
Domain Policies are defined on the Hub MC and sent over the SAF infrastructure to all MC peers.
Each time Domain policies are updated on the hub MC, they are refreshed and sent over to all
MC peers.
For any branch MC not receiving any update, please confirm whether MTU settings are
consistently across the path which might lead to any EIGRP SAF packets get dropped
unexpectedly.
Step 4. Check Monitor specification is received from the hub MC -> show domain one border pmi
Step 5. Check that performance monitors are correctly applied on the external interfaces, on ingress and
egress:
Branch10#show domain one border pmi
****CENT PMI INFORMATION****
Ingress policy CENT-Policy-Ingress-0-4:
Ingress policy activated on:
Tunnel200 Tunnel100
[SNIP]
-------------------------------------------------------------------------
22
Notes:
23
Flow Exporter
:CENT_FLOW_EXP-2
Cache type
:synchronized
entries
:4000
interval
:30 (seconds)
history size
:0 (intervals)
timeout
:1 (intervals)
export spreading:TRUE
Interface applied
:2
Flow Monitor type performance-monitor MON-Egress-prefix-learn-0-48-10:
Description
:User defined
Flow Record
:CENT-FLOWREC-Egress-prefix-learn-0-12
Flow Exporter
:CENT_FLOW_EXP-2
Cache type
:synchronized
entries
:700
interval
:30 (seconds)
history size
:0 (intervals)
timeout
:1 (intervals)
export spreading:FALSE
Interface applied
:2
Flow Monitor type performance-monitor MON-Ingress-per-DSCP-0-48-11:
Description
:User defined
Flow Record
:CENT-FLOWREC-Ingress-per-DSCP-0-13
Flow Exporter
:not configured
Cache type
:synchronized
entries
:2000
interval
:30 (seconds)
history size
:0 (intervals)
timeout
:1 (intervals)
export spreading:FALSE
Interface applied
:2
Notes:
You should be able to review the detail performance monitor flow definition, which is generated
automatically when PfR gets configured: show performance monitor internal flow-def-master
Branch10#show performance monitor internal flow-def-master
FNF Monitor : MON-Ingress-per-DSCP-0-48-11 Name
:
MMA_DB_c_fdef_1340502592_12
Users
: 0
Key Fields:
Non Key Fields:
Name: transport packets expected counter
Name: transport packets lost counter
Name: transport packets lost rate
Name: transport bytes expected
Name: transport bytes lost
Name: transport bytes lost rate
Name: pfr one-way-delay samples
Name: pfr one-way-delay sum
24
25
Branch10#
Notes:
26
Performance monitor get activated on external interface when domain path configured on hub BR or
discovered on branch BR:
Branch10#show domain one border pmi
****CENT PMI INFORMATION****
Ingress policy CENT-Policy-Ingress-0-9:
Ingress policy activated on:
Tunnel200 Tunnel100
------------------------------------------------------------------------PMI[Ingress-per-DSCP]-FLOW MONITOR[MON-Ingress-per-DSCP-0-48-11]
monitor-interval:30
key-list:
pfr site source id ipv4
pfr site destination id ipv4
ip dscp
interface input
policy performance-monitor classification hierarchy
Non-key-list:
transport packets lost rate
transport bytes lost rate
pfr one-way-delay
network delay average
transport rtp jitter inter arrival mean
counter bytes long
counter packets long
timestamp absolute monitoring-interval start
DSCP-list:
ef-[class:CENT-Class-Ingress-DSCP-ef-0-22]
packet-loss-rate:react_id[70]-priority[2]-threshold[5.0 percent]
one-way-delay:react_id[71]-priority[1]-threshold[150 msec]
network-delay-avg:react_id[72]-priority[1]-threshold[300 msec]
byte-loss-rate:react_id[73]-priority[2]-threshold[5.0 percent]
af41-[class:CENT-Class-Ingress-DSCP-af41-0-23]
packet-loss-rate:react_id[74]-priority[2]-threshold[5.0 percent]
one-way-delay:react_id[75]-priority[1]-threshold[150 msec]
network-delay-avg:react_id[76]-priority[1]-threshold[300 msec]
byte-loss-rate:react_id[77]-priority[2]-threshold[5.0 percent]
cs4-[class:CENT-Class-Ingress-DSCP-cs4-0-24]
packet-loss-rate:react_id[78]-priority[2]-threshold[5.0 percent]
one-way-delay:react_id[79]-priority[1]-threshold[150 msec]
network-delay-avg:react_id[80]-priority[1]-threshold[300 msec]
byte-loss-rate:react_id[81]-priority[2]-threshold[5.0 percent]
af31-[class:CENT-Class-Ingress-DSCP-af31-0-25]
packet-loss-rate:react_id[82]-priority[2]-threshold[10.0 percent]
27
one-way-delay:react_id[83]-priority[1]-threshold[600 msec]
network-delay-avg:react_id[84]-priority[1]-threshold[1200 msec]
byte-loss-rate:react_id[85]-priority[2]-threshold[10.0 percent]
Exporter-list:None
------------------------------------------------------------------------Egress policy CENT-Policy-Egress-0-8:
Egress policy activated on:
Tunnel200 Tunnel100
------------------------------------------------------------------------PMI[Egress-aggregate]-FLOW MONITOR[MON-Egress-aggregate-0-48-9]
monitor-interval:30
Trigger Nbar:No
minimum-mask-length:28
key-list:
ipv4 destination prefix
ipv4 destination mask
pfr site destination prefix ipv4
pfr site destination prefix mask ipv4
ip dscp
interface output
Non-key-list:
timestamp absolute monitoring-interval start
counter bytes long
counter packets long
ip protocol
pfr site destination id ipv4
pfr site source id ipv4
DSCP-list:N/A
Class:CENT-Class-Egress-ANY-0-21
Exporter-list:
10.2.10.10
------------------------------------------------------------------------PMI[Egress-prefix-learn]-FLOW MONITOR[MON-Egress-prefix-learn-0-48-10]
monitor-interval:30
minimum-mask-length:28
key-list:
ipv4 source prefix
ipv4 source mask
routing vrf input
Non-key-list:
counter bytes long
counter packets long
timestamp absolute monitoring-interval start
DSCP-list:N/A
Class:CENT-Class-Egress-ANY-0-21
Exporter-list:
10.2.10.10
------------------------------------------------------------------------Branch10#
Notes:
Check service-policy stats updated correctly for each class-map on the external interfaces:
Branch10#show domain one border pmi policy-map interface tunnel100
Tunnel100
Service-policy performance-monitor input: CENT-Policy-Ingress-0-9
Class-map: CENT-Class-Ingress-DSCP-ef-0-22 (match-any)
7388086 packets, 3506803395 bytes
30 second offered rate 11266000 bps, drop rate 0000 bps
Match: dscp ef (46)
Total Packets classified: 0
Total Bytes classified: 0
Monitor AOR: disabled
Class-map: CENT-Class-Ingress-DSCP-af41-0-23 (match-any)
6902212 packets, 3274797427 bytes
30 second offered rate 11291000 bps, drop rate 0000 bps
Match: dscp af41 (34)
Total Packets classified: 0
Total Bytes classified: 0
Monitor AOR: disabled
Class-map: CENT-Class-Ingress-DSCP-cs4-0-24 (match-any)
7642239 packets, 3407622455 bytes
30 second offered rate 11368000 bps, drop rate 0000 bps
Match: dscp cs4 (32)
Total Packets classified: 0
Total Bytes classified: 0
Monitor AOR: disabled
Class-map: CENT-Class-Ingress-DSCP-af31-0-25 (match-any)
12345248 packets, 5860560391 bytes
30 second offered rate 18787000 bps, drop rate 0000 bps
Match: dscp af31 (26)
Total Packets classified: 0
Total Bytes classified: 0
Monitor AOR: disabled
Class-map: class-default (match-any)
0 packets, 0 bytes
30 second offered rate 0000 bps, drop rate 0000 bps
Match: any
Service-policy performance-monitor output: CENT-Policy-Egress-0-8
Class-map: CENT-Class-Egress-ANY-0-21 (match-any)
24999229 packets, 3233800218 bytes
30 second offered rate 10759000 bps, drop rate 0000 bps
Match: access-group name mma-dvmc-acl#3
Total Packets classified: 0
Total Bytes classified: 0
Monitor AOR: disabled
Class-map: class-default (match-any)
0 packets, 0 bytes
30 second offered rate 0000 bps, drop rate 0000 bps
Match: any
Branch10#
Branch10#show ip access-lists dynamic
Extended IP access list mma-dvmc-acl#3
10 deny ip any 224.0.0.0 15.255.255.255
29
20
30
40
50
Notes:
Flows added:
Flows aged:
Synchronized timeout (secs):
IPV4 SOURCE PREFIX:
IPV4 SOURCE MASK:
IP VRF ID INPUT:
counter bytes long:
counter packets long:
timestamp monitor start:
103
102
30
10.1.10.0
/24
0
(DEFAULT)
26201651
258674
16:14:30.000
Notes:
IPV4 DST PREFIX IPV4 DST MASK IPV4 DESTINATION SITE PREFIX IPV4 DESTINATION SITE
PREFIX MASK IP DSCP INTF OUTPUT
time monitor start
bytes long
pkts long ip prot pfr destination site id pfr source site id
30
Notes:
Flows added:
Flows aged:
Synchronized timeout (secs):
PFR SOURCE SITE ID:
PFR DESTINATION SITE ID:
IP DSCP:
INTERFACE INPUT:
POLICY PERF MON CLASS HIERARCHY:
af31-0-25
trns counter packets expect:
trns counter packets lost:
trns bytes expected:
816
808
30
10.8.3.3
10.2.10.10
0x1A
Tu200
CENT-Policy-Ingress-0-9: CENT-Class-Ingress-DSCP130
0
0
31
0
0
0
130
46955
130
83441
9360
130
16:14:00.000
10.8.3.3
10.2.10.10
0x20
Tu200
CENT-Policy-Ingress-0-9: CENT-Class-Ingress-DSCP131
0
0
0
0
0
131
47315
131
74578
9432
131
16:14:00.000
[SNIP]
Branch10#
Notes:
6 Monitoring Operation
6.1 Monitor Site Prefix
Site-prefix is the database infrastructure for inside prefixes of all sites. Each local site learns site-prefix
itself from egress performance monitor on external interface, and then publishes across all sites over
EIGRP SAF framework. Each local site subscribes to all remote site prefix service as well, so all sites share
one synchronized prefix database.
Check following table, there are four different type of prefix in this site-prefix database:
32
Local site-preifx with flag L: Local-learned prefix, here is the site-id, learned by egress siteprefix monitor;
Local site-preifx with flag C: site-prefix configured by static site-prefix list, mostly on transit site;
Remote site-preifx with flag S: site-prefix learned from remote EIGRP SAF neigh ours;
Enterprise prefix with T: summary prefix defines the enterprise site-prefix boundary;
Example:
HubMC#show domain one master site-prefix
Change will be published between 5-60 seconds
Next Publish 00:54:41 later
Prefix DB Origin: 10.8.3.3
Prefix Flag: S-From SAF; L-Learned; T-Top Level; C-Configured;
Site-id
Site-prefix
Last Updated
Flag
-------------------------------------------------------------------------------10.2.10.10
10.1.10.0/24
00:42:07 ago
S,
10.2.10.10
10.2.10.10/32
00:42:07 ago
S,
10.2.11.11
10.2.11.11/32
00:18:25 ago
S,
10.8.3.3
10.8.3.3/32
1d05h
ago
L,
10.8.3.3
10.8.0.0/16
1d05h
ago
C,
255.255.255.255
*10.0.0.0/8
1d05h
ago
T,
-------------------------------------------------------------------------------HubMC#
Branch10#show domain one master site-prefix
Change will be published between 5-60 seconds
Next Publish 00:53:12 later
Prefix DB Origin: 10.2.10.10
Prefix Flag: S-From SAF; L-Learned; T-Top Level; C-Configured;
Site-id
Site-prefix
Last Updated
Flag
-------------------------------------------------------------------------------10.2.10.10
10.1.10.0/24
00:00:26 ago
L,
10.2.11.11
10.1.11.0/24
01:20:47 ago
S,
10.2.10.10
10.2.10.10/32
01:06:49 ago
L,
10.2.11.11
10.2.11.11/32
01:20:47 ago
S,
10.8.3.3
10.8.3.3/32
01:29:07 ago
S,
10.8.3.3
10.8.0.0/16
01:29:07 ago
S,C,
255.255.255.255
*10.0.0.0/8
01:29:07 ago
S,T,
-------------------------------------------------------------------------------HubBR1#show domain one border site-prefix
Prefix Flag: S-From SAF; L-Learned; T-Top Level; C-Configured;
Site-id
Site-prefix
Last Updated
Flag
-------------------------------------------------------------------------------10.2.10.10
10.1.10.0/24
00:59:12 ago
S,
10.2.11.11
10.1.11.0/24
01:14:42 ago
S,
10.2.10.10
10.2.10.10/32
01:08:04 ago
S,
10.2.11.11
10.2.11.11/32
01:22:01 ago
S,
10.8.3.3
10.8.3.3/32
01:30:22 ago
S,
10.8.3.3
10.8.0.0/16
01:30:22 ago
S,C,
255.255.255.255
*10.0.0.0/8
01:30:22 ago
S,T,
-------------------------------------------------------------------------------HubBR1#
Branch11#show domain one border site-prefix
33
Notes:
Site-prefix database is infrastructure, used for enterprise traffic-classes learning and routingcontrol;
Site-prefix database is in sync across the PfRv3 domain for all master controller and border
routers;
MCs publish local site prefixes to local BR and remote branch sites every 2 hours;
MCs subscribe and learn all remote site-prefix from EIGRP SAF service;
MCs and BRs age out all the site prefixes at a frequency of 24 hours;
34
Cache size:
Current entries:
High Watermark:
700
1
1
Flows added:
Flows aged:
Synchronized timeout (secs):
241
240
30
bytes long
====================
1725067
Branch10#
HubBR2#show performance monitor cache monitor MON-Egress-prefix-learn-0-48-39 detail
Monitor: MON-Egress-prefix-learn-0-48-39
Data Collection Monitor:
HubBR2#
Notes:
Example:
HubMC#show domain one master traffic-classes summary
35
DSCP
TC-ID APP-ID
State
SP
10.1.10.0/24
10.2.10.10 N/A
59/60
10.8.2.2/Tunnel100
10.1.10.0/24
10.2.10.10 N/A
57/58
10.8.2.2/Tunnel100
10.1.10.0/24
10.2.10.10 N/A
55/NA
10.8.2.2/Tunnel100
10.1.10.0/24
10.2.10.10 N/A
52/NA
10.8.2.2/Tunnel100
10.1.10.0/24
10.2.10.10 N/A
64/63
10.8.1.1/Tunnel200
10.1.10.0/24
10.2.10.10 N/A
54/53
10.8.1.1/Tunnel200
10.1.10.0/24
10.2.10.10 N/A
61/62
10.8.2.2/Tunnel100
Total Traffic Classes: 7 Site: 7
HubMC#
af11
193
N/A
CN
MPLS
cs1
192
N/A
CN
MPLS
cs5
191
N/A
CN
MPLS
ef
190
N/A
CN
MPLS
af41
195
N/A
CN
INET
cs4
189
N/A
CN
INET
af31
194
N/A
CN
MPLS
Internet: 0
Notes:
From there you can drill down and check individual Traffic Classes on master controller:
HubMC#show domain one master traffic-classes
Dst-Site-Prefix: 10.1.10.0/24
DSCP: af11 [10] Traffic class id:193
TC Learned:
00:22:13 ago
Present State:
CONTROLLED
Current Performance Status: not monitored (default class)
Current Service Provider:
MPLS since 00:12:10
Previous Service Provider: INET for 298 sec
BW Used:
9195 Kbps
Present WAN interface:
Tunnel100 in Border 10.8.2.2
Present Channel (primary): 59
Backup Channel:
60
Destination Site ID:
10.2.10.10
Class-Sequence in use:
default
Class Name:
default
BW Updated:
00:00:14 ago
Reason for Route Change:
Load Balance
36
-------------------------------------------------------------------------------Dst-Site-Prefix: 10.1.10.0/24
DSCP: cs1 [8] Traffic class id:192
TC Learned:
00:22:14 ago
Present State:
CONTROLLED
Current Performance Status: not monitored (default class)
Current Service Provider:
MPLS since 00:12:40
Previous Service Provider: INET for 184 sec
BW Used:
9251 Kbps
Present WAN interface:
Tunnel100 in Border 10.8.2.2
Present Channel (primary): 57
Backup Channel:
58
Destination Site ID:
10.2.10.10
Class-Sequence in use:
default
Class Name:
default
BW Updated:
00:00:12 ago
Reason for Route Change:
Load Balance
-------------------------------------------------------------------------------Dst-Site-Prefix: 10.1.10.0/24
DSCP: cs5 [40] Traffic class id:191
TC Learned:
00:32:43 ago
Present State:
CONTROLLED
Current Performance Status: not monitored (default class)
Current Service Provider:
MPLS since 00:32:12
Previous Service Provider: Unknown
BW Used:
3647 Kbps
Present WAN interface:
Tunnel100 in Border 10.8.2.2
Present Channel (primary): 55
Backup Channel:
none
Destination Site ID:
10.2.10.10
Class-Sequence in use:
default
Class Name:
default
BW Updated:
00:00:10 ago
Reason for Route Change:
Uncontrolled to Controlled Transition
-------------------------------------------------------------------------------Dst-Site-Prefix: 10.1.10.0/24
DSCP: ef [46] Traffic class id:190
TC Learned:
00:37:44 ago
Present State:
CONTROLLED
Current Performance Status: in-policy
Current Service Provider:
MPLS since 00:37:13
Previous Service Provider: Unknown
BW Used:
5543 Kbps
Present WAN interface:
Tunnel100 in Border 10.8.2.2
Present Channel (primary): 52
Backup Channel:
none
Destination Site ID:
10.2.10.10
Class-Sequence in use:
10
Class Name:
VOICE using policy User-defined
priority 2 packet-loss-rate threshold 5.0 percent
priority 1 one-way-delay threshold 150 msec
priority 2 byte-loss-rate threshold 5.0 percent
BW Updated:
00:00:13 ago
Reason for Route Change:
Uncontrolled to Controlled Transition
-------------------------------------------------------------------------------Dst-Site-Prefix: 10.1.10.0/24
DSCP: af41 [34] Traffic class id:195
TC Learned:
00:22:11 ago
Present State:
CONTROLLED
Current Performance Status: in-policy
Current Service Provider:
INET since 00:14:07
Previous Service Provider: MPLS for 181 sec
BW Used:
5495 Kbps
Present WAN interface:
Tunnel200 in Border 10.8.1.1
Present Channel (primary): 64
37
Backup Channel:
63
Destination Site ID:
10.2.10.10
Class-Sequence in use:
20
Class Name:
VIDEO using policy User-defined
priority 2 packet-loss-rate threshold 5.0 percent
priority 1 one-way-delay threshold 150 msec
priority 2 byte-loss-rate threshold 5.0 percent
BW Updated:
00:00:13 ago
Reason for Route Change:
Backup to Primary path preference transition
-------------------------------------------------------------------------------Dst-Site-Prefix: 10.1.10.0/24
DSCP: cs4 [32] Traffic class id:189
TC Learned:
00:37:44 ago
Present State:
CONTROLLED
Current Performance Status: in-policy
Current Service Provider:
INET since 00:13:13
Previous Service Provider: MPLS for 181 sec
BW Used:
7276 Kbps
Present WAN interface:
Tunnel200 in Border 10.8.1.1
Present Channel (primary): 54
Backup Channel:
53
Destination Site ID:
10.2.10.10
Class-Sequence in use:
20
Class Name:
VIDEO using policy User-defined
priority 2 packet-loss-rate threshold 5.0 percent
priority 1 one-way-delay threshold 150 msec
priority 2 byte-loss-rate threshold 5.0 percent
BW Updated:
00:00:14 ago
Reason for Route Change:
Backup to Primary path preference transition
-------------------------------------------------------------------------------Dst-Site-Prefix: 10.1.10.0/24
DSCP: af31 [26] Traffic class id:194
TC Learned:
00:22:12 ago
Present State:
CONTROLLED
Current Performance Status: in-policy
Current Service Provider:
MPLS since 00:21:41
Previous Service Provider: Unknown
BW Used:
9247 Kbps
Present WAN interface:
Tunnel100 in Border 10.8.2.2
Present Channel (primary): 61
Backup Channel:
62
Destination Site ID:
10.2.10.10
Class-Sequence in use:
30
Class Name:
CRITICAL using policy User-defined
priority 2 packet-loss-rate threshold 10.0 percent
priority 1 one-way-delay threshold 600 msec
priority 2 byte-loss-rate threshold 10.0 percent
BW Updated:
00:00:11 ago
Reason for Route Change:
Uncontrolled to Controlled Transition
-------------------------------------------------------------------------------Total Traffic Classes: 7 Site: 7 Internet: 0
HubMC#
Notes:
Check present and backup channels. Performance measurements are extracted from channels.
You will not get performance directly from the traffic class itself.
Check that TC is correctly mapped to the policy
If a specific Traffic Class has experienced performance issues, you will be able to check it in the Traffic
Class report:
HubMC#show domain one master traffic-classes policy VIDEO
Dst-Site-Prefix: 10.1.10.0/24
DSCP: cs4 [32] Traffic class id:200
TC Learned:
00:06:00 ago
Present State:
CONTROLLED
Current Performance Status: in-policy
Current Service Provider:
MPLS since 00:00:30 (hold until 59 sec)
Previous Service Provider: INET for 117 sec
(A fallback provider. Primary provider will be re-evaluated 00:02:30 later)
BW Used:
309 Kbps
Present WAN interface:
Tunnel100 in Border 10.8.2.2
Present Channel (primary): 76
Backup Channel:
73
Destination Site ID:
10.2.10.10
Class-Sequence in use:
20
Class Name:
VIDEO using policy User-defined
priority 2 packet-loss-rate threshold 5.0 percent
priority 1 one-way-delay threshold 150 msec
priority 2 byte-loss-rate threshold 5.0 percent
BW Updated:
00:00:03 ago
Reason for Route Change:
Delay
-------------------------------------------------------------------------------Dst-Site-Prefix: 10.1.10.0/24
DSCP: af41 [34] Traffic class id:199
TC Learned:
00:06:01 ago
Present State:
CONTROLLED
Current Performance Status: in-policy
Current Service Provider:
MPLS since 00:00:00 (hold until 89 sec)
Previous Service Provider: INET for 148 sec
(A fallback provider. Primary provider will be re-evaluated 00:03:00 later)
BW Used:
177 Kbps
Present WAN interface:
Tunnel100 in Border 10.8.2.2
Present Channel (primary): 75
Backup Channel:
71
Destination Site ID:
10.2.10.10
Class-Sequence in use:
20
Class Name:
VIDEO using policy User-defined
priority 2 packet-loss-rate threshold 5.0 percent
priority 1 one-way-delay threshold 150 msec
priority 2 byte-loss-rate threshold 5.0 percent
BW Updated:
00:00:01 ago
Reason for Route Change:
Delay
-------------------------------------------------------------------------------Total Traffic Classes: 2 Site: 2 Internet: 0
HubMC#
Notes:
All traffic-classes are synced to border router which perform routing-control based on traffic-class
database: show domain <name> border traffic-classes
HubBR2#show domain one border traffic-classes
Src-Site-Prefix: ANY Dst-Site-Prefix: 10.1.10.0/24
DSCP: cs5 [40] Traffic class id: 202
TC Learned: 00:09:54 ago
Present State: CONTROLLED
Destination Site ID: 10.2.10.10
If_index: 13
Primary chan id: 72
Primary chan Presence: LOCAL CHANNEL
Primary interface: Tunnel200
Primary Nexthop: 10.0.200.10 (BGP)
Backup chan id: 78
Backup chan Presence: NEIGHBOR_CHANNEL via border 10.8.2.2
Backup interface: Tunnel0
------------------------------------------------------------------------------------Src-Site-Prefix: ANY Dst-Site-Prefix: 10.1.10.0/24
DSCP: ef [46] Traffic class id: 201
TC Learned: 00:09:55 ago
Present State: CONTROLLED
Destination Site ID: 10.2.10.10
If_index: 14
Primary chan id: 77
Primary chan Presence: NEIGHBOR_CHANNEL via border 10.8.2.2
Primary interface: Tunnel0
Backup Channel not available
------------------------------------------------------------------------------------Src-Site-Prefix: ANY Dst-Site-Prefix: 10.1.10.0/24
DSCP: cs4 [32] Traffic class id: 200
TC Learned: 00:09:55 ago
Present State: CONTROLLED
Destination Site ID: 10.2.10.10
If_index: 14
Primary chan id: 76
Primary chan Presence: NEIGHBOR_CHANNEL via border 10.8.2.2
Primary interface: Tunnel0
Backup chan id: 73
Backup chan Presence: LOCAL CHANNEL
Backup interface: Tunnel200
------------------------------------------------------------------------------------Src-Site-Prefix: ANY Dst-Site-Prefix: 10.1.10.0/24
DSCP: af41 [34] Traffic class id: 199
TC Learned: 00:09:56 ago
Present State: CONTROLLED
Destination Site ID: 10.2.10.10
If_index: 14
Primary chan id: 75
Primary chan Presence: NEIGHBOR_CHANNEL via border 10.8.2.2
Primary interface: Tunnel0
Backup chan id: 71
Backup chan Presence: LOCAL CHANNEL
Backup interface: Tunnel200
------------------------------------------------------------------------------------Src-Site-Prefix: ANY Dst-Site-Prefix: 10.1.10.0/24
40
Notes:
You could be able to check traffic-class rerouted over auto-tunnel interface to Hub BR1 for following
example:
HubBR2#show interfaces tunnel0
Tunnel0 is up, line protocol is up
Hardware is Tunnel
Description: PFR auto-tunnel for VRF default
Interface is unnumbered. Using address of Loopback0 (10.8.1.1)
41
prefix = 10.1.10.0/24
0
= 0
65
0
TC ID : 197
42
Vrf id = 0
Src prefix = 0.0.0.0/0, Dst prefix = 10.1.10.0/24
Policy sequence = 4294967295
Dscp = 8, Application ID = 0
Match type = Dscp, Protocol = 0
Src port = 0, Dst port = 0
Primary action
Channel ID = 68, Adj ID = 0
Backup action
Channel ID = 67, Adj ID = 65
[SNIP]
HubBR2#show platform software pfrv3 fp active route-control traffic-class
CENT routing control traffic class :
Total number of CENT RC TC: 7
TC ID : 196
Vrf id = 0
Src prefix = 0.0.0.0/0, Dst
Policy sequence = 30
Dscp = 26, Application ID =
Match type = Dscp, Protocol
Src port = 0, Dst port = 0
Primary action
Channel ID = 65, Adj ID =
Backup action
Channel ID = 66, Adj ID =
prefix = 10.1.10.0/24
0
= 0
65
0
TC ID : 197
Vrf id = 0
Src prefix = 0.0.0.0/0, Dst prefix = 10.1.10.0/24
Policy sequence = 4294967295
Dscp = 8, Application ID = 0
Match type = Dscp, Protocol = 0
Src port = 0, Dst port = 0
Primary action
Channel ID = 68, Adj ID = 0
Backup action
Channel ID = 67, Adj ID = 65
[SNIP]
HubBR2#show platform hardware qfp active feature pfrv3 client route-control trafficclass detail
CENT QFP ClIENT ROUTING_CONTROL INFO
Num of TC: 7
TC ID: 196
tbl id: 0, src pfx: 0.0.0.0/0, dst pfx: 10.1.10.0/24
policy seq:
30
TC match type: DSCP
DSCP: 26
actions:
primary:
chan id: 65, adj id: 65
backup:
chan id: 66, adj id: 0
TC ID: 197
tbl id: 0, src pfx: 0.0.0.0/0, dst pfx: 10.1.10.0/24
43
policy seq:
4294967295
TC match type: DSCP
DSCP: 8
actions:
primary:
chan id: 68, adj id: 0
backup:
chan id: 67, adj id: 65
[SNIP]
HubBR2#
Notes:
PfR routing-control is enabled automatically on ingress direction for LAN interfaces, and check whether
CENT Routing-Control features get enabled properly, for example LAN interface GigabitEthernet2 on
hub BR2:
HubBR2#show platform software interface rp active name GigabitEthernet2
HubBR2#show platform software interface rp active name GigabitEthernet2
Name: GigabitEthernet2, ID: 9, QFP ID: 0, Schedules: 4096
Type: PORT, State: enabled, SNMP ID: 4, MTU: 1500
Flow control ID: 65535
bandwidth: 1000000, encap: ARPA
IP Address: 10.8.25.5
Flags: ipv4
vNet Name: , vNet Tag: 0, vNet Extra Information: 0
CENT RC: enabled
CENT SMP INGRESS: enabled
HubBR2#show platform software interface fp active name GigabitEthernet2
Name: GigabitEthernet2, ID: 9, QFP ID: 9, Schedules: 4096
Type: PORT, State: enabled, SNMP ID: 4, MTU: 1500
TX channel ID: 0, RX channel ID: 0, AOM state: created
Flow control ID: 65535
bandwidth: 1000000, encap: ARPA
IP Address: 10.8.25.5
IPV6 Address: ::
Flags: ipv4
ICMP Flags: unreachables, redirects, no-info-reply, no-mask-reply
ICMP6 Flags: unreachables, redirects
FRR linkdown ID: 65535
vNet Tag: 0, vNet Extra Information: 0
AOM dependency sanity check: PASS
AOM Obj ID: 32
CENT RC: enabled
CENT SMP INGRESS: enabled
44
45
PPPOE_GET_SESSION
ESS_ENTER_SWITCHING
PPPOE_HANDLE_UNCLASSIFIED_SESSION
DEF_IF_DROP_FIA (M)
QfpEth Physical Information
DPS Addr: 0x00000000034b18f0
Submap Table Addr: 0x00000000
VLAN Ethertype: 0x8100
QOS Mode: Per Link
VLAN AutoSense: No
Notes:
Check CENT RC and CENT SMP INGRESS status should be enabled on LAN interface;
IPV4_INPUT_CENT_SMP_PROCESS is used for WAN interface discovery or channel stats
accounting;
IPV4_INPUT_STILE_LEGACY is enabled by NBAR2 for application classification, this is only
available when application based policy configured;
PFRv3 routing-control feature logic runs in IPV4_INPUT_CENT_RC_PROCESS ;
On wan interface, there are PfR related features like SMP ingress/egress and MMA/FME/FNF feature
enabled automatically, for example WAN interface Tunnel100 on Hub BR1:
HubBR1#show platform software interface rp active name Tunnel100
Name: Tunnel100, ID: 14, QFP ID: 0, Schedules: 0
Type: TUNNEL, State: enabled, SNMP ID: 9, MTU: 9976
IP Address: 10.0.100.84
TCP Adjust Mss Enabled: 1360
Flags: ipv4
ICMP Flags: unreachables, no-redirects, no-info-reply, no-mask-reply
vNet Name: , vNet Tag: 0, vNet Extra Information: 0
Tunnel Source: 172.16.84.4, Tunnel Destination: 0.0.0.0
Tunnel TTL: 255, Tunnel TOS: 0, Flags: KEY
Tunnel Mode: IPv4 multi-point GRE, VRF: 0, Tunnel VRF: 0
Tunnel IPv6 PMTU: 0, Tunnel APP_ID: TUN_APP_CLI, Tunnel APP_DATA: 0
VLAN ID: 0, virtual mac: 0000.0000.0000
Tunnel lport: 0, Tunnel rport: 0
Tunnel entropy: FALSE
IPSec: attached
CENT SMP INGRESS: enabled
CENT SMP EGRESS: enabled
CENT COLOR: MPLS
HubBR1#show platform software interface fp active name Tunnel100
Name: Tunnel100, ID: 14, QFP ID: 13, Schedules: 0
Type: TUNNEL, State: enabled, SNMP ID: 9, MTU: 9976
IP Address: 10.0.100.84
IPV6 Address: ::
TCP Adjust Mss Enabled: 1360
Flags: ipv4
ICMP Flags: unreachables, no-redirects, no-info-reply, no-mask-reply
ICMP6 Flags: unreachables, redirects
FRR linkdown ID: 65535
46
47
Notes:
CENT SMP INGRESS is responsible for ingress channel accounting and smart-probes
CENT SMP EGRESS is responsible for egress channel accounting and smart-probes
MMA/FME/FNF is programmed to enable performance monitoring for prefix/traffic-classes
learning, and channel performance monitoring;
48
Notes:
Note that you do not have any performance metrics. This is because no performance issues were
discovered hence no TCA received on the central site, thus no TCA/ODE received on the channel.
You can get the performance metrics from the backup channel. Remember that performance
measurement is done on the remote site on ingress based on a performance monitor applied to all
external interfaces.
HubMC#show domain one master channels | beg Id: 91
Channel Id: 91 Dst Site-Id: 10.2.10.10 Link Name: INET
Channel Created: 00:01:15 ago
Provisional State: Initiated and open
Operational state: Available
Interface Id: 13
Estimated Channel Egress Bandwidth: 8 Kbps
Immitigable Events Summary:
Total Performance Count: 0, Total BW Count: 0
TCA Statitics:
Received 0 ; Processed 0 ; Unreach_rcvd:0
[SNIP]
Note that you do not have any performance metrics either. Same reason here, this is because no
performance issues were discovered hence no TCA received on the central site.
Branch10#show domain one border exporter statistics
show on-demand exporter(default vrf)
On-demand exporter statistics:
Border: 10.2.10.10
49
0
0, Last sent: not yet sent
0
0, Last sent: not yet sent
Global Stats:
Table ID lookup count: 0
Table ID Channel found count: 0
Table ID Next hop found count: 0
Branch10#
Notes:
exporter statistics is clear and no TCA and ODE exported to remote site;
You can check the per-channel performance metrics in detail on the remote border router : show
performance monitor history;
Branch10#show performance monitor history
Codes: *
- field is not configurable under flow record
NA - field is not applicable for configured parameters
UR - field is unreportable for configured parameters
Match: pfr site source id ipv4 = 10.8.3.3, pfr site destination id ipv4 = 10.2.10.10,
ip dscp = 0x20, interface input = Tu200, policy performance-monitor classification
hierarchy = CENT-Policy-Ingress-0-9: CENT-Class-Ingress-DSCP-cs4-0-24,
Monitor: MON-Ingress-per-DSCP-0-48-11
start time
*history bucket number
transport packets expected counter
transport packets lost counter
transport packets lost rate
transport bytes expected
transport bytes lost
transport bytes lost rate
pfr one-way-delay samples
pfr one-way-delay sum
pfr one-way-delay
network delay sample
network delay sum
network delay average
transport rtp jitter inter arrival samples
transport rtp jitter inter arrival sum
transport rtp jitter inter arrival mean
:
:
:
( % ) :
:
:
:
:
:
:
:
:
:
:
:
:
16:43:30
====================
1
36953
0
0.00
12231047
0
0.00
0
0
NA
3
11
3
36903
44276934
1199
50
: 27281243
: 69331
: 16:43:30.000
Match: pfr site source id ipv4 = 10.8.3.3, pfr site destination id ipv4 = 10.2.10.10,
ip dscp = 0x2E, interface input = Tu200, policy performance-monitor classification
hierarchy = CENT-Policy-Ingress-0-9: CENT-Class-Ingress-DSCP-ef-0-22,
Monitor: MON-Ingress-per-DSCP-0-48-11
start time
*history bucket number
transport packets expected counter
transport packets lost counter
transport packets lost rate
transport bytes expected
transport bytes lost
transport bytes lost rate
pfr one-way-delay samples
pfr one-way-delay sum
pfr one-way-delay
network delay sample
network delay sum
network delay average
transport rtp jitter inter arrival samples
transport rtp jitter inter arrival sum
transport rtp jitter inter arrival mean
counter bytes long
counter packets long
timestamp absolute monitoring-interval start
:
:
:
( % ) :
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
16:43:30
====================
1
593
0
0.00
0
0
0.00
0
0
NA
593
1881
3
593
514268
867
42696
593
16:43:30.000
Notes:
Destination site calculates delay metric based on the timestamp the smart-probe only;
one-way-delay is half of round-trip time between two sites(network-delay-avg);
Jitter and packet loss metrics are measured based on RTP flows, either by data traffic or smartprobe RTP traffic when channel is idle;
Byte loss metrics measured by per TCP data flows;
All Jitter, Packet/Byte Loss metrics are measured per flow level by FME/MMA, but aggregated
per channel
DELAY INCREASE
Lets assume we have a performance issue due to delay on the second path INET with 180 ms one-waydelay.
Let's check what happens on the primary channel #91 for TC to branch10 with DSCP EF:
HubMC#show domain one master channels dscp ef
Legend: * (Value obtained from Network delay:)
Channel Id: 87 Dst Site-Id: 10.2.10.10
Channel Created: 01:10:18 ago
Provisional State: Initiated and open
51
[SNIP]
52
Notes:
Latest TCA Bucket reports One Way Delay : 180 msec* for channel #91 that corresponds to
branch10 with DSCP EF;
The traffic-class get moved to backup channel #87 as soon when TCA reported on the primary
channel;
Destination border router exports ODE metrics together TCA for impacted channels; on source
MC, ODE received are listed so that you can now check the performance metrics
The channel #91 TCA get clear after two monitor intervals (60s) without new TCA reported;
TCA network-delay get incremented by 3 in one monitor interval after we inject bidirectional one-waydelay 180ms over INET service provider cloud:
Branch10#show domain one border exporter statistics
show on-demand exporter(default vrf)
On-demand exporter statistics:
Border: 10.2.10.10
Process ID: SEND=176, RECV=523
Interface: Tunnel200 (index=15, service provider=INET)
Bandwidth: Ingress=4471 Kbit/sec, Capacity=50000 Kbit/sec
Egress =409 Kbit/sec, Capacity=50000 Kbit/sec
Total sent BW packets:
Total sent BW templates:
Destination-site: 10.8.3.3:
Total sent TCA network-delay
Total sent ODE
Total sent TCA templates:
10
1, Last sent: 4 min 31 sec ago
3
3
1, Last sent: 0 min 2 sec ago
10
1, Last sent: 4 min 31 sec ago
Destination-site: 10.8.3.3:
Total sent ODE
Total sent TCA templates:
3
1, Last sent: 0 min 2 sec ago
Global Stats:
Table ID lookup count: 12
Table ID Channel found count: 12
Table ID Next hop found count: 12
Branch10#
Notes:
53
exporter statistics shows that INET network-delay TCA exported to hub site 10.8.3.3 for service
provider path INET;
ODE exported to hub site 10.8.3.3 for service provider path MPLS as well;
:
:
:
( % ) :
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
16:46:30
====================
1
36011
0
0.00
398132
0
0.00
0
0
NA
3
1090
363
35961
26620988
740
13462166
37193
16:46:30.000
Codes: *
- field is not configurable under flow record
NA - field is not applicable for configured parameters
UR - field is unreportable for configured parameters
Match: pfr site source id ipv4 = 10.8.3.3, pfr site destination id ipv4 = 10.2.10.10,
ip dscp = 0x2E, interface input = Tu200, policy performance-monitor classification
hierarchy = CENT-Policy-Ingress-0-9: CENT-Class-Ingress-DSCP-ef-0-22,
Monitor: MON-Ingress-per-DSCP-0-48-11
start time
*history bucket number
transport packets expected counter
transport packets lost counter
transport packets lost rate
transport bytes expected
transport bytes lost
transport bytes lost rate
pfr one-way-delay samples
pfr one-way-delay sum
pfr one-way-delay
network delay sample
network delay sum
:
:
:
( % ) :
:
:
:
:
:
:
:
:
16:46:30
====================
1
603
0
0.00
0
0
0.00
0
0
NA
603
217560
54
:
:
:
:
:
:
:
360
603
319853
530
43416
603
16:46:30.000
Notes:
Beside the ingress performance measurement on border router, all of the channels synced to local
border router maintain channel TX/RX reachability status: show domain <name> border channels
HubBR2#show domain one border channels
Border Smart Probe Stats:
Channel id: 21
Channel dscp: 0
Channel site: 255.255.255.255
Channel interface: Tunnel200
Channel operation state: Initiated_n_open
Channel RX state: reachable
Channel TX state: reachable
Channel next hop: 0.0.0.0
Channel recv_probes: 0
Channel send_probes: 0
Channel recv_packets: 0
Channel send_packets: 0
Channel recv_bytes: 0
Channel send_bytes 0
Last Probe Received: N/A
Last Probe Sent: N/A
Channel id: 23
Channel dscp: 0
Channel site: 10.2.11.11
Channel interface: Tunnel200
Channel operation state: Initiated_n_open
Channel RX state: reachable
Channel TX state: reachable
Channel next hop: 10.0.200.11
Channel recv_probes: 980116
Channel send_probes: 979593
Channel recv_packets: 0
Channel send_packets: 0
Channel recv_bytes: 0
Channel send_bytes 0
Last Probe Received: 263 ms Ago
Last Probe Sent: 74 ms Ago
Channel id: 25
Channel dscp: 0
55
Notes:
Traffic-classes get controlled over the channel, and next-hop for channel is determined based on the
existing routing protocols over between peering sites, for example EIGRP, BGP, STATIC, NHRP and RIB
Tables:
HubBR2#show domain one border parent-route
Border Parent Route Details:
Prot: BGP, Network: 10.2.10.10/32, Gateway: 10.0.200.10, Interface: Tunnel200, Ref
count: 8
Prot: BGP, Network: 10.2.11.11/32, Gateway: 10.0.200.11, Interface: Tunnel200, Ref
count: 1
HubBR2#show domain one border channels parent-route
Border Channel Parent Route Details:
Channel id: 21, Dscp: defa [0], Site-Id: 255.255.255.255, Path: INET, Interface:
Tunnel200
Nexthop: 0.0.0.0
Protocol: None
Channel id: 23, Dscp: defa [0], Site-Id: 10.2.11.11, Path: INET, Interface: Tunnel200
Nexthop: 10.0.200.11
Protocol: BGP
Channel id: 25, Dscp: defa [0], Site-Id: 10.2.10.10, Path: INET, Interface: Tunnel200
Nexthop: 10.0.200.10
Protocol: BGP
Channel id: 88, Dscp: cs4
Nexthop: 10.0.200.10
Protocol: BGP
Channel id: 92, Dscp: af11 [A], Site-Id: 10.2.10.10, Path: INET, Interface: Tunnel200
Nexthop: 10.0.200.10
Protocol: BGP
HubBR2#
HubBR2#show domain one border channels dscp ef
Border Smart Probe Stats:
Channel id: 91
Channel dscp: 46
Channel site: 10.2.10.10
Channel interface: Tunnel200
Channel operation state: Initiated_n_open
Channel RX state: reachable
Channel TX state: reachable
Channel next hop: 10.0.200.10
Channel recv_probes: 26535
Channel send_probes: 30203
Channel recv_packets: 0
Channel send_packets: 22484
Channel recv_bytes: 0
Channel send_bytes 10338531
Last Probe Received: 4 ms Ago
Last Probe Sent: 253 ms Ago
HubBR2#
57
Notes:
Perform parent lookup in Routing Tables before creating any channel for a given site-id on the
border router;
Channel next-hop will be 0.0.0.0 and not-available if parent-route lookup failed;
Channel is Initiated_n_open if there is active traffic-classes over the channel, otherwise
Discovered_n_open state;
Check last Probe Sent /Received timestamp for fast and low rate SMPs;
58
59
60
25
reachable
84
reachable
85
reachable
86
reachable
87
reachable
88
reachable
91
reachable
92
reachable
0
0
0
0
0
0
0
0
10.2.10.10
reachable
10.2.10.10
reachable
10.2.10.10
reachable
10.2.10.10
reachable
10.2.10.10
reachable
10.2.10.10
reachable
10.2.10.10
reachable
10.2.10.10
reachable
11
Initiated_n_open
26
11
Initiated_n_open
34
11
Initiated_n_open
40
11
Initiated_n_open
11
Initiated_n_open
32
11
Initiated_n_open
46
11
Initiated_n_open
10
11
Initiated_n_open
Notes:
Local and neighbor channel status should be TX/RX reachable in normal state;
Channel declare as RX unreachable when no traffic over channel over 1s monitor interval;
Unreachable TCA will feedback to local and remote master controller;
If three is unreachable detected, traffic-classed get controlled over backup channel immediately
for fast failover;
If channel RX unreachable detected, you could check that sent TCA unreachcounter keep increasing
for each 30s interval: show domain <name> border exporter statistics
HubBR2#show domain one border exporter statistics
show on-demand exporter(default vrf)
On-demand exporter statistics:
Border: 10.8.1.1
Process ID: SEND=125, RECV=278
Interface: Tunnel200 (index=13, service provider=INET)
Bandwidth: Ingress=3430 Kbit/sec, Capacity=50000 Kbit/sec
Egress =14899 Kbit/sec, Capacity=50000 Kbit/sec
Total sent BW packets:
61
Destination-site: 10.8.3.3:
Total sent TCA unreach
Total sent TCA templates:
8
1, Last sent: 0 min 3 sec ago
Destination-site: 10.2.10.10:
Total sent TCA unreach
Total sent ODE
Total sent TCA templates:
8
4
1, Last sent: 0 min 3 sec ago
You could check that Channel TX/RX status transit to unreachable as well: show domain <name>
border channels
HubBR2#show domain one border channels
Border Smart Probe Stats:
Channel id: 23
Channel dscp: 0
Channel site: 10.2.11.11
Channel interface: Tunnel200
Channel operation state: Initiated_n_open
Channel RX state: reachable
Channel TX state: reachable
Channel next hop: 10.0.200.11
Channel recv_probes: 996579
Channel send_probes: 996055
Channel recv_packets: 0
Channel send_packets: 0
Channel recv_bytes: 0
Channel send_bytes 0
Last Probe Received: 8 ms Ago
Last Probe Sent: 116 ms Ago
Channel id: 88
Channel dscp: 32
Channel site: 10.2.10.10
Channel interface: Tunnel200
Channel operation state: Initiated_n_open
Channel RX state: unreachable
Channel TX state: unreachable
Channel next hop: 10.0.200.10
Channel recv_probes: 23591
Channel send_probes: 25311
Channel recv_packets: 386704
Channel send_packets: 1175118
Channel recv_bytes: 55527581
Channel send_bytes 494292492
Last Probe Received: 45238 ms Ago
Last Probe Sent: 4 ms Ago
Channel id: 91
62
Channel dscp: 46
Channel site: 10.2.10.10
Channel interface: Tunnel200
Channel operation state: Initiated_n_open
Channel RX state: unreachable
Channel TX state: unreachable
Channel next hop: 10.0.200.10
Channel recv_probes: 30541
Channel send_probes: 35500
Channel recv_packets: 0
Channel send_packets: 22484
Channel recv_bytes: 0
Channel send_bytes 10338531
Last Probe Received: 45216 ms Ago
Last Probe Sent: 64 ms Ago
You could check the channel status on master controller with latest unreachable TCA and ODE exports:
show domain <name> master channels service-provider <PATH>
HubMC#show domain one master channels link-name INET
Legend: * (Value obtained from Network delay:)
Channel Id: 25 Dst Site-Id: 10.2.10.10 Link Name: INET
Channel Created: 13:39:27 ago
Provisional State: Initiated and open
Operational state: Available but unreachable
Interface Id: 13
Estimated Channel Egress Bandwidth: 0 Kbps
Immitigable Events Summary:
Total Performance Count: 0, Total BW Count: 0
ODE Stats Bucket Number: 1
Last Updated : 00:00:01 ago
Packet Count : 0
Byte Count
: 0
One Way Delay : N/A
Loss Rate Pkts : N/A
Loss Rate Bytes: N/A
Jitter Mean
: N/A
Unreachable
: TRUE
ODE Stats Bucket Number: 2
Last Updated : 00:00:57 ago
Packet Count : 0
Byte Count
: 0
One Way Delay : N/A
Loss Rate Pkts : N/A
Loss Rate Bytes: N/A
Jitter Mean
: N/A
Unreachable
: TRUE
TCA Statitics:
Received:4 ; Processed:1 ; Unreach_rcvd:4
Latest TCA Bucket
Last Updated : 00:00:01 ago
63
64
Interface Id: 14
Estimated Channel Egress Bandwidth: 5652 Kbps
Immitigable Events Summary:
Total Performance Count: 0, Total BW Count: 0
ODE Stats Bucket Number: 1
Last Updated : 00:02:30 ago
Packet Count : 31540
Byte Count
: 13543122
One Way Delay : 0 msec*
Loss Rate Pkts: 0.0 %
Loss Rate Byte: 0.0 %
Jitter Mean
: 266 usec
Unreachable
: FALSE
ODE Stats Bucket Number: 2
Last Updated : 00:05:30 ago
Packet Count : 58054
Byte Count
: 25080440
One Way Delay : 1 msec*
Loss Rate Pkts: 0.0 %
Loss Rate Byte: 0.0 %
Jitter Mean
: 0 usec
Unreachable
: FALSE
TCA Statitics:
Received:0 ; Processed:0 ; Unreach_rcvd:0
HubMC#
65
7 IOS-XE Troubleshooting
In this section, you could be able to get IOS-XE specific troubleshooting tips on how to isolate PfR
platform related issues for PfR version 3.
Check PFR global datapath stats like Routing Control, Smart Probe, and CFT(common-flow-table).
Branch10#show platform hardware qfp active feature pfrv3 datapath global
CENT QFP Datapath global information
CENT FDB:
Channel hash:
table address: 0xe94b5000
RC flow hash:
66
950290
593990140
0
60904998
1736369427
2387565130
0
0
0
308
8
49
143
5
34
0
0
0
0
0
0
0
169
0
0
593990150
0
593985878
0
3
2
146
62
130
Check CFT(common-flow-table) and relative Feacute Objects(FO) get enabled properly, CENT and FME
FO is enabled automatically with DSCP based policy, STILE(NBAR2) and FNF are enabled dynamically
with application based policy:
Branch10#show platform hardware qfp active infrastructure cft status brief
===================================== CFT 1/1 =====================================
CFT id: 0
CFT name: GLOBAL_CFT
General Parameters:
Max flows: 500000
67
-----
CENT
FME
FME
FME
FME
FNF
FNF
FNF
68
IPC statistics:
Control-plane to data-plane IPC messages successfully sent: 18
Control-plane to data-plane IPC messages failed to be sent: 0
Data-plane to control-plane IPC messages successfully sent: 18
Branch10#
PfR version 3 dynamically enable AVC components like CFT/FME/FNF/NABR2, together with CENT itself,
which could consume QFP DRAM memory depending on the number of active flows in the chassis.
DRAM on QFP usage can be found on the following command:
Branch10#show platform hardware qfp active infrastructure exmem statistics
QFP exmem statistics
Type: Name: DRAM, QFP: 0
Total: 268435456
InUse: 71523328
Free: 196912128
Lowest free water mark: 193837056
Type: Name: IRAM, QFP: 0
Total: 2097152
InUse: 109568
Free: 1987584
Lowest free water mark: 1987584
Type: Name: SRAM, QFP: 0
Total: 0
InUse: 0
Free: 0
Lowest free water mark: 0
Type: Name: DP_TEXT, QFP: 0
Total: 0
InUse: 0
Free: 0
Lowest free water mark: 0
Type: Name: DP_DATA, QFP: 0
Total: 0
InUse: 0
Free: 0
Lowest free water mark: 0
Type: Name: DP_RODATA, QFP: 0
Total: 0
InUse: 0
Free: 0
Lowest free water mark: 0
Type: Name: DP_BSS, QFP: 0
Total: 0
InUse: 0
Free: 0
Lowest free water mark: 0
Branch10#show platform hardware qfp active infrastructure exmem statistics user
Type: Name: IRAM, QFP: 0
Allocations Bytes-Alloc Bytes-Total User-Name
------------------------------------------------------------------------------1
108800
109568
CPP_FIA
Type: Name: GLOBAL, QFP: 0
Allocations Bytes-Alloc Bytes-Total User-Name
------------------------------------------------------------------------------7
20976
25600
P/I
69
1
1
1
1
39
1
9
22
10
4384
16384
4384
512
395992
4384
9152776
7254160
279152
5120
16384
5120
1024
434176
5120
9159680
7274496
284672
DPSS
FHS
EPC
FME
MMA
SBC
CFT
CVLA
CEF
[SNIP]
1
147456
147456
CENT chan
1
32768
32768
CENT rc flow
1
256
1024
cent color chunk
1
32768
32768
cent policy chunk
1
384
1024
CENT inst
1
16384
16384
CPP_FNF_UIDB_DP_CHUNK
1
16896
17408
FME PARAMETERS OBJECTS
Type: Name: GLOBAL, QFP: 0
Allocations Bytes-Alloc Bytes-Total User-Name
------------------------------------------------------------------------------2
262144
262144
QoS 32
2
524288
524288
QoS 64
2
1048576
1048576
QoS 128
2
524288
524288
QoS 256
687
12477600
12491776
CPR STILE EXMEM GRAPH
Branch10#show platform hardware qfp active infrastructure cvla client handles
Handles for cpp 0:
--------------------Entity name: FNF_AOR
Handle: 0xe95b5000
Number of allocations: 0
Memory allocated: 0
Entity name: NBAR_CVLA_ENTITY
Handle: 0xe95cf000
Number of allocations: 0
Memory allocated: 0
Entity name: FNF Chunk 2
Handle: 0xe95b9000
Number of allocations: 0
Memory allocated: 0
Entity name: FNF Chunk 1
Handle: 0xe95b8000
Number of allocations: 67
Memory allocated: 7552
Entity name: FNF Chunk 0
Handle: 0xe95b6000
Number of allocations: 67
Memory allocated: 3648
Entity name: STILE Chunk 2
Handle: 0xe9605000
Number of allocations: 18
Memory allocated: 3744
Entity name: STILE Chunk 1
Handle: 0xe9604000
Number of allocations: 139
70
Check IOS-XE Forwarding-manager Asynchronous Object Manager Statistics, no error and pending
objects:
Branch10#show platform software object-manager fp active statistics
Forwarding Manager Asynchronous Object Manager Statistics
71
Object update:
Batch begin:
Batch end:
Command:
Stale-objects:
Error-objects:
Pending-issue: 0, Pending-acknowledgement: 0
Pending-issue: 0, Pending-acknowledgement: 0
Pending-issue: 0, Pending-acknowledgement: 0
Pending-acknowledgement: 0
0
0
Check three FNF(Flexible-Netflow) monitors get installed and work properly in datapath:
Branch10#show platform hardware qfp active feature fnf client monitor all
QFP Client FNF Monitors
Name
-------------------------------MON-Ingress-per-DSCP-0-48-11
MON-Egress-aggregate-0-48-16
MON-Egress-prefix-learn-0-48-17
Oid
---------2000012
2000017
2000018
Branch10#
Branch10#show platform hardware qfp active feature fnf client flowdef all
QFP Client FNF FLOW_DEFs
Name
Oid
-------------------------------- ---------mma_monitor_pd_fdef_0x4FE67240_0xC 2000012
mma_monitor_pd_fdef_0x4585D112_0x11 2000017
mma_monitor_pd_fdef_0x9A388131_0x12 2000018
Branch10#
Branch10#show platform hardware qfp active feature fnf client exporter all
QFP Client FNF Exporters
Name
-------------------------------CENT_FLOW_EXP-5
Oid
---------2000006
Branch10#
Branch10#show platform hardware qfp active feature fnf client interface all
QFP Client FNF Interfaces
Name
QFP Id
Direction
------------------------------------------------------Tunnel100
13
Ingress
Tunnel200
14
Ingress
Tunnel100
13
Egress
Tunnel200
14
Egress
Tunnel0
16
Egress
Branch10#
Branch10#show platform hardware qfp active feature fnf datapath aor
CFT: ConfigAddress 0x8aeae2c0, Instance 0x8252a720, Feat ID 3, FlowObj ID 3, Flags
0x00000001
CVLA: handle 0xe95b5000 epoch 0x1
72
Statistics:
Flow Object (chunk ID 12)
Alloc
Attach
Detach
Free
Flow Object elements:
Main Metrics (chunk ID 13)
Alloc
Free
MMA Metrics (chunk ID 14)
Alloc
Free
Extracted Field AOR root objects
Alloc
Free
Extracted Field objects
Alloc
Free
Flow Object Termination Event from CFT
Flow Object Detach
Flow Object Free
EOTE Flow Object Free:
Ager
Config
Errors:
NULL Flow object
NULL Main Metric
NULL MMA Metric
CFT not configured
CFT search failure
Zero RefCount
CVLA epoch errors
CVLA handle errors
NBAR SB fail
Packets:
INPUT_FNF_AOR_FIRST
INPUT_FNF_AOR_FINAL
INPUT_FNF_AOR_FIRST_WAAS
INPUT_FNF_AOR_FINAL_WAAS
OUTPUT_FNF_AOR
OUTPUT_FNF_AOR_WAAS
INPUT_FNF_AOR_DROP
FNF_AOR_RELEASE
FNF AOR Monitor:
Skip
Run
Success
Fail
63903210
63903210
63902837
63903149
0
0
0
0
63903210
63903149
0
0
0
0
0
0
0
0
0
0
312
0
312
0
0
0
0
0
0
0
0
0
0
31453
Unresolved
0
0
0
0
127858147
0
0
63902843
Resolved
0
0
0
0
134964462
0
0
127858147
134964462
Branch10#
73
CPP num: 0
MMA Monitor id:
FNF Monitor oid:
FNF Monitor Name:
Punt indication:
punt exmem block:
CPP num: 0
Branch10#show platform hardware qfp active feature mma client db class-action all
Class actions in the DB:
----------------------Class group id:
11064832
Class group name: CENT-Policy-Ingress-0-9
Class id:
807614884
Class group id:
11064832
Class group name: CENT-Policy-Ingress-0-9
Class id:
1968189332
Class group id:
11064832
Class group name: CENT-Policy-Ingress-0-9
Class id:
1812905690
Class group id:
11064832
Class group name: CENT-Policy-Ingress-0-9
Class id:
525874308
Class group id:
14952096
Class group name: CENT-Policy-Egress-0-12
Class id:
340355238
Class group id:
11064832
Class group name: CENT-Policy-Ingress-0-9
Class id:
368863262
Class group id:
11064832
Class group name: CENT-Policy-Ingress-0-9
Class id:
1020219285
Class group id:
11064832
Class group name: CENT-Policy-Ingress-0-9
Class id:
541121671
Branch10#show platform hardware qfp active feature mma punt datapath hsl stats
MMA Export Statistics
--------------------Total records logged into MMA: 144113
Total records sent towards HSL: 144113
Total packets exported via HSL: 13670
Total record allocation failures: 0
Total records dropped by MMA: 0
Total packets dropped by HSL before export: 0
MMA HSL Statistics
-------------------
74
75
Feature Condition
Type
Value
-----------------------|-----------------------|--------------------------------
Feature
Type
Submode
Level
------------|-------------|---------------------------------------------------------------------------------------------|---------PfRv3
dataplane
SMP
verbose
Branch10#
Branch10#debug platform condition stop
Branch10#
Branch10#test platform software trace slot fp active cpp-control-process rotate
Rotated file from: /tmp/fp/trace/stage/cpp_cp_F0-0.log.19425.20141102003007, Bytes:
99746, Messages: 524
Branch10#more bootflash:/tracelogs/cpp_cp_F0-0.log.19425.20141102003007
11/02 00:29:06.573 : btrace continued for process ID 19425 with 159 modules
11/02 00:29:06.576 [cpp-dp-PfRv3]: (verbose): QFP:0.0 Thread:000
TS:00000248581978947724 :SMP:[10.1.10.4] 35995 => [10.8.101.3] 80
found, mark as tx touched
11/02 00:29:06.576 [cpp-dp-PfRv3]: (verbose): QFP:0.0 Thread:000
TS:00000248581978992572 :SMP:[10.1.10.4] 35995 => [10.8.101.3] 80
vrf 0, src 10.1.10.4, dst 10.8.101.3, dscp 0x1a
11/02 00:29:06.576 [cpp-dp-PfRv3]: (verbose): QFP:0.0 Thread:000
TS:00000248581978995096 :SMP:[10.1.10.4] 35995 => [10.8.101.3] 80
found, mark as tx touched
11/02 00:29:06.576 [cpp-dp-PfRv3]: (verbose): QFP:0.0 Thread:000
TS:00000248581984745026 :SMP:[10.1.10.3] 36042 => [10.8.101.6] 80
vrf 0, src 10.1.10.3, dst 10.8.101.6, dscp 0xa
11/02 00:29:06.576 [cpp-dp-PfRv3]: (verbose): QFP:0.0 Thread:000
TS:00000248581984748008 :SMP:[10.1.10.3] 36042 => [10.8.101.6] 80
found, mark as tx touched
11/02 00:29:06.576 [cpp-dp-PfRv3]: (verbose): QFP:0.0 Thread:000
TS:00000248581984813885 :SMP:[10.1.10.4] 36078 => [10.8.101.6] 80
vrf 0, src 10.1.10.4, dst 10.8.101.6, dscp 0x1a
11/02 00:29:06.576 [cpp-dp-PfRv3]: (verbose): QFP:0.0 Thread:000
TS:00000248581984816746 :SMP:[10.1.10.4] 36078 => [10.8.101.6] 80
found, mark as tx touched
11/02 00:29:06.577 [cpp-dp-PfRv3]: (verbose): QFP:0.0 Thread:000
TS:00000248581984879710 :SMP:[10.1.10.6] 36076 => [10.8.101.4] 80
vrf 0, src 10.1.10.6, dst 10.8.101.4, dscp 0x2e
Conditional Debug on LAN interface GigabitEthernet5.100 ingress direction with dataplane submode
routing-control level verbose:
Branch10#debug platform condition interface GigabitEthernet5.100 ingress
Branch10#debug platform condition feature pfrv3 dataplane submode routing-control
level verbose
Branch10#debug platform condition start
Branch10#
Branch10#show platform conditions
Conditional Debug Global State: Start
76
Conditions
Direction
---------------------------------------------------------------------------------------------|--------Tunnel100
both
GigabitEthernet5.100
ingress
Feature Condition
Type
Value
-----------------------|-----------------------|--------------------------------
Feature
Type
Submode
Level
------------|-------------|---------------------------------------------------------------------------------------------|---------PfRv3
dataplane
RC
verbose
Branch10#
Branch10#debug platform condition stop
Branch10#
Branch10#test platform software trace slot fp active cpp-control-process rotate
Rotated file from: /tmp/fp/trace/stage/cpp_cp_F0-0.log.19425.20141102003345, Bytes:
1030291, Messages: 5787
Branch10#
Branch10#more bootflash:/tracelogs/cpp_cp_F0-0.log.19425.20141102003345
11/02 00:33:26.483 : btrace continued for process ID 19425 with 159 modules
11/02 00:33:26.485 [cpp-dp-PfRv3]: (verbose): QFP:0.0 Thread:000
TS:00000248841977688674 :RC:[10.1.10.5] 45244 => [10.8.101.11] 80 6 (0): PACKET: vrf
0, src 10.1.10.5, dst 10.8.101.11, dscp 22, app 3000050
11/02 00:33:26.485 [cpp-dp-PfRv3]: (verbose): QFP:0.0 Thread:000
TS:00000248841977691516 :RC:[10.1.10.5] 45244 => [10.8.101.11] 80 6 (0): get cft fid
0xea06eea0 and cent fo 0xea05ec80
11/02 00:33:26.485 [cpp-dp-PfRv3]: (verbose): QFP:0.0 Thread:000
TS:00000248841977693372 :RC:[10.1.10.5] 45244 => [10.8.101.11] 80 6 (0): FO spdb
caches: slen 0, dlen 16
11/02 00:33:26.485 [cpp-dp-PfRv3]: (verbose): QFP:0.0 Thread:000
TS:00000248841977694700 :RC:[10.1.10.5] 45244 => [10.8.101.11] 80 6 (0): flow key: 0,
0.0.0.0/0 -> 10.8.0.0/16
11/02 00:33:26.485 [cpp-dp-PfRv3]: (info): QFP:0.0 Thread:000 TS:00000248841977696486
:RC:[10.1.10.5] 45244 => [10.8.101.11] 80 6 (0): policy seq 10 miss match
11/02 00:33:26.485 [cpp-dp-PfRv3]: (info): QFP:0.0 Thread:000 TS:00000248841977697637
:RC:[10.1.10.5] 45244 => [10.8.101.11] 80 6 (0): policy seq 20 hits dscp 22
11/02 00:33:26.486 [cpp-dp-PfRv3]: (verbose): QFP:0.0 Thread:000
TS:00000248841977698894 :RC:[10.1.10.5] 45244 => [10.8.101.11] 80 6 (0): process
action: adjacency 0, channel 0xead9fb60
11/02 00:33:26.486 [cpp-dp-PfRv3]: (verbose): QFP:0.0 Thread:000
TS:00000248841977700416 :RC:[10.1.10.5] 45244 => [10.8.101.11] 80 6 (0): channel 141
uidb 65527 state up, routing by 10.0.200.85
11/02 00:33:26.486 [cpp-dp-PfRv3]: (verbose): QFP:0.0 Thread:000
TS:00000248841977703047 :RC:[10.1.10.5] 45244 => [10.8.101.11] 80 6 (0): find
oce_chain_p 0xe86355a0 for vrf 0 next-hop 10.0.200.85
11/02 00:33:26.486 [cpp-dp-PfRv3]: (verbose): QFP:0.0 Thread:000
TS:00000248841977705213 :RC:[10.1.10.5] 45244 => [10.8.101.11] 80 6 (0): primary
action take effect
77
Conditional Debug with ipv4 access-list on LAN and WAN interface for selective packets with both
routing-control and smart-probe on:
Branch10#show running-config | section access-list
ip access-list extended RC
permit tcp host 10.1.10.2 any
ip access-list extended SMP
permit udp any eq 18000 any eq 19000
!
Branch10#debug platform condition
ingress
Branch10#debug platform condition
Branch10#debug platform condition
Branch10#debug platform condition
Branch10#
Branch10#show platform conditions
Feature Condition
Type
Value
-----------------------|-----------------------|--------------------------------
Feature
Type
Submode
Level
------------|-------------|---------------------------------------------------------------------------------------------|---------CENT
dataplane
RC SMP
verbose
Branch10#debug platform condition stop
Branch10#
Branch10#test platform software trace slot fp active cpp-control-process rotate
Rotated file from: /tmp/fp/trace/stage/cpp_cp_F0-0.log.19425.20141102015646, Bytes:
1039673, Messages: 5824
Branch10#
Branch10#more bootflash:/tracelogs/cpp_cp_F0-0.log.19425.20141102015646
11/02 00:45:26.265 [cpp-dp-PfRv3]: (verbose): QFP:0.0 Thread:000
TS:00000249561773691125 :RC:[10.1.10.2] 6691 => [10.8.101.6] 80 6 (0): PACKET: vrf 0,
src 10.1.10.2, dst 10.8.101.6, dscp 8, app 3000050
78
platform
platform
platform
platform
platform
platform
79
Matched 23811
Traced
1024
Packets Received
Ingress 23811
Inject
0
Packets Processed
Forward 21979
Punt
0
Drop
0
Consume 1832
HubBR1#show platform packet-trace summary
Load for five secs: 0%/0%; one minute: 0%; five minutes: 0%
Time source is NTP, *06:34:06.649 CST Sun Dec 28 2014
Pkt
Input
Output
State Reason
0
Tu100
Gi2
FWD
1
Tu100
Gi2
FWD
2
Tu100
Gi2
FWD
3
Tu100
Gi2
FWD
76
77
78
79
80
81
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
internal0/0/recycle:0
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
Gi2
internal0/0/recycle:0
Gi2
Gi2
FWD
FWD
FWD
FWD
FWD
Gi3
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
FWD
Gi3
FWD
FWD
80
81
Feature: FIA_TRACE
Entry
: 0x80366080 - OUTPUT_FNF_AOR_RELEASE_CLRT
Lapsed time: 2180 ns
Feature: FIA_TRACE
Entry
: 0x808c4090 - IPV4_TUNNEL_OUTPUT_FINAL
Lapsed time: 22780 ns
Feature: FIA_TRACE
Entry
: 0x808c4d10 - IPV4_OUTPUT_TUNNEL_PROTECTION_ENCRYPT
Lapsed time: 3040 ns
Feature: IPSec
Result
: IPSEC_RESULT_SA
Action
: ENCRYPT
SA Handle : 6
Peer Addr : 172.16.111.11
Local Addr: 172.16.84.4
Feature: FIA_TRACE
Entry
: 0x804cbd30 - IPV4_OUTPUT_IPSEC_CLASSIFY
Lapsed time: 45820 ns
Feature: FIA_TRACE
Entry
: 0x804cde50 - IPV4_OUTPUT_IPSEC_DOUBLE_ACL
Lapsed time: 1460 ns
Feature: FIA_TRACE
Entry
: 0x804cdde0 - IPV4_IPSEC_FEATURE_RETURN
Lapsed time: 2380 ns
Feature: FIA_TRACE
Entry
: 0x80c33d30 - IPV4_OUTPUT_IPSEC_INLINE_FRAG_CHK
Lapsed time: 2680 ns
Feature: FIA_TRACE
Entry
: 0x80c34ed0 - IPV4_OUTPUT_IPSEC_INLINE_PROCESS
Lapsed time: 170220 ns
Feature: FIA_TRACE
Entry
: 0x804cdc60 - IPV4_OUTPUT_IPSEC_TUNNEL_RERUN_JUMP
Lapsed time: 1800 ns
Feature: FIA_TRACE
Entry
: 0x804cf270 - IPV4_OUTPUT_IPSEC_POST_PROCESS
Lapsed time: 9280 ns
Feature: FIA_TRACE
Entry
: 0x804cdde0 - IPV4_IPSEC_FEATURE_RETURN
Lapsed time: 900 ns
Feature: FIA_TRACE
Entry
: 0x804cdde0 - IPV4_IPSEC_FEATURE_RETURN
Lapsed time: 1040 ns
Feature: FIA_TRACE
Entry
: 0x808c2f00 - IPV4_TUNNEL_GOTO_OUTPUT
Lapsed time: 11840 ns
Feature: FIA_TRACE
Entry
: 0x808c2d20 - IPV4_TUNNEL_FW_CHECK
Lapsed time: 5060 ns
Feature: FIA_TRACE
Entry
: 0x80ac9d10 - IPV4_INPUT_DST_LOOKUP_ISSUE
Lapsed time: 8160 ns
Feature: FIA_TRACE
Entry
: 0x80a74ea0 - IPV4_INPUT_ARL
Lapsed time: 1920 ns
Feature: FIA_TRACE
Entry
: 0x80ab9f50 - IPV4_OUTPUT_DST_LOOKUP_CONSUME
Lapsed time: 1700 ns
Feature: FIA_TRACE
Entry
: 0x808c2dc0 - IPV4_TUNNEL_ENCAP_FOR_US
Lapsed time: 2740 ns
Feature: FIA_TRACE
Entry
: 0x80aa8d00 - IPV4_OUTPUT_LOOKUP_PROCESS
Lapsed time: 9160 ns
Feature: FIA_TRACE
Entry
: 0x80a7abf0 - IPV4_TUNNEL_ENCAP_GOTO_OUTPUT_FEATURE
82
83
Output
: GigabitEthernet3
State
: FWD
Timestamp
Start
: 329501042996259 ns (11/01/2014 16:57:30.586327 UTC)
Stop
: 329501043066837 ns (11/01/2014 16:57:30.586397 UTC)
Path Trace
Feature: IPV4
Source
: 10.8.101.8
Destination : 10.1.10.4
Protocol
: 6 (TCP)
SrcPort : 80
DstPort : 46782
Feature: FIA_TRACE
Entry
: 0x809e42f0 - DEBUG_COND_INPUT_PKT
Lapsed time: 1180 ns
Feature: FIA_TRACE
Entry
: 0x80abac20 - IPV4_INPUT_DST_LOOKUP_CONSUME
Lapsed time: 1200 ns
Feature: FIA_TRACE
Entry
: 0x800f87d0 - IPV4_INPUT_FOR_US_MARTIAN
Lapsed time: 1220 ns
Feature: CFT
API
: cft_handle_pkt
packet capabilities
: 0x0000008c
input vrf_idx
: 0
calling feature
: CENT
direction
: Input
triplet.vrf_idx
: 0
triplet.network_start : 0x0100410e
triplet.triplet_flags : 0x00000000
triplet.counter
: 0
cft_bucket_number
: 1553462
cft_l3_payload_size
: 1380
cft_pkt_ind_flags
: 0x00000100
cft_pkt_ind_valid
: 0x00009bff
tuple.src_ip
: 10.8.101.8
tuple.dst_ip
: 10.1.10.4
tuple.src_port
: 80
tuple.dst_port
: 46782
tuple.vrfid
: 0
tuple.l4_protocol
: TCP
tuple.l3_protocol
: IPV4
pkt_sb_state
: 0
pkt_sb.num_flows
: 1
pkt_sb.tuple_epoch
: 0
returned cft_error
: 0
returned fid
: 0xe9a111f0
Feature: NBAR
Packet number in flow: 4
Classification state: Final
Classification name: http
Classification ID: [IANA-L4:80]
Number of matched sub-classifications: 0
Number of extracted fields: 0
Is PA (split) packet: False
Feature: FIA_TRACE
Entry
: 0x80843530 - IPV4_INPUT_STILE_LEGACY
Lapsed time: 85700 ns
Feature: FIA_TRACE
Entry
: 0x80255e90 - IPV4_INPUT_CENT_SMP_PROCESS
Lapsed time: 11120 ns
Feature: PfRv3
Local Channel id : 120
Peer Site id
: 10.2.10.10
Dscp
: 26
84
Interface
: Tunnel100
Destination Prefix: 10.1.10.0/24
App id
: 218103809
Next hop
: 10.0.100.10
Feature: FIA_TRACE
Entry
: 0x80256fb0 - IPV4_INPUT_CENT_RC_PROCESS
Lapsed time: 42300 ns
Feature: FIA_TRACE
Entry
: 0x80aa8d00 - IPV4_OUTPUT_LOOKUP_PROCESS
Lapsed time: 4940 ns
Feature: FIA_TRACE
Entry
: 0x80acc860 - IPV4_INPUT_IPOPTIONS_PROCESS
Lapsed time: 1060 ns
Feature: FIA_TRACE
Entry
: 0x800b7390 - MPLS_INPUT_GOTO_OUTPUT_FEATURE
Lapsed time: 3100 ns
Feature: FIA_TRACE
Entry
: 0x809e0820 - CBUG_OUTPUT_FIA
Lapsed time: 1660 ns
Feature: FIA_TRACE
Entry
: 0x8088e1c0 - IPV4_INPUT_TCP_ADJUST_MSS
Lapsed time: 4080 ns
Feature: FIA_TRACE
Entry
: 0x8050fe40 - MC_OUTPUT_GEN_RECYCLE
Lapsed time: 3460 ns
Feature: FIA_TRACE
Entry
: 0x80ace3d0 - IPV4_MC_INPUT_VFR_REFRAG
Lapsed time: 1140 ns
Feature: FIA_TRACE
Entry
: 0x80abad80 - IPV4_OUTPUT_SRC_LOOKUP_ISSUE
Lapsed time: 3500 ns
Feature: FIA_TRACE
Entry
: 0x80912c60 - IPV6_OUTPUT_L2_REWRITE
Lapsed time: 9660 ns
Feature: FIA_TRACE
Entry
: 0x80ab40e0 - IPV4_INPUT_SRC_LOOKUP_CONSUME
Lapsed time: 1560 ns
Feature: NBAR
Packet number in flow: 4
Classification state: Final
Classification name: http
Classification ID: [IANA-L4:80]
Number of matched sub-classifications: 0
Number of extracted fields: 0
Is PA (split) packet: False
Feature: FIA_TRACE
Entry
: 0x808431a0 - IPV4_OUTPUT_STILE_CLR_TXT
Lapsed time: 11600 ns
Feature: FIA_TRACE
Entry
: 0x80255710 - IPV4_OUTPUT_CENT_SMP_PROCESS
Lapsed time: 25460 ns
Feature: FIA_TRACE
Entry
: 0x80a8b860 - IPV4_OUTPUT_FRAG
Lapsed time: 960 ns
Feature: FIA_TRACE
Entry
: 0x8055e8e0 - IPV4_EGRESS_MMA_LOOKUP
Lapsed time: 49020 ns
Feature: FIA_TRACE
Entry
: 0x80365250 - OUTPUT_FNF_AOR_CLRT
Lapsed time: 16620 ns
Feature: FIA_TRACE
Entry
: 0x8033d5c0 - IPV4_TUNNEL_OUTPUT_FNF_FINAL
Lapsed time: 105820 ns
Feature: FIA_TRACE
Entry
: 0x803660c0 - OUTPUT_FNF_AOR_RELEASE_CLRT
85
86
Entry
: 0x80ace3d0 - IPV4_MC_INPUT_VFR_REFRAG
Lapsed time: 460 ns
Feature: FIA_TRACE
Entry
: 0x80912c60 - IPV6_OUTPUT_L2_REWRITE
Lapsed time: 3340 ns
Feature: CFT
API
: cft_handle_pkt
packet capabilities
: 0x0000008c
input vrf_idx
: 0
calling feature
: STILE
direction
: Output
triplet.vrf_idx
: 0
triplet.network_start : 0x01004078
triplet.triplet_flags : 0x00000000
triplet.counter
: 0
cft_bucket_number
: 0
cft_l3_payload_size
: 1460
cft_pkt_ind_flags
: 0x00000000
cft_pkt_ind_valid
: 0x00000931
tuple.src_ip
: 172.16.84.4
tuple.dst_ip
: 172.16.101.10
tuple.src_port
: 0
tuple.dst_port
: 0
tuple.vrfid
: 0
tuple.l4_protocol
: 50
tuple.l3_protocol
: IPV4
pkt_sb_state
: 0
pkt_sb.num_flows
: 1
pkt_sb.tuple_epoch
: 0
returned cft_error
: 14
returned fid
: 0x00000000
Feature: NBAR
Packet number in flow: 4
Classification state: Final
Classification name: ipsec
Classification ID: [CANA-L7:9]
Number of matched sub-classifications: 0
Number of extracted fields: 0
Is PA (split) packet: False
Feature: FIA_TRACE
Entry
: 0x808431a0 - IPV4_OUTPUT_STILE_CLR_TXT
Lapsed time: 58540 ns
Feature: FIA_TRACE
Entry
: 0x80a8b860 - IPV4_OUTPUT_FRAG
Lapsed time: 4540 ns
Feature: FIA_TRACE
Entry
: 0x809101a0 - L2_REWRITE_AFTER_FRAG_WITHOUT_CLIP
Lapsed time: 4020 ns
Feature: FIA_TRACE
Entry
: 0x80b15550 - IPV4_OUTPUT_DROP_POLICY
Lapsed time: 4740 ns
Feature: FIA_TRACE
Entry
: 0x80c38700 - MARMOT_SPA_D_TRANSMIT_PKT
Lapsed time: 32020 ns
PfRv3 Smart-Probe RTP packets send to neighour BR over Auto-Tunnel interface:
HubBR1#
HubBR1#show platform packet-trace pa 1008
HubBR1#show platform packet-trace packet 1008
Load for five secs: 0%/0%; one minute: 0%; five minutes: 0%
Time source is NTP, *06:54:11.582 CST Sun Dec 28 2014
Packet: 1008
CBUG ID: 13502393
87
Summary
Input
: GigabitEthernet2
Output
: GigabitEthernet2
State
: FWD
Timestamp
Start
: 10510401601048 ns (12/27/2014 22:53:49.842386 UTC)
Stop
: 10510401632067 ns (12/27/2014 22:53:49.842417 UTC)
Path Trace
Feature: IPV4
Source
: 10.8.101.224
Destination : 10.1.10.2
Protocol
: 6 (TCP)
SrcPort : 80
DstPort : 47916
Feature: FIA_TRACE
Entry
: 0x809e4f70 - DEBUG_COND_INPUT_PKT
Lapsed time: 4533 ns
Feature: FIA_TRACE
Entry
: 0x80abb8a0 - IPV4_INPUT_DST_LOOKUP_CONSUME
Lapsed time: 1946 ns
Feature: FIA_TRACE
Entry
: 0x800f8960 - IPV4_INPUT_FOR_US_MARTIAN
Lapsed time: 1813 ns
Feature: FIA_TRACE
Entry
: 0x80256280 - IPV4_INPUT_CENT_SMP_PROCESS
Lapsed time: 20053 ns
Feature: CFT
API
: cft_handle_pkt
packet capabilities
: 0x00000080
input vrf_idx
: 0
calling feature
: CENT
direction
: Input
triplet.vrf_idx
: 0
triplet.network_start : 0x0100410e
triplet.triplet_flags : 0x00000000
triplet.counter
: 0
cft_bucket_number
: 549667
cft_l3_payload_size
: 36
cft_pkt_ind_flags
: 0x00000000
cft_pkt_ind_valid
: 0x000019f7
tuple.src_ip
: 10.8.101.224
tuple.dst_ip
: 10.1.10.2
tuple.src_port
: 80
tuple.dst_port
: 47916
tuple.vrfid
: 0
tuple.l4_protocol
: TCP
tuple.l3_protocol
: IPV4
pkt_sb_state
: 0
pkt_sb.num_flows
: 0
pkt_sb.tuple_epoch
: 0
returned cft_error
: 12
returned fid
: 0x00000000
Feature: PfRv3
Neighbor Channel id : 17
Peer Site id
: 10.2.10.10
Dscp
: 32
Destnation Prefix: 10.1.10.0/24
App id
: 218103809
Neighbor BR
: 10.8.2.2
Feature: CFT
API
: cft_handle_pkt
packet capabilities
: 0x00000084
input vrf_idx
: 0
calling feature
: CENT
direction
: Input
88
triplet.vrf_idx
:
triplet.network_start :
triplet.triplet_flags :
triplet.counter
:
cft_bucket_number
:
cft_l3_payload_size
:
cft_pkt_ind_flags
:
cft_pkt_ind_valid
:
tuple.src_ip
:
tuple.dst_ip
:
tuple.src_port
:
tuple.dst_port
:
tuple.vrfid
:
tuple.l4_protocol
:
tuple.l3_protocol
:
pkt_sb_state
:
pkt_sb.num_flows
:
pkt_sb.tuple_epoch
:
returned cft_error
:
returned fid
:
Feature: FIA_TRACE
Entry
: 0x802573a0
Lapsed time: 254133 ns
Feature: FIA_TRACE
Entry
: 0x80aa9980
Lapsed time: 7413 ns
Feature: FIA_TRACE
Entry
: 0x80acd4e0
Lapsed time: 1973 ns
Feature: FIA_TRACE
Entry
: 0x800b7390
Lapsed time: 3546 ns
Feature: FIA_TRACE
Entry
: 0x80510bf0
Lapsed time: 6106 ns
Feature: FIA_TRACE
Entry
: 0x80acf050
Lapsed time: 1360 ns
Feature: FIA_TRACE
Entry
: 0x809138e0
Lapsed time: 13093 ns
Feature: FIA_TRACE
Entry
: 0x80a8c4e0
Lapsed time: 1386 ns
Feature: FIA_TRACE
Entry
: 0x80365d50
Lapsed time: 3760 ns
Feature: FIA_TRACE
Entry
: 0x8033dfe0
Lapsed time: 3466 ns
Feature: FIA_TRACE
Entry
: 0x80366bc0
Lapsed time: 2080 ns
Feature: FIA_TRACE
Entry
: 0x808c3d00
Lapsed time: 16106 ns
Feature: FIA_TRACE
Entry
: 0x808c3aa0
Lapsed time: 4000 ns
Feature: FIA_TRACE
Entry
: 0x808c3990
Lapsed time: 5413 ns
Feature: FIA_TRACE
Entry
: 0x80aca990
Lapsed time: 2000 ns
0
0x0100410e
0x00000000
0
549667
36
0x00000103
0x0000dbff
10.8.101.224
10.1.10.2
80
47916
0
TCP
IPV4
0
1
0
0
0xede64b10
- IPV4_INPUT_CENT_RC_PROCESS
- IPV4_INPUT_LOOKUP_PROCESS
- IPV4_INPUT_IPOPTIONS_PROCESS
- LAYER2_INPUT_GOTO_OUTPUT_FEATURE
- MC_OUTPUT_GEN_RECYCLE
- IPV4_VFR_REFRAG
- IPV4_INPUT_L2_REWRITE
- IPV4_OUTPUT_FRAG
- OUTPUT_FNF_AOR_CLRT
- IPV4_TUNNEL_OUTPUT_FNF_FINAL
- OUTPUT_FNF_AOR_RELEASE
- IPV4_TUNNEL_OUTPUT_FINAL
- IPV4_TUNNEL_GOTO_OUTPUT
- IPV4_TUNNEL_FW_CHECK
- IPV4_INPUT_DST_LOOKUP_ISSUE
89
Feature:
Entry
Lapsed
Feature:
Entry
Lapsed
Feature:
Entry
Lapsed
Feature:
Entry
Lapsed
Feature:
Entry
Lapsed
Feature:
Entry
Lapsed
Feature:
Entry
Lapsed
Feature:
Entry
Lapsed
Feature:
Entry
Lapsed
Feature:
Entry
Lapsed
FIA_TRACE
: 0x80a75b20
time: 2933 ns
FIA_TRACE
: 0x80ababd0
time: 826 ns
FIA_TRACE
: 0x808c3a30
time: 2213 ns
FIA_TRACE
: 0x80aa9980
time: 2293 ns
FIA_TRACE
: 0x80a7b870
time: 4773 ns
FIA_TRACE
: 0x80acf050
time: 586 ns
FIA_TRACE
: 0x809138e0
time: 3333 ns
FIA_TRACE
: 0x80a8c4e0
time: 426 ns
FIA_TRACE
: 0x80b173a0
time: 11280 ns
FIA_TRACE
: 0x80c3a580
time: 38000 ns
- IPV4_INPUT_ARL
- IPV4_INTERNAL_DST_LOOKUP_CONSUME
- IPV4_TUNNEL_ENCAP_FOR_US
- IPV4_INPUT_LOOKUP_PROCESS
- IPV4_TUNNEL_ENCAP_GOTO_OUTPUT_FEATURE
- IPV4_VFR_REFRAG
- IPV4_INPUT_L2_REWRITE
- IPV4_OUTPUT_FRAG
- IPV4_OUTPUT_DROP_POLICY
- MARMOT_SPA_D_TRANSMIT_PKT
HubBR1#
90
91
8 Configuration Sample
8.1 Example configuration on Hub MC
HubMC#show running-config
Building configuration...
Current configuration : 5137 bytes
!
! Last configuration change at 02:37:06 CST Mon Nov 3 2014
! NVRAM config last updated at 02:35:51 CST Mon Nov 3 2014
!
version 15.4
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service internal
no platform punt-keepalive disable-kernel-core
platform console serial
!
hostname HubMC
!
boot-start-marker
boot-end-marker
!
!
vrf definition Mgmt-intf
!
address-family ipv4
exit-address-family
!
no logging console
!
no aaa new-model
clock timezone CST 8 0
!
!
!
no ip domain lookup
!
!
!
subscriber templating
!
multilink bundle-name authenticated
!
domain one
vrf default
master hub
source-interface Loopback0
site-prefixes prefix-list DC1_PREFIX
monitor-interval 2 dscp cs5
monitor-interval 2 dscp ef
load-balance
enterprise-prefix prefix-list ENTERPRISE_PREFIX
class VOICE sequence 10
match dscp ef policy custom
priority 2 loss threshold 5
priority 1 one-way-delay threshold 150
path-preference MPLS fallback INET
class VIDEO sequence 20
match dscp af41 policy custom
92
93
94
95
!
!
!
ip ftp source-interface GigabitEthernet1
ip ftp username mgcusr
ip ftp password mgcusr
ip tftp source-interface GigabitEthernet1
!
crypto keyring DMVPN-KEYRING1
pre-shared-key address 0.0.0.0 0.0.0.0 key cisco123
!
!
!
!
!
crypto isakmp policy 10
encr aes
authentication pre-share
crypto isakmp performance
crypto isakmp profile ISAKMP-INET1
keyring DMVPN-KEYRING1
match identity address 0.0.0.0
!
crypto ipsec security-association replay disable
crypto ipsec security-association replay window-size 1024
!
crypto ipsec transform-set AES256/SHA/TRANSPORT esp-aes 256 esp-sha-hmac
mode transport
!
crypto ipsec profile DMVPN-PROFILE1
set transform-set AES256/SHA/TRANSPORT
set isakmp-profile ISAKMP-INET1
!
!
!
!
!
!
!
!
!
interface Loopback0
ip address 10.8.1.1 255.255.255.255
!
interface Tunnel100
bandwidth 100000
ip address 10.0.100.84 255.255.255.0
no ip redirects
ip mtu 1400
ip nhrp authentication cisco
ip nhrp map multicast dynamic
ip nhrp network-id 1
ip nhrp holdtime 600
ip nhrp redirect
ip tcp adjust-mss 1360
load-interval 30
tunnel source GigabitEthernet3
tunnel mode gre multipoint
tunnel key 100
tunnel protection ipsec profile DMVPN-PROFILE1
domain one path MPLS
!
interface GigabitEthernet1
vrf forwarding Mgmt-intf
ip address 10.124.19.210 255.255.255.0
96
negotiation auto
!
interface GigabitEthernet2
description --INTERNAL-ip address 10.8.24.4 255.255.255.0
speed 1000
no negotiation auto
!
interface GigabitEthernet3
description --MPLS-ip address 172.16.84.4 255.255.255.0
load-interval 30
speed 1000
no negotiation auto
!
interface GigabitEthernet4
no ip address
load-interval 30
speed 1000
no negotiation auto
!
interface GigabitEthernet5
ip address 101.1.4.1 255.255.255.0
speed 1000
no negotiation auto
!
interface GigabitEthernet6
no ip address
speed 1000
no negotiation auto
!
!
router eigrp 100
network 10.8.2.2 0.0.0.0
network 10.8.24.0 0.0.0.255
redistribute bgp 10 metric 100000 1 255 255 1500
distance eigrp 90 210
!
router ospf 100
router-id 10.8.1.1
network 172.16.84.4 0.0.0.0 area 0
!
router bgp 10
bgp router-id 10.8.1.1
bgp log-neighbor-changes
bgp listen range 10.0.100.0/24 peer-group MPLS-SPOKES
neighbor MPLS-SPOKES peer-group
neighbor MPLS-SPOKES remote-as 10
neighbor MPLS-SPOKES timers 20 60
!
address-family ipv4
bgp redistribute-internal
network 10.8.1.1 mask 255.255.255.255
network 10.8.3.3 mask 255.255.255.255
network 10.8.101.0 mask 255.255.255.0
network 10.8.102.0 mask 255.255.255.0
network 10.8.103.0 mask 255.255.255.0
network 10.8.104.0 mask 255.255.255.0
aggregate-address 10.8.0.0 255.255.0.0 summary-only
neighbor MPLS-SPOKES activate
neighbor MPLS-SPOKES send-community
neighbor MPLS-SPOKES next-hop-self all
neighbor MPLS-SPOKES default-originate
neighbor MPLS-SPOKES route-map MPLS-DC1-IN in
neighbor MPLS-SPOKES route-map MPLS-DC1-OUT out
97
98
99
!
!
redundancy
mode none
!
!
!
!
!
!
ip ftp source-interface GigabitEthernet1
ip ftp username mgcusr
ip ftp password mgcusr
ip tftp source-interface GigabitEthernet1
!
crypto keyring DMVPN-KEYRING2 vrf INET2
pre-shared-key address 0.0.0.0 0.0.0.0 key cisco123
!
!
!
!
!
crypto isakmp policy 10
encr aes
authentication pre-share
crypto isakmp invalid-spi-recovery
crypto isakmp performance
crypto isakmp profile ISAKMP-INET2
keyring DMVPN-KEYRING2
match identity address 0.0.0.0 INET2
!
crypto ipsec security-association replay disable
crypto ipsec security-association replay window-size 1024
!
crypto ipsec transform-set AES256/SHA/TRANSPORT esp-aes 256 esp-sha-hmac
mode transport
!
crypto ipsec profile DMVPN-PROFILE2
set transform-set AES256/SHA/TRANSPORT
set isakmp-profile ISAKMP-INET2
!
!
!
!
!
!
!
!
!
interface Loopback0
ip address 10.8.2.2 255.255.255.255
!
interface Tunnel200
bandwidth 50000
ip address 10.0.200.85 255.255.255.0
no ip redirects
ip mtu 1400
ip nhrp authentication cisco
ip nhrp map multicast dynamic
ip nhrp network-id 2
ip nhrp holdtime 600
ip nhrp redirect
ip tcp adjust-mss 1360
load-interval 30
delay 1000
100
tunnel
tunnel
tunnel
tunnel
tunnel
domain
source GigabitEthernet4
mode gre multipoint
key 200
vrf INET2
protection ipsec profile DMVPN-PROFILE2
one path INET
!
interface GigabitEthernet1
vrf forwarding Mgmt-intf
ip address 10.124.19.209 255.255.255.0
negotiation auto
!
interface GigabitEthernet2
description --INTERNAL-ip address 10.8.25.5 255.255.255.0
speed 1000
no negotiation auto
!
interface GigabitEthernet3
ip address 101.1.4.2 255.255.255.0
speed 1000
no negotiation auto
!
interface GigabitEthernet4
description --INET-vrf forwarding INET2
ip address 172.16.85.5 255.255.255.0
load-interval 30
speed 1000
no negotiation auto
!
!
router eigrp 100
network 10.8.1.1 0.0.0.0
network 10.8.25.0 0.0.0.255
redistribute bgp 10 metric 100000 1 255 255 1500
distance eigrp 90 210
!
router ospf 100 vrf INET2
router-id 10.8.2.2
network 172.16.85.5 0.0.0.0 area 0
!
router bgp 10
bgp router-id 10.8.2.2
bgp log-neighbor-changes
bgp listen range 10.0.200.0/24 peer-group INET-SPOKES
neighbor INET-SPOKES peer-group
neighbor INET-SPOKES remote-as 10
neighbor INET-SPOKES timers 20 60
!
address-family ipv4
bgp redistribute-internal
network 10.8.2.2 mask 255.255.255.255
network 10.8.3.3 mask 255.255.255.255
network 10.8.101.0 mask 255.255.255.0
network 10.8.102.0 mask 255.255.255.0
network 10.8.103.0 mask 255.255.255.0
network 10.8.104.0 mask 255.255.255.0
aggregate-address 10.8.0.0 255.255.0.0 summary-only
neighbor INET-SPOKES activate
neighbor INET-SPOKES send-community
neighbor INET-SPOKES next-hop-self all
neighbor INET-SPOKES default-originate
neighbor INET-SPOKES route-map INET-DC1-IN in
neighbor INET-SPOKES route-map INET-DC1-OUT out
101
102
103
!
!
!
subscriber templating
!
multilink bundle-name authenticated
!
domain one
vrf default
border
source-interface Loopback0
master local
master branch
source-interface Loopback0
hub 10.8.3.3
!
!
license udi pid CSR1000V sn 92WYKUIJKRO
license boot level ax
spanning-tree extend system-id
!
!
redundancy
mode none
!
!
!
!
!
!
ip ftp source-interface GigabitEthernet1
ip ftp username mgcusr
ip ftp password mgcusr
ip tftp source-interface GigabitEthernet1
!
!
crypto keyring DMVPN-KEYRING1
pre-shared-key address 0.0.0.0 0.0.0.0 key cisco123
crypto keyring DMVPN-KEYRING2 vrf INET2
pre-shared-key address 0.0.0.0 0.0.0.0 key cisco123
!
!
!
!
!
crypto isakmp policy 10
encr aes
authentication pre-share
crypto isakmp invalid-spi-recovery
crypto isakmp keepalive 40 5
crypto isakmp profile ISAKMP-INET1
keyring DMVPN-KEYRING1
match identity address 0.0.0.0
crypto isakmp profile ISAKMP-INET2
keyring DMVPN-KEYRING2
match identity address 0.0.0.0 INET2
!
crypto ipsec security-association idle-time 60
crypto ipsec security-association replay window-size 512
!
crypto ipsec transform-set AES256/SHA/TRANSPORT esp-aes 256 esp-sha-hmac
mode transport
!
crypto ipsec profile DMVPN-PROFILE1
set transform-set AES256/SHA/TRANSPORT
104
105
interface GigabitEthernet2
description --MPLS-ip address 172.16.101.10 255.255.255.0
speed 1000
no negotiation auto
!
interface GigabitEthernet3
description --INET-vrf forwarding INET2
ip address 172.16.102.10 255.255.255.0
load-interval 30
speed 1000
no negotiation auto
!
interface GigabitEthernet4
no ip address
speed 1000
no negotiation auto
!
interface GigabitEthernet5
no ip address
speed 1000
no negotiation auto
!
interface GigabitEthernet5.100
encapsulation dot1Q 100
ip address 10.1.10.1 255.255.255.0
!
router ospf 200 vrf INET2
network 172.16.102.10 0.0.0.0 area 0
!
router ospf 100
router-id 10.2.10.10
network 101.7.7.2 0.0.0.0 area 0
network 172.16.101.10 0.0.0.0 area 0
!
router bgp 10
bgp router-id 10.2.10.10
bgp log-neighbor-changes
neighbor MPLS-HUB peer-group
neighbor MPLS-HUB remote-as 10
neighbor MPLS-HUB timers 20 60
neighbor INET-HUB peer-group
neighbor INET-HUB remote-as 10
neighbor INET-HUB timers 20 60
neighbor 10.0.100.84 peer-group MPLS-HUB
neighbor 10.0.200.85 peer-group INET-HUB
!
address-family ipv4
network 10.1.10.0 mask 255.255.255.0
network 10.2.10.10 mask 255.255.255.255
neighbor MPLS-HUB send-community
neighbor MPLS-HUB route-map MPLS-SPOKE-IN in
neighbor MPLS-HUB route-map MPLS-SPOKE-OUT out
neighbor INET-HUB send-community
neighbor INET-HUB route-map INET-SPOKE-IN in
neighbor INET-HUB route-map INET-SPOKE-OUT out
neighbor 10.0.100.84 activate
neighbor 10.0.100.84 soft-reconfiguration inbound
neighbor 10.0.200.85 activate
neighbor 10.0.200.85 soft-reconfiguration inbound
exit-address-family
!
!
virtual-service csr_mgmt
106
!
ip forward-protocol nd
!
ip bgp-community new-format
ip community-list standard MPLS-HUB1 permit 10:100
ip community-list standard MPLS-HUB2 permit 10:101
ip community-list standard INET-HUB1 permit 10:200
ip community-list standard INET-HUB2 permit 10:201
no ip http server
no ip http secure-server
ip route vrf Mgmt-intf 0.0.0.0 0.0.0.0 10.124.19.1
!
ip access-list extended RC
permit tcp host 10.1.10.2 any
ip access-list extended SMP
permit udp any eq 18000 any eq 19000
!
!
ip prefix-list INET-DMVPN seq 5 permit 0.0.0.0/0
ip prefix-list INET-DMVPN seq 10 permit 10.8.0.0/16
!
ip prefix-list MPLS-DMVPN seq 5 permit 0.0.0.0/0
ip prefix-list MPLS-DMVPN seq 10 permit 10.8.0.0/16
no service-routing capabilities-manager
!
route-map MPLS-SPOKE-OUT deny 10
match ip address prefix-list INET-DMVPN
!
route-map MPLS-SPOKE-OUT permit 20
!
route-map INET-SPOKE-OUT deny 10
match ip address prefix-list MPLS-DMVPN
!
route-map INET-SPOKE-OUT permit 20
!
route-map MPLS-SPOKE-IN permit 5
match ip address prefix-list MPLS-DMVPN
set local-preference 201
!
route-map MPLS-SPOKE-IN permit 10
match community MPLS-HUB1
set local-preference 201
!
route-map MPLS-SPOKE-IN permit 20
match community MPLS-HUB2
set local-preference 200
!
route-map INET-SPOKE-IN permit 5
match ip address prefix-list MPLS-DMVPN
set local-preference 151
!
route-map INET-SPOKE-IN permit 30
match community INET-HUB1
set local-preference 151
!
route-map INET-SPOKE-IN permit 40
match community INET-HUB2
set local-preference 150
!
!
!
control-plane
!
!
line con 0
107
exec-timeout 0 0
stopbits 1
line vty 0 4
exec-timeout 0 0
privilege level 15
no login
line vty 5 15
exec-timeout 0 0
privilege level 15
no login
!
ntp source Loopback0
ntp server 10.8.3.3
!
end
108
!
!
!
!
!
!
!
no ip domain lookup
!
!
!
!
!
!
!
!
!
!
subscriber templating
!
multilink bundle-name authenticated
!
domain one
vrf default
border
source-interface Loopback0
master local
master branch
source-interface Loopback0
hub 10.8.3.3
!
!
license udi pid CSR1000V sn 9YRYPG7XWOA
license boot level ax
spanning-tree extend system-id
!
!
redundancy
mode none
!
!
!
!
!
!
ip ftp source-interface GigabitEthernet1
ip ftp username mgcusr
ip ftp password mgcusr
ip tftp source-interface GigabitEthernet1
!
crypto keyring DMVPN-KEYRING1
pre-shared-key address 0.0.0.0 0.0.0.0 key cisco123
crypto keyring DMVPN-KEYRING2 vrf INET2
pre-shared-key address 0.0.0.0 0.0.0.0 key cisco123
!
!
!
!
!
crypto isakmp policy 10
encr aes
authentication pre-share
109
110
111
112
113