Troubleshoot Hardware Forwarding Issues
Troubleshoot Hardware Forwarding Issues
Introduction
Prerequisites
Requirements
Components Used
Background Information
Troubleshoot
Troubleshoot ELAM on F3 Series Modules without Breakout Cables
Troubleshoot ELAM on F3 Series Modules with Breakout Cables
Introduction
This document describes how to troubleshoot hardware forwarding issues on F3 Series modules
for Cisco Nexus 7000 Series switches.
Prerequisites
Requirements
Cisco recommends that you have a familiarity with the Cisco Nexus Operating System (NX-OS)
and basic Nexus architecture before you proceed with the information that is described in this
document.
Components Used
The information in this document is based on these software and hardware versions:
● Cisco N7K F3 Series modules (N7K-F312FQ-25, 12-Port 10/40 Gigabit Ethernet modules)
Background Information
This document focuses primarily on some of the built-in tools that are used for hardware
troubleshooting when you have exhausted your software part of the forwarding table or control
plane. One such tool is the Embedded Logic Analyzer Module (ELAM), which is an Application-
Specific Integrated Circuit (ASIC) that captures a single packet and shows how the ingress packet
appears on the Data BUS (DBUS) and the Result BUS (RBUS) after forwarding.
The ASIC is embedded within the forwarding pipeline, and it can capture a packet in real-time
without disruptions to performance or control-plane resources. This helps to answer questions
such as:
● How does the packet appear (Layer 2 (L2) or Layer 4 (L4) data)?
Troubleshoot
This section describes how to troubleshoot ELAM on an F3 Series module in deployments that do
not involve the use of a breakout cable, as well as the deployments that do use breakout cables.
This is the topology that is used for the examples throughout this section:
● Pings are sent from the N7K2 VLAN 10 interface to a remote IP address of 192.168.12.1.
● An N7K-F312FQ-25 is used, which is a 12-Port 10/40 Gigabit Ethernet module inserted into
Slot 3.
Before you begin to troubleshoot your system, you should confirm the basic connectivity:
!--- The next command verifies the Address Resolution Protocol (ARP) for the next hop.
!--- This command output shows the MAC learning on the Sup (software).
Legend:
* - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC
age - seconds since last seen,+ - primary entry using vPC Peer-Link,
(T) - True, (F) - False
VLAN MAC Address Type age Secure NTFY Ports/SWID.SSID.LID
---------+-----------------+--------+---------+------+----+------------------
* 10 e4c7.2210.a142 dynamic 120 F F Po1
This output shows the MAC learning on the module/hardware; however, in order to know the
interface, you must convert the index:
| TR| NT| RM| RMA| Cap| Fld|Always| PV | RD| NN| UC|PI_E8| VIF | SWID| SSWID| LID |
| AP| FY| | |ture| | Learn| | | | | | | | | |
|---|---|---|----|----|----|------|----|---|---|---|-----|-----|-----|------|-------|
0 0 0 0 0 0 0 0x00 0 0 1 0 0x000 0x000 0x000 0x00a2a
!--- This is the index that was received in the previous output.
---SNIP---
---SNIP---
Enter these commands in order to obtain the Virtual Device Context (VDC) number (in this
example, it is 3) and check the MAC directly on the module:
---SNIP---
module-3#attach module 3
module-3# vdc 3
VDC = 3
Before you send the ping, you should have knowledge of the hardware buildup. Complete these
steps in order to understand the buildup:
2 0 0 0 0 0
3 1 1 1 1 0
4 1 1 1 1 0
5 0 2 2 2 2 0
6 0 2 2 2 2 0
7 1 3 3 3 3 0
8 1 3 3 3 3 0
9 4 4 4 4 0
10 4 4 4 4 0
11 5 5 5 5 0
12 5 5 5 5 0
+-----------------------------------------------------------------------+
+-----------------------------------------------------------------------+
3. Select the instance, set the trigger, and begin the capture. It is important to understand,
however, that there are many options that can be used with the ELAM trigger:
-----SNIP-----These two options are important if you want to include the DBUS in the
capture (the packet that is received by the switch). This is the raw packet that is not
subjected to a lookup. The RBUS shows the lookup results in the hardware for a DBUS. For
a complete ELAM and analysis, you must capture both the RBUS and the DBUS.
The next output shows the types of packets that you can capture with the DBUS option. In
this example, the Internet Protocol Version 4 (IPv4) packet is selected:
if If Trigger Condition
ingress Ingress packets
module-3(fln-l2-elam)# stat
ELAM Slot 3 instance 0: L2 DBUS Configuration: trigger dbus ipv4 ingress if
source-ipv4-address 192.168.12.2 destination-ipv4-address 192.168.13.3
L2 DBUS: Configured
ELAM Slot 3 instance 0: L2 RBUS Configuration: trigger rbus ingress if trig
L2 RBUS: Configured
module-3(fln-l2-elam)# start
module-3(fln-l2-elam)# status
!--- The status shows as Armed because the process has begun.
module-3(fln-l2-elam)# status
Printing packet 0
--------------------------------------------------------------------
L2 DBUS PRS MLH IPV4
--------------------------------------------------------------------
label-count : 0x0 mc : 0x0
null-label-valid : 0x0 null-label-exp : 0x0
null-label-ttl : 0x0 lbl0-vld : 0x0
lbl0-eos : 0x0 lbl0-lbl : 0x0
lbl0-exp : 0x0 lbl0-ttl : 0x0
lbl1-exp : 0x0 lbl1-ttl : 0x0
ipv4 : 0x0 ipv6 : 0x0
l4-protocol : 0x1 df : 0x0
mf : 0x0 frag : 0x0
ttl : 0xff l3-packet-length : 0x54
option : 0x0 tos : 0x0
sup-eid : 0x0 header-type : 0x1
error : 0x0 redirect : 0x0
port-id : 0x0 last-ethertype : 0x800
l2-frame-type : 0x0 da-type : 0x0
packet-type : 0x0 l2-length-check : 0x0
ip-da-multicast : 0x0 ip-multicast : 0x0
ip-multicast-control: 0x0 ids-check-fail : 0x0
traceroute : 0x0 outer-cos : 0x0
inner-cos : 0x0 vqi-valid : 0x0
vqi : 0x0 packet-length : 0x66
vlan : 0xa destination-index : 0x0
source-index : 0xa2c bundle-port : 0x0
acos : 0x0 outer-drop-eligibility: 0x0
inner-drop-eligibility: 0x0 sg-tag : 0x0
rbh : 0x0 vsl-num : 0x0
inband-flow-creation-deletion: 0x0 ignore-qoso : 0x0
ignore-qosi : 0x0 ignore-aclo : 0x0
ignore-acli : 0x0 index-direct : 0x0
no-stats : 0x0 dont-forward : 0x0
notify-index-learn : 0x1 notify-new-learn : 0x1
disable-new-learn : 0x0 disable-index-learn : 0x0
dont-learn : 0x0 bpdu : 0x0
ff : 0x0 rf : 0x0
ccc : 0x0 l2 : 0x0
rdt : 0x0 dft : 0x0
dfst : 0x0 status-ce-1q : 0x0
status-is-1q : 0x1 trill-encap : 0x0
mim-valid : 0x0 dtag-ttl : 0x0
dtag-ftag : 0x0 valid : 0x1
erspan-kpa-valid : 0x0 recir-shim-vxlan-src-peer-id: 0x0
vn-valid : 0x0 source-vif : 0x0
destination-vif : 0x0 vn-p : 0x0
sequence-number : 0x6b vl : 0x0
inner-de-valid : 0x0 de-cfi : 0x0
second-inner-cos : 0x0 tunnel-type : 0x0
shim-valid : 0x0
segment-id-valid : 0x0 copp : 0x0
dti-type-vpnid : 0x0 segment-id : 0x0
ib-length-bundle : 0x58000 mlh-type : 0x5
ulh-type : 0x6
source-ipv4-address: 192.168.12.2
destination-ipv4-address: 192.168.13.3
mim-destination-mac-address : 0000.0000.0000
mim-source-mac-address : 0000.0000.0000
destination-mac-address : e4c7.2210.a142
source-mac-address : e4c7.2210.a143
Printing packet 0
--------------------------------------------------------------------
L2 RBUS INGRESS CONTENT
--------------------------------------------------------------------
pad : 0x16764 valid : 0x1
l2-rbus-trigger : 0x1 sequence-number : 0x6b
rit-ipv4-id : 0x0 ipv4-tunnel-encap : 0x0
rit-mpls-rw : 0x0 ml2-ptr : 0x0
ml3-ptr : 0x0 mark : 0x0
result-cap3 : 0x0 di1-v5-delta-length : 0x0
di1-v5-delta-length-plus: 0x0 di1-v4-delta-length : 0x0
di1-v4-delta-length-plus: 0x0 di2-delta-length : 0x0
di2-delta-length-plus: 0x0 ml2-delta-length : 0x0
ml2-delta-length-plus: 0x0 ml3-delta-length : 0x0
ml3-delta-length-plus: 0x0 s-vector : 0x0
lcpu-ff-valid : 0x0 sup-di-vqi : 0x0
erspan-term-index-dir: 0x0 erspan-buffer-check : 0x0
l2-tunnel-decapped : 0x0 l3-delta-length : 0x0
rit-crc16-valid : 0x1 rit-crc16 : 0xf57b
vntag-p : 0x0 frr-recirc : 0x0
ingress-lif : 0x1 earl-proxy-vld : 0x0
md-di-vld : 0x0 rc : 0x0
segment-id-valid : 0x0 ttl-out : 0xfe
ttl-mid : 0xfe tos-out : 0x0
tos-in : 0x0 orig-vlan1 : 0x0
vlan1 : 0x0 source-peer-id : 0x0
final-ignore-qoso : 0x0 port-id : 0x0
cr-type : 0x1 pup-packet : 0x0
bpdu : 0x0 vdc : 0x0
traceroute : 0x0 de : 0x0
cos : 0x0 inner-drop-eligibility: 0x0
inner-cos : 0x0 acos : 0x0
di-ltl-index : 0x50 l3-multicast-di : 0x50
source-index : 0xa2c vlan : 0x0
index-direct : 0x0 di1-valid : 0x1
vqi : 0x50 di2-valid : 0x0
v5-fpoe-idx : 0x0 di2-fpoe-idx : 0x0
l3-multicast-v5 : 0x0 dft : 0x0
dfst : 0x0 l3-learning-ff : 0x0
result-rbh : 0xd0 di2-cr-type : 0x0
result-2 : 0x1 dtag-ftag : 0x0
dtag-ttl : 0x20 mac-in-mac-op : 0x0
dvif : 0x0 result-cap1 : 0x0
result-cap2 : 0x0 erspan-term : 0x0
erspan-decap : 0x0 dont-learn : 0x0
routed-frame : 0x1 copy-cause : 0x0
l2-copy-cause : 0x0 l3-rit-ptr : 0x5b
sg-tag : 0x0 trill-nh-id : 0x0
ttl-in : 0xfe fc-up : 0x0
up-did : 0x0 did : 0xe4c722
up-sid : 0x0 sid : 0x10a144
shim-l2-tunnel-encap: 0x0 shim-ls-hash : 0x8
shim-rc : 0x0 shim-lif : 0x1
shim-replication-pkt: 0x0 shim-router-mac : 0x1
shim-mark-enable : 0x0 shim-qos-group-id : 0x0
shim-destination-table-index: 0x5b shim-acos-preserve : 0x0
mim-destination-mac-address : 0000.0000.0000
mim-source-mac-address : 0000.0000.0000
7. Check the destination index and source index on the Sup:
Member info
------------------
Type LTL
---------------------------------
PORT_CHANNEL Po1
FLOOD_W_FPOE 0x8019
FLOOD_W_FPOE 0x8015
Member info
------------------
Type LTL
---------------------------------
PHY_PORT Eth3/5This output confirms that the packet was received on port channel 1
(Po1) and was forwarded via Eth3/5.
8. Verify the Local Target Logic (LTL) on the module for correct programming:
|[ a2c]| 1| 0| 0| 0| 0|
| RBH | VQI | PS(INST:LPOE)
|----------------------------------
0, 40 0 : 1
1, 40 0 : 1
2, 40 0 : 1
3, 40 0 : 1
4, 44 0 : 10
5, 44 0 : 10
6, 44 0 : 10
7, 44 0 : 10
8, 0 0 : 1
9, 0 0 : 1
a, 0 0 : 1
b, 0 0 : 1
c, 0 0 : 10
d, 0 0 : 10
e, 0 0 : 10
f, 0 0 : 10
|[ 50]| 1| 0| 0| 0| 0|
| RBH | VQI | PS
|----------------------------
ALL RBH| 50 | 2 : 1
9. Capture the ELAM packet upon egress. In order to capture the packet, send a ping reply
from IP address192.168.13.3 to 192.168.12.2. You must set the capture with the egress
keyword on the port channel 1 interfaces (e3/1-2). The interfaces belong to instance 0, as
previously described.
N7K1# att mo 3
Attaching to module 3 ...
To exit type 'exit', to abort type '$.'
module-3# el asic flanker instance 0
module-3(fln-elam)# layer2
module-3(fln-l2-elam)# trigger dbus ipv4 egress if source-ipv4-address 192.168.13.3
destination-ipv4-address 192.168.12.2
module-3(fln-l2-elam)# trigger rbus egress if trig
module-3(fln-l2-elam)# status
ELAM Slot 3 instance 0: L2 DBUS Configuration: trigger dbus ipv4 egress if
source-ipv4-address 192.168.13.3 destination-ipv4-address 192.168.12.2
L2 DBUS: Configured
ELAM Slot 3 instance 0: L2 RBUS Configuration: trigger rbus egress if trig
L2 RBUS: Configured
module-3(fln-l2-elam)# start
module-3(fln-l2-elam)# status
ELAM Slot 3 instance 0: L2 DBUS Configuration: trigger dbus ipv4 egress if
source-ipv4-address 192.168.13.3 destination-ipv4-address 192.168.12.2
L2 DBUS: Armed
ELAM Slot 3 instance 0: L2 RBUS Configuration: trigger rbus egress if trig
L2 RBUS: Armed
module-3(fln-l2-elam)# status
ELAM Slot 3 instance 0: L2 DBUS Configuration: trigger dbus ipv4 egress if
source-ipv4-address 192.168.13.3 destination-ipv4-address 192.168.12.2
L2 DBUS: Triggered
ELAM Slot 3 instance 0: L2 RBUS Configuration: trigger rbus egress if trig
L2 RBUS: Triggered
module-3(fln-l2-elam)#
Printing packet 0
--------------------------------------------------------------------
L2 DBUS PRS MLH IPV4
--------------------------------------------------------------------
label-count : 0x0 mc : 0x0
null-label-valid : 0x0 null-label-exp : 0x0
null-label-ttl : 0x0 lbl0-vld : 0x0
lbl0-eos : 0x0 lbl0-lbl : 0x0
lbl0-exp : 0x0 lbl0-ttl : 0x0
lbl1-exp : 0x0 lbl1-ttl : 0x0
ipv4 : 0x0 ipv6 : 0x0
l4-protocol : 0x1 df : 0x0
mf : 0x0 frag : 0x0
ttl : 0xfe l3-packet-length : 0x54
option : 0x0 tos : 0x0
sup-eid : 0x0 header-type : 0x1
error : 0x0 redirect : 0x0
port-id : 0x1 last-ethertype : 0x800
l2-frame-type : 0x0 da-type : 0x0
packet-type : 0x1 l2-length-check : 0x0
ip-da-multicast : 0x0 ip-multicast : 0x0
ip-multicast-control: 0x0 ids-check-fail : 0x0
traceroute : 0x0 outer-cos : 0x0
inner-cos : 0x0 vqi-valid : 0x1
vqi : 0x40 packet-length : 0x66
vlan : 0xa destination-index : 0xa2c
source-index : 0x50 bundle-port : 0x0
acos : 0x0 outer-drop-eligibility: 0x0
inner-drop-eligibility: 0x0 sg-tag : 0x0
rbh : 0xd2 vsl-num : 0x0
inband-flow-creation-deletion: 0x0 ignore-qoso : 0x0
ignore-qosi : 0x0 ignore-aclo : 0x0
ignore-acli : 0x0 index-direct : 0x0
no-stats : 0x0 dont-forward : 0x0
notify-index-learn : 0x1 notify-new-learn : 0x0
disable-new-learn : 0x0 disable-index-learn : 0x0
dont-learn : 0x0 bpdu : 0x0
ff : 0x0 rf : 0x1
ccc : 0x4 l2 : 0x0
rdt : 0x0 dft : 0x0
dfst : 0x0 status-ce-1q : 0x0
status-is-1q : 0x0 trill-encap : 0x0
mim-valid : 0x0 dtag-ttl : 0x0
dtag-ftag : 0x0 valid : 0x1
erspan-kpa-valid : 0x0 recir-shim-vxlan-src-peer-id: 0x0
vn-valid : 0x0 source-vif : 0x0
destination-vif : 0x0 vn-p : 0x0
sequence-number : 0x8d vl : 0x3
inner-de-valid : 0x0 de-cfi : 0x0
second-inner-cos : 0x0 tunnel-type : 0x0
shim-valid : 0x0
segment-id-valid : 0x0 copp : 0x0
dti-type-vpnid : 0x0 segment-id : 0x0
ib-length-bundle : 0x0 mlh-type : 0x5
ulh-type : 0x6
source-ipv4-address: 192.168.13.3
destination-ipv4-address: 192.168.12.2
mim-destination-mac-address : 0000.0000.0000
mim-source-mac-address : 0000.0000.0000
destination-mac-address : e4c7.2210.a143
source-mac-address : e4c7.2210.a142As shown, both the source and destination indexes are a
part of the DBUS (unlike that shown in the ingress capture).
Printing packet 0
--------------------------------------------------------------------
L2 RBUS EGRESS CONTENT
--------------------------------------------------------------------
pad : 0x0 valid : 0x1
trig : 0x1 reserved : 0x0
vn-tag-p : 0x0 cbl-vlan-valid : 0x0
vft-hop-count : 0x0 vft-vsan : 0x0
vft-up : 0x0 vft-valid : 0x0
copp : 0x0 segment-id-valid : 0x0
segment-id-23 : 0x0 vsl-num : 0x0
inner-cos : 0x0 inner-drop-eligibility: 0x0
cos : 0x0 drop-eligibility : 0x0
dce-mode : 0x0 flood-to-bd : 0x0
pt-bit-en : 0x1 cpu-port : 0x0
vlan-id : 0xa ip-tos : 0x0
result-rbh : 0x1 met-ptr : 0x2000
packet-type : 0x1 sg-tag : 0x0
dtag-ftag : 0x0 vdc : 0x0
vn-tag-src-vif : 0x0 vn-tag-dst-vif : 0x0
vn-tag-l : 0x0 dc3-tr : 0x0
vl : 0x0 sequence-number : 0x8d
destination-mac-valid: 0x0
source-mac-valid: 0x0
mim-destination-mac-address : 0000.0000.0000
destination-mac-address : e4c7.2210.a143
source-mac-address : e4c7.2210.a142
mim-source-mac-address : 0000.0000.0000Thesource and destination IP addresses are correct,
as decoded after the ingress ELAM packet capture; however, the direction is definitely
opposite when compared to the ingress ELAM, as the return traffic is captured.
10. Check the Color-Based Logic (CBL) for module 3 of port channel 1 on N7K1 in order to
determine whether VLAN 10 forwards traffic across it. The CBL is a per-physical interface
based logic, so you should enter the member interface number of port channel 1 on N7K1,
not the port channel number. In the next output, you can see that VLAN 10 forwards it as
expected.
The CBL is used in order to determine the Spanning Tree Protocol (STP) state of a port
within the hardware. It is possible that the interface shows the forwarding when you check
the STP for a VLAN on the Sup, but the module blocks the traffic. Note: You must check
the CBL individually for both of the member interfaces (e3/1 and e3/2).module-3# show
hardware internal mac port 1 table cbl vlan
--------------------------------------------------------------------------------
| INGRESS |
| Disabled State | 0,2-9,11-4031,4036-4095 |
| Forwarding State | 1,10,4032-4035 |
| Blocked State | |
| Learning State | |
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
| EGRESS |
| Disabled State | 0,2-9,11-4031,4036-4095 |
| Forwarding State | 1,10,4032-4035 |
| Blocked State | |
| Learning State | |
--------------------------------------------------------------------------------Note:
The previous command is for port channel 1 (module 3 is on e3/1).module-3# show hardware
internal mac port 2 table cbl vlan
--------------------------------------------------------------------------------
| INGRESS |
| Disabled State | 0,2-9,11-4031,4036-4095 |
| Forwarding State | 1,10,4032-4035 |
| Blocked State | |
| Learning State | |
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
| EGRESS |
| Disabled State | 0,2-9,11-4031,4036-4095 |
| Forwarding State | 1,10,4032-4035 |
| Blocked State | |
| Learning State | |
--------------------------------------------------------------------------------Note:
Similarly, this command checks the CBL for port channel 2 (e3/2).
The ELAM procedure for an F3 Series module when a breakout cable is connected does not differ
from the ELAM procedures on a regular module port. However, there are some changes in
regards to the verification of the Port Index Manager (PIXM) during attempts to convert the index
to the front panel number, in which case the interfaces are received from the breakout cable.
Here is the topology that is used for the examples throughout this section:
---------------------------------------------------------------
Ethernet VLAN Type Mode Status Reason Speed Port
Interface Ch #
---------------------------------------------------------------
Eth3/7 -- eth routed up none 40G(D) --
Eth3/8/1 1 eth trunk up none 10G(D) 2
version 6.2(8a)
interface Ethernet3/8/1
switchport
switchport mode trunk
switchport trunk allowed vlan 10,20
no shutdown
interface Ethernet3/8/2
switchport
switchport mode trunk
switchport trunk allowed vlan 30,40
no shutdown
interface Ethernet3/8/3
switchport
switchport mode trunk
switchport trunk allowed vlan 50
no shutdown
interface Ethernet3/8/4
switchport
switchport mode trunk
no shutdown
Begin the packet capture from the N7K3 Switched Virtual Interface (SVI) 20 IP address
(192.168.20.3) to the 4500 SVI 20 IP address (192.168.20.1). The packet will be captured on
N7K3 upon egress to 4500, and the reply is sent from 4500 to N7K3.
As described in the previous section, you must have knowledge of the flanker instance in order to
apply the trigger. This output shows the attachment of module 3:
9 4 4 4 4 0
10 4 4 4 4 0
11 5 5 5 5 0
12 5 5 5 5 0
+-----------------------------------------------------------------------+
+-----------------------------------------------------------------------+
In this output, port 8 is on flanker instance 3. Now that you know the instance, you can place the
trigger via the source and destination IP addresses. Because you will capture the ping request
from N7K3 to 4500, it will be an egress ELAM.
9 4 4 4 4 0
10 4 4 4 4 0
11 5 5 5 5 0
12 5 5 5 5 0
+-----------------------------------------------------------------------+
+-----------------------------------------------------------------------+
The ping is initiated from N7K3 to 4500:
module-3(fln-l2-elam)# status
ELAM Slot 3 instance 3: L2 DBUS Configuration: trigger dbus ipv4 egress if
source-ipv4-address 192.168.20.3 destination-ipv4-address 192.168.20.1
L2 DBUS: Triggered
ELAM Slot 3 instance 3: L2 RBUS Configuration: trigger rbus egress if trig
L2 RBUS: Triggered
Verify that the sequence numbers are the same:
Printing packet 0
--------------------------------------------------------------------
L2 DBUS PRS MLH IPV4
--------------------------------------------------------------------
label-count : 0x0 mc : 0x0
null-label-valid : 0x0 null-label-exp : 0x0
null-label-ttl : 0x0 lbl0-vld : 0x0
lbl0-eos : 0x0 lbl0-lbl : 0x0
lbl0-exp : 0x0 lbl0-ttl : 0x0
lbl1-exp : 0x0 lbl1-ttl : 0x0
ipv4 : 0x0 ipv6 : 0x0
l4-protocol : 0x1 df : 0x0
mf : 0x0 frag : 0x0
ttl : 0xff l3-packet-length : 0x54
option : 0x0 tos : 0x0
sup-eid : 0x1 header-type : 0x0
error : 0x0 redirect : 0x0
port-id : 0x5 last-ethertype : 0x800
l2-frame-type : 0x0 da-type : 0x0
packet-type : 0x1 l2-length-check : 0x0
ip-da-multicast : 0x0 ip-multicast : 0x0
ip-multicast-control: 0x0 ids-check-fail : 0x0
traceroute : 0x0 outer-cos : 0x0
inner-cos : 0x0 vqi-valid : 0x1
vqi : 0x82 packet-length : 0x66
vlan : 0x14 destination-index : 0x82
source-index : 0x400 bundle-port : 0x0
acos : 0x0 outer-drop-eligibility: 0x0
inner-drop-eligibility: 0x0 sg-tag : 0x0
rbh : 0x0 vsl-num : 0x0
inband-flow-creation-deletion: 0x0 ignore-qoso : 0x0
ignore-qosi : 0x0 ignore-aclo : 0x0
ignore-acli : 0x0 index-direct : 0x1
no-stats : 0x0 dont-forward : 0x0
notify-index-learn : 0x0 notify-new-learn : 0x0
disable-new-learn : 0x0 disable-index-learn : 0x0
dont-learn : 0x1 bpdu : 0x0
ff : 0x0 rf : 0x0
ccc : 0x0 l2 : 0x0
rdt : 0x0 dft : 0x0
dfst : 0x0 status-ce-1q : 0x0
status-is-1q : 0x0 trill-encap : 0x0
mim-valid : 0x0 dtag-ttl : 0x0
dtag-ftag : 0x0 valid : 0x1
erspan-kpa-valid : 0x0 recir-shim-vxlan-src-peer-id: 0x0
vn-valid : 0x0 source-vif : 0x0
destination-vif : 0x0 vn-p : 0x0
sequence-number : 0x27 vl : 0x3
inner-de-valid : 0x0 de-cfi : 0x0
second-inner-cos : 0x0 tunnel-type : 0x0
shim-valid : 0x0
segment-id-valid : 0x0 copp : 0x0
dti-type-vpnid : 0x0 segment-id : 0x0
ib-length-bundle : 0x0 mlh-type : 0x5
ulh-type : 0x6
source-ipv4-address: 192.168.20.3
destination-ipv4-address: 192.168.20.1
mim-destination-mac-address : 0000.0000.0000
mim-source-mac-address : 0000.0000.0000
destination-mac-address : f07f.061c.cb7f
source-mac-address : e4c7.2210.a144
module-3(fln-l2-elam)#
module-3(fln-l2-elam)#
module-3(fln-l2-elam)#
module-3(fln-l2-elam)# show rbus
cp = 0x10134d38, buf = 0x10134d38, end = 0x10141088
--------------------------------------------------------------------
Flanker Instance 03 - Capture Buffer On L2 RBUS:
Status(0x1102), TriggerWord(0x000), SampleStored(0x008),CaptureBufferPointer(0x000)
Printing packet 0
--------------------------------------------------------------------
L2 RBUS EGRESS CONTENT
--------------------------------------------------------------------
pad : 0x0 valid : 0x1
trig : 0x1 reserved : 0x0
vn-tag-p : 0x1 cbl-vlan-valid : 0x0
vft-hop-count : 0x0 vft-vsan : 0x0
vft-up : 0x0 vft-valid : 0x0
copp : 0x0 segment-id-valid : 0x0
segment-id-23 : 0x0 vsl-num : 0x0
inner-cos : 0x0 inner-drop-eligibility: 0x0
cos : 0x0 drop-eligibility : 0x0
dce-mode : 0x0 flood-to-bd : 0x0
pt-bit-en : 0x20 cpu-port : 0x0
vlan-id : 0x14 ip-tos : 0x0
result-rbh : 0x2 met-ptr : 0x4000
packet-type : 0x1 sg-tag : 0x0
dtag-ftag : 0x0 vdc : 0x0
vn-tag-src-vif : 0x0 vn-tag-dst-vif : 0x0
vn-tag-l : 0x0 dc3-tr : 0x0
vl : 0x0 sequence-number : 0x27
destination-mac-valid: 0x0
source-mac-valid: 0x0
mim-destination-mac-address : 0000.0000.0000
destination-mac-address : f07f.061c.cb7f
source-mac-address : e4c7.2210.a144
mim-source-mac-address : 0000.0000.0000
Convert the destination and source indexes into front panel ports in order to confirm the flow:
Member info
------------------
Type LTL
---------------------------------
PHY_PORT Eth3/8/1
FLOOD_W_FPOE 0x8039
FLOOD_W_FPOE 0x803f
Verify the CBL for the ports that have been created with the breakout cable on the N7K. In order to
check the CBL, you must have the hardware port numbers for all of the newly-formed ports.
Note: The interface e3/8 does not exist on the switch. Only the newly-formed ports appear.
N7K3# show interface e3/8
^
% Incomplete command at '^' marker.
N7K3#
Because the breakout cable is used and the e3/8 interface is non-existent on the switch, the
calculation that is used in order to obtain the hardware port number changes. For any module that
supports breakout, the hardware port numbering is different. You should first check whether a port
supports breakout:
Since the F3 Series module in this example has 40-Gigabit ports, and each port can be broken
into four ports each, the hardware port numbers for each port is 0-3, 4-7, 8-11...40-43, 44-47 on a
zero-based scale. If you have a breakout cable on a port for the first example, then its hardware
port numbering will be 0, 1, 2 and 3. If you do not have a breakout cable, then its hardware port
numbering will be 0 (1, 2, and 3 will not be active).
As the parent port is e3/8, its hardware port number will be 28 if it is used without the breakout
cable, and it will be 28, 29, 30, and 31 if it is used with the breakout cable. This command output
shows the active hardware ports (zero based):
!--- This is context sensitive, so it helps to say the port number is 1-based.
Here is the running configuration for Ethernet interface 3/8/1 in order to check and confirm the
VLAN forwarding state:
!--- This is context sensitive, so it helps to say the port number is 1-based.module-3# show
hardware internal mac port 29 table cbl vlan
--------------------------------------------------------------------------------
| INGRESS |
| Disabled State | 0,2-9,11-19,21-4031,4036-4095 |
| Forwarding State | 10,20,4032-4035 |
| Blocked State | 1 |
| Learning State | |
--------------------------------------------------------------------------------
--------------------------------------------------------------------------------
| EGRESS |
| Disabled State | 0,2-9,11-19,21-4031,4036-4095 |
| Forwarding State | 10,20,4032-4035 |
| Blocked State | 1 |
| Learning State | |
--------------------------------------------------------------------------------
Here is the running configuration for Ethernet interface 3/8/2 in order to check and confirm the
VLAN forwarding state:
Instance:2
Cntr Name Value Ports
----- ---- ----- -----
423 igr in upm: pkts with symbol/sequence error rcvd 0000000000000478 18 -
455 igr in upm: pkts with symbol/sequence error rcvd 0000000000000478 17 -
487 igr in upm: pkts with symbol/sequence error rcvd 0000000000000478 19 -
519 igr in upm: pkts with symbol/sequence error rcvd 0000000000000478 20 -
Instance:3
Cntr Name Value Ports
----- ---- ----- -----
423 igr in upm: pkts with symbol/sequence error rcvd 0000000000000745 26 -
455 igr in upm: pkts with symbol/sequence error rcvd 0000000000000745 25 -
487 igr in upm: pkts with symbol/sequence error rcvd 0000000000000745 27 -
519 igr in upm: pkts with symbol/sequence error rcvd 0000000000000745 28 -
550 igr in upm: pkts rcvd, with RCODE violation 0000359810913821 30 -
551 igr in upm: pkts with symbol/sequence error rcvd 0000425092490108 30 -
552 igr in upm: pkts with error 0000000000176136 30 -
582 igr in upm: pkts rcvd, with RCODE violation 0000000000292641 29 -
583 igr in upm: pkts with symbol/sequence error rcvd 0000000000114014 29 -
614 igr in upm: pkts rcvd, with RCODE violation 0000133362265995 31 -
615 igr in upm: pkts with symbol/sequence error rcvd 0000146701474013 31 -
616 igr in upm: pkts with error 0000000000157479 31 -
646 igr in upm: pkts rcvd, with RCODE violation 0000000002160959 32 -
647 igr in upm: pkts with symbol/sequence error rcvd 0000000003722562 32 -
648 igr in upm: pkts with error 0000000000000002 32 -