Upload
emily-ramsey
View
37
Download
0
Embed Size (px)
DESCRIPTION
Carlos Nivon. Cisco Catalyst 6500 Series Switches:. Comunidad de Sopórte de Cisco – Webcast en vivo. Carlos Nivón. Gracias por su asistencia el día de hoy. La presentación incluirá algunas preguntas a la audiencia. - PowerPoint PPT Presentation
Citation preview
© 2006, Cisco Systems, Inc. CAT6KS v2.0—2-1
Cisco Catalyst 6500 Series Switches:
Carlos Nivon
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-2
Comunidad de Sopórte de Cisco – Webcast en vivo
Carlos Nivón
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-3
La presentación incluirá algunas preguntas a la audiencia.
Le invitamos cordialmente a participar activamente en las preguntas que le haremos durante la sesión
Gracias por su asistencia el día de hoy
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-4
Copia de la presentación
Si desea bajar una copia de la presentación de hoy, vaya a la liga indicada en el chat o use ésta dirección
https://supportforums.cisco.com/docs/DOC-28341
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-5
Chassis Overview
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-6
Cat 6500 slot Orientation
Vertically Aligned Slots
Horizontally Aligned Slots
6503
6506
6509
6509-NEBS(EOS)
65136509-NEBS-A
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-7
Supervisors, Line cards and
other Modules
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-8
Supervisor Engine 32
Supervisor 32
Access Layer
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-9
Supervisor Engine 720
Switch Fabric
Supervisor 720 with Integrated Switch Fabric
Core Layer
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-10
Ethernet and WAN Line Cards
10/100 TX and 100 Fiber 10/100/1000 TX GE SFP
GE GBIC 10GE Inline Power
OSM FlexWAN SIP
Ethernet Line Cards
WAN Line Cards
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-11
Advanced Services Modules
Firewall ModuleIPSec VPN Shared Port
AdapterIntrusion Detection SSL
CSM CSM-S
Security
Application Networking Services
ACE
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-12
CSG
Advanced Services Modules (Cont.)
IP Telephony
Wireless ServicesWLSM MWAM
CMM T1/E1 Services Modules
CMM
NAM and NAM2 TAD
Network Monitoring
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-13
Catalyst 6500 Backplane Architecture
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-14
Classic 32-Gbps Shared-Bus Backplane
32-Gbps Shared Switching Bus
Multilayer Forwarding
Table
Line Card
PFC Switching System
Multilayer Switch Feature
Card
Fabric Arbitration
Network MGMTNMP/MCP
Supervisor Engine
BusASIC
PortASIC
Local Buffer
Port or BusASIC
Local Buffer
10/100 Ethernet Gigabit Ethernet
Control BusResults Bus
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-15
Crossbar Switch Fabric
Multilayer Forwarding
Table
PFC Switching System
Multilayer Switch Feature
Card
Fabric Arbitration
Network MGMTNMP/MCP
Supervisor Engine 720
CROSSBAR
FabricASIC
1 x 20 Gbps
1 x 20 Gbps
1 x 8 Gbps
1 x 8 Gbps
1 x 8 Gbps
Port ASIC
Port ASIC
Port ASIC
Port ASIC
Fabric ASIC
Fabric ASIC
Fabric ASIC
Fabric ASIC
Port ASIC
CEF256
dCEF256
CEF720
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-16
Crossbar Switch Fabric Layout Nine-Slot Chassis
Slot1 Slot2 Slot3 Slot4
Slot7 Slot8 Slot9
Slot 5
Fabric ASIC Fabric ASIC Fabric ASIC Fabric ASIC
Fabric ASIC Fabric ASIC Fabric ASIC
Slo
t5
Fa
bric
AS
IC
Slo
t6
Fa
bric
AS
IC
Slot 6
= Fabric (SFM/Sup)
= Line Card
Type of card in slot:
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-17
Crossbar Switch Fabric 13-Slot Chassis
Slo
t7
Fa
bric
AS
IC
Slo
t8
Fa
bric
AS
IC
Slot2 Slot3 Slot4 Slot5 Slot6Slot1Fabric ASIC
Slot9 Slot10 Slot11 Slot12 Slot13
Fabric ASIC Fabric ASIC Fabric ASIC Fabric ASIC Fabric ASIC
Fabric ASIC Fabric ASIC Fabric ASIC Fabric ASIC Fabric ASIC
Slot 7
Slot 8
= Fabric (SFM/Sup)
= Line Card
Type of card in slot:
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-18
Introducing the Shared Bus and Switch Fabric Architectures
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-19
CEF Forwarding Architectures
dCEF
• Hardware-based distributed forwarding• dCEF engine has a copy of the entire
forwarding table at the line card• All traffic is switched at a sustained 48
Mpps (for DFC3 on CEF720)
CEF
• Hardware-based centralized forwarding• PFC on supervisor makes all forwarding
decisions• Handles centralized forwarding up to 30
Mpps
Features of CEF forwarding architectures include the following:
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-20
Supervisor Engine 720 Switch-Fabric Connectivity
Supervisor Engine 720
Classic Series
20
20
z
CEF720 Series
OptionalDFC3
88
8
30 to 400 Mpps Forwarding Performance
dCEF720 Series
IntegratedDFC3
IntegratedDFC3
dCEF256 Series
20
Integrated Switch Fabric
Routing TableMSFC3
PFC3
20
20
Hardware Fwd Tables
32-Gbps Switching Bus
CEF256 Series
OptionalDFC3
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-21
Supervisor Engine 32
Supervisor Engine 32 with Eight GE Uplinks
WS-SUP32-GE-3BSupervisor Engine 32 with Two
10-GE Uplinks
WS-SUP32-10GE-3B
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-22
Supervisor Engine 32: Front Panel
RS-232Console Port
Compact FlashSlot
8 x SFP based GE Uplink Ports
1 x 10/100/1000 GEUplink Port
2 x USB Ports
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-23
Integrated PFC3
Supervisor Engine 32
PFC3B
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-24
Integrated MSFC2a
Supervisor Engine 32
MSFC2a
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-25
Supervisor Engine 32 Line Card Compatibility
Architecture Supported?
Classic YES
CEF256 YES
dCEF256 NO
CEF720 NO
dCEF720 NO
SFM/SFM2 NO
Services Modules
YES
Any DFC NO
OSM* YES
SIP YES
FlexWAN YES
*OSM: Original Storage Manufacturer
Supervisor Engine 32
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-26
Supervisor Engine 720 Overview
Removable Storage Slots
Console Port Uplink Ports
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-27
Supervisor Engine 720 Options
Supervisor Engine 720-3B Supervisor Engine 720-3BXL
Incorporates new PFC3B to provide the same features as the XL version but not
as high a capacity for routes and flow information
Incorporates new PFC3BXL, extending
hardware features and system capacity for routes
and flow information
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-28
Catalyst 6500 Supervisor Engine 720 PFC Options
Name PFC3A PFC3B PFC3B-XL
Routes 256,000 256,000 1 million
Number of ACLs 512 4000 4000
NetFlow Entries 128,000 (64,000) 128,000 (115,000) 256,000 (230,000)
ACE Counters No Yes Yes
MPLS No Yes Yes
Default MemorySP 512 MB + RP 512
MBSP 512 MB + RP 512
MBSP 1 GB + RP 1
GB
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-29
Supervisor Engine 720 Switch Fabric
Switch Fabric
• Integrated 720-Gbps switch fabric.
• CEF256 and dCEF256 connect in at 8 Gbps per fabric channel.
• CEF720 and dCEF720 connect in at 20 Gbps per fabric channel.
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-30
Supervisor Engine 720 Hardware Features
IPv6 Hardware Features128,000 FIB entriesIPv6 load sharing up to 16 pathsEtherChannel hash across 48 bitsIPv6 policing/NetFlow/classificationSTD and EXT V6 ACLsIPv6 QoS lookupsIPv6 multicastIPv6-to-IPv4 TunnelingIPv6 edge over MPLS (6PE)
IPv6 Software Features
IPv6 addressingICMP for IPv6DNS for IPv6V6 MTU path discoverySSH for IPv6IPv6 TelnetIPv6 traceroutedCEF for IPv6RIP for IPv6IS-IS for IPv6OSPF v3 for IPv6BGP for IPv6
IPv6 function locatedon PFC3
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-31
MPLS Hardware Features
MPLS HARDWARE FEATURES
Up to 1000 MPLS VPNsMPLS VPN (RFC 2457) on any Ethernet portMPLS multicast VPNMPLS label switch router (LSR)MPLS label edge router (LER)MPLS Traffic Engineering (TE)MPLS Ethernet over MPLS (EoMPLS) on PFC3BDSCP-to-EXP mapping
MPLS function locatedon PFC3
MPLS applies to any Ethernet port on the following line cards:
Classic Ethernet Line Cards
CEF256 Ethernet Line Cards
dCEF256 Ethernet Line Cards
CEF720 Ethernet Line Cards
dCEF720 Ethernet Line Cards
© 2006, Cisco Systems, Inc. CAT6KS v2.0—2-32
Catalyst 6500 Architecture Overview
Catalyst 6500 Line Cards
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-33
Catalyst 6500 Line Cards
10/100BASE-TX and100BASE-FX
10/100/1000BASE-TX Gigabit Ethernet SFP
GE GBIC 10GE WAN
Optical Services Modules In-line Power SIP
CATALYST
6500
LINE
CARDS
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-34
Classic and Crossbar Switch Fabric Line Cards
Classic CEF256
Shared Bus Connector
Crossbar Connector
Shared Bus Connector
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-35
Line Card Types
32-Gbps Shared Bus
Switch Fabric Crossbar
Supervisor
ClassicLine Cards
CEF256Line Cards
8
8 8
dCEF720Line Cards
20 20
20 20
CEF720Line Cards
dCEF256Line Cards
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-36
Classic Line Card Architecture
Classic line cards support a connection to the 32- Gbps shared bus only.
Buffer Buffer Buffer
10/100 ASIC
Buffer
Ports 1–12 Ports 13–24 Ports 25–36 Ports 37–48
10/100 ASIC10/100 ASIC10/100 ASIC
32-Gbps Shared Bus
Gigabit Ethernet ASIC
48-Port 10- and 100-MBps Line Card
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-37
CEF256 Line Card ArchitectureCrossbar
32-Gbps Shared Bus
8
Optional DFCDaughter Card
Port ASIC
FabricASIC
512-KB Buffer
Port ASIC
512-KB Buffer
Port ASIC
512-KB Buffer
Port ASIC
512-KB Buffer
32 Gbps Local Switching Bus
Ports 1–4 Ports 5–8 Ports 9–12 Ports 13–16
CEF256 line cards support a connection to the 32-Gbps shared bus and an 8-Gbps connection to the switch fabric.
16-Port Gigabit Ethernet Line Card
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-38
dCEF256 Line Card Architecture
8
Port ASIC
Fabric ASIC
512-KB Buffer
Port ASIC
512-KB Buffer
Port ASIC
512-KB Buffer
Port ASIC
512-KB Buffer
32-Gbps Local Bus
8
Fabric ASIC Integrated DFC and DFC3
32-Gbps Local Bus
Ports 1–4 Ports 5–8 Ports 9–12 Ports 13–16
16-Port Gigabit Ethernet Line Card
dCEF256 line cards support two 8-Gbps connections to the switch fabric only.
Crossbar
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-39
CEF720 Line Card Architecture
20
Port ASIC Port ASIC Port ASIC Port ASIC
20
Crossbar
Ports 1–12 Ports 13–24 Ports 25–36 Ports 37–48
FabricASIC
FabricASIC
32-Gbps Shared Bus
48-Port Gigabit Ethernet Line Card
Optional DFC3Daughter Card
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-40
dCEF720 Line Card Architecture
20
Port ASIC Port ASIC Port ASIC Port ASIC
20
Crossbar
IntegratedDFC
Ports 1–12 Ports 13–24 Ports 25–36 Ports 37–48
FabricASIC
FabricASIC
48-Port Gigabit Ethernet Line Card
dCEF720 line cards support two 20-Gbps connections to the switch fabric only.
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-41
Line Card Packet Flow
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-42
Classic-to-Classic Centralized Forwarding
SupervisorEngine 720
PFC3
Layer 3 and Layer 4Engine
DBUSRBUS
ClassicModule A
PortASIC
ClassicModule B
Layer 2 Engine
PortASIC
SBlue
D
PortASIC
Red
PortASIC
1
2 3
4
Source
Destination
Blue VLAN
Red VLAN
Entire Packet
Packet Header
D
S
720-Gbps SwitchFabric
XX
X
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-43
CEF256-to-CEF256 Centralized Forwarding
SupervisorEngine 720
PFC3
Layers 3 and4 Engine
DBUSRBUS
CEF256Module A
8Gbps
LCDBUSLCRBUS
PortASIC
PortASIC
LCRBUS
LCDBUS
CEF256Module B
FabricInterface
8Gbps
L2 Engine
PortASIC
FabricInterface
720-Gbps SwitchFabric
SBlue
D
PortASIC
2
3
5
6
Source
Destination
Blue VLAN
Red VLAN
Entire packet
Packet header
D
S
1
4
XXNote: Packet flow for a CEF256-to-CEF720 is similar.
The main differences are the CEF720 module architecture and the speed of the fabric channel to the CEF720 module.
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-44
CEF720 and DFC3-to-CEF720 and DEFC3 Distributed Forwarding
DFC3 Layers 3 and 4
Engine
CEF720Module B
and DFC3
PortASIC
Supervisor Engine 720
PFC3
CEF720Module A
and DFC3
Layers 3 and4 Engine
DFC3
Layer 2Engine
Layer 2Engine
Fabric Interface and Replication
Engine
720-Gbps SwitchFabric
20Gbps
20
Gb
ps
S
DRed
Blue
Fabric Interface and Replication
Engine
PortASIC
1
2
3
4
5
PortASIC
PortASIC
Source
Destination
Blue VLAN
Red VLAN
Entire Packet
Packet Header
D
S
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-45
Catalyst 6500 Line Card Options
CEF720
√
√
√
dCEF256
√
CEF256
√
√
√
√
√
√
√
√
Classic
√
√
√
√
√
√
√
Interface Type
10/100BASE-TX
100BASE-FX
10/100/1000BASE-TX
1000BASE GBIC
1000BASE SFP
10GE XENPAK
10BASE-FL
Services Modules
FlexWAN
OSMs*
SIP
* OSM: Optical Services Module
© 2006, Cisco Systems, Inc. CAT6KS v2.0—2-46
Troubleshooting the Catalyst 6500
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-47
Basic Performance check
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-48
show Commands
The switch supports two slots for the supervisor engines. A CLI command is provided to allow the administrator to inspect which of the SFMs is active:
6500# show fabric activeActive fabric card in slot 5No backup fabric card in the system
The mode of operation in use by the SFM can also be inspected by issuing the following command:
6500# show fabric switching-mode Fabric module is not required for system to operateModules are allowed to operate in bus modeTruncated mode is not allowed unless threshold is metThreshold for truncated mode operation is 2 SFM-capable cards
Module Slot Switching Mode 1 Crossbar 2 Crossbar 3 Crossbar 5 DCEF
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-49
The status of the SFM can be inspected by using the following command:
6500# show fabric status slot channel speed module fabric status status 1 0 8G OK OK 2 0 8G OK OK 3 0 8G OK OK 5 0 20G OK OK
6500# show fabric utilization slot channel speed Ingress % Egress % 1 0 8G 28 0 2 0 8G 0 0 3 0 8G 0 25 5 0 20G 0 0
The utilization of the SFM can be inspected by using the following command:
show Commands (Cont.)
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-50
During troubleshooting, the SFM can be inspected for transmission errors:6500# show fabric errorsModule errors: slot channel crc hbeat sync DDR sync 1 0 0 0 0 0 2 0 0 0 0 0 3 0 0 0 0 0 5 0 0 0 0 0
Fabric errors: slot channel sync buffer timeout 1 0 0 0 0 2 0 0 0 0 3 0 0 0 0 5 0 0 0 0
6500#
show Commands (Cont.)
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-51
System Capacity Planning
• New CLI command that provides a dashboard view of system hardware capacity, as well as the current utilization of the system.
C6500# show platform hardware capacity ? acl Show QoS/Security ACL capacity cpu Show CPU resources capacity eobc Show EOBC resources capacity fabric Show Switch Fabric resources capacity flash Show Flash/NVRAM resources capacity forwarding Show forwarding engine capacity interface Show Interface resources capacity monitor Show SPAN resources capacity multicast Show L3 Multicast resources capacity netflow Show Netflow capacity pfc Show PFC resources capacity power Show Power resources capacity qos Show QoS resources capacity rate-limit Show CPU Rate Limiters capacity system Show System resources capacity vlan Show VLAN resources capacity
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-52
Oversubscription
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-53
Simplified Campus Example
2x = 16 GbWS-X6548-GE-TX (CEF256)48 ports and 8-Gb4:1 oversubscription
WS-X6548-GE-TX (CEF256)48 ports, 8-Gbps backplane8:1 oversubscription
1x = 2 Gb
8:1
WS-X6724-SFP (CEF720)24 ports and 20-Gb backplane1.2:1 oversubscription
Supervisor Engine 7202x 1-Gb uplinks
1.2:1
• Total core-edge oversubscription ≈ 58:1
• Traffic flows vertically, bidirectional
• Low overall bandwidth requirements
Access
Aggregation
6:1
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-54
High CPU
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-55
High CPU Utilization
At what percentage level at should I start troubleshooting ?
It depends on the nature and level of the traffic. It is very essential to find a baseline CPU usage during normal working conditions, and start troubleshooting when it goes above specific threshold.
E.g., Baseline RP CPU usage 25%. Start troubleshooting when the RP CPU usage is consistently at 40% or above.
Why should I be concerned about high CPU usage ?
It is very important to protect the control-plane for network stability, as resources (CPU, Memory and buffer) are shared by control-plane and data-plane traffic
What are the usual symptoms of high CPU usage ?
• Control-plane instability e.g., OSPF flap
• Traffic loss
• Reduced switching/forwarding performance
• Slow response to Telnet / SSH
• SNMP poll miss
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-56
High CPU Utilization
Commands used to set baseline
FlashFlash
DRAMDRAM
FlashFlash
DRAMDRAM1 GbpsInband
SPCPUSP
CPU
1 GbpsInband
RPCPURP
CPU Port ASIC
MSFC 3
SP: show process cpu
SP: show msfc netint
RP: show ibc
RP: show process cpu
Sup720
RP: show ip trafficRP: show interfaces
C
C
RP: show msfc netint
SP: show ibc
C = ControllerMonitor the CPU usage in DFCs also using “remote
command module <mod#> show process cpu”
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-57
High CPU Utilization
CPU utilization is due to: Process (e.g., due to recurring events, control-plane
process) Interrupts (e.g., due to inappropriate switching path)
• Investigate CPU utilization via “show proc cpu” and find if the usage is due to process or interrupts
DUT#show proc cpu
CPU utilization for five seconds: 99%/90%; one minute: 9%; five minutes: 8%
PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process
2 720 88 8181 9.12% 1.11% 0.23% 18 Virtual Exec
Total CPU usage (Process + Interrupt)
CPU usage due to Interrupt
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-58
High CPU utilization – Process
Caused by ARP flooding.
Static route configured with interface instead of next-hop IP address. This will generate ARP request for every packet that is not reachable via more specific routes.
ip route 0.0.0.0 0.0.0.0 GigabitEthernet 2/5
DUT#show ip traffic | begin ARP
ARP statistics:
Rcvd: 6512 requests, 2092 replies, 0 reverse, 0 other
Sent: 258 requests, 707 replies (0 proxy), 0 reverse
Drop due to input queue full: 20
<snip>
DUT#show interfaces | include line protocol|rate
Vlan501 is up, line protocol is up
5 minute input rate 23013521 bits/sec, 2535 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
Process: ARP Input
Incrementing at very high rate
Look for abnormal input rate
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-59
Configure Optimized ACL Logging (OAL) in
PFC3 onwards
High CPU utilization – Process
Caused by traffic that needs to process-switched or destined to the CPU
Common Reasons:
- Traffic with IP-options enabled
- Fragmentation (due to MTU mismatch)
- Broadcast storm
- Traffic that needs further CPU processing e.g., ACL Logging
- Traffic to which ICMP Redirect or Unreachable required e.g., TTL=1, ACL Deny etc.
Process: IP Input
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-62
High CPU utilization – Traffic to RP CPUDUT#show ip traffic
IP statistics:
Rcvd: 81676 total, 20945 local destination
0 format errors, 0 checksum errors, 41031 bad hop count
0 unknown protocol, 19609 not a gateway
0 security failures, 0 bad options, 120 with options
Frags: 0 reassembled, 0 timeouts, 0 couldn't reassemble
0 fragmented, 0 couldn't fragment
Bcast: 417 received, 0 sent
Mcast: 11423 received, 52655 sent
Sent: 61340 generated, 0 forwarded
Drop: 0 encapsulation failed, 0 unresolved, 0 no adjacency
0 no route, 0 unicast RPF, 0 forced drop
0 options denied, 0 source IP address zero
ICMP statistics:
Rcvd: 0 format errors, 0 checksum errors, 17 redirects, 112 unreachable
812 echo, 812 echo reply, 0 mask requests, 0 mask replies, 0 quench
0 parameter, 0 timestamp, 0 info request, 0 other
0 irdp solicitations, 0 irdp advertisements
0 time exceeded, 0 timestamp replies, 0 info replies
ARP statistics:
Rcvd: 3518120 requests, 3636408 replies, 0 reverse, 0 other
• TTL<2• IP options• Fragmentation• Broadcasts• ARP not resolved• Ping Request• Punts to generate ICMP redirect• ARPs
It also displays stats for : BGP, EIGRP, TCP, UDP,
PIM, IGMP and OSPF
Do this command few times to find the fastest
growing counter
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-63
High CPU utilization – Traffic to RP CPU
Find the traffic. Please remember that the traffic seen may be normal control-plane traffic, expected to be sent to
RP CPU
Commands to see packets getting punted
DUT#show buffers assignedHeader DataArea Pool Rcnt Size Link Enc Flags Input Output46FDBC14 8029784 Small 1 77 36 1 200 Vl100 None46FE0010 802CBC4 Small 1 77 36 1 200 Vl100 None. . .
DUT#show buffers input-interface vlan 100 dump
Buffer information for RxQ3 buffer at 0x378B3BC data_area 0x7C05EF0, refcount 1, next 0x0, flags 0x200 linktype 7 (IP), enctype 1 (ARPA), encsize 14, rxtype 1 if_input 0x46C7C68 (Vlan100), if_output 0x0 (None) inputtime 2d03h (elapsed 00:00:01.024) outputtime 00:00:00.000 (elapsed never), oqnumber 65535 datagramstart 0x7C05F36, datagramsize 62, maximum size 2196 mac_start 0x7C05F36, addr_start 0x7C05F36, info_start 0x0 network_start 0x7C05F44, transport_start 0x7C05F58, caller_pc 0x6C1564
source: 137.34.219.3, destination: 224.0.0.2, id: 0x0000, ttl: 1, TOS: 192 prot: 17, source port 1985, destination port 1985
0: AFACEFAD 00000000 00000000 /,o-........ 12: 00000000 00000000 00000000 00000000 ................ 28: 00000000 00000000 00000000 00000000 ................ 44: 00000000 0000CC43 C00C0002 000200A0 ......LC@...... 60: 00420000 12FF74D5 00000000 00000100 .B....tU........ 76: 5E000002 18A90518 00850800 45C00030 ^....)[email protected] 92: 00000000 011174D5 8922DB03 E0000002 ......tU."[.`... 108: 07C107C1 001CECB4 00001001 04640100 .A.A..l4.....d.. 124: 63697363 6F000000 8922DB01 41920450 cisco...."[.A..P . . .
Packet details
Remember, this command shows only the process-switched traffic
Find the interface that's holding most of the buffers
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-64
High CPU utilization – Interrupt
DUT#show proc cpu
CPU utilization for five seconds: 99%/90%; one minute: 9%; five minutes: 8%
Most of the times, packets punted to CPU has common factors.
Packets received on the same vlan / interface or interfaces in the same module or same VRF etc.
Packet have specific destination or destination prefixes learnt from a specific neighbor
Packet have same L4 source or destination ports
Anything else common ?
How to troubleshoot high CPU due to interrupts ?
Details on all supported Packet Capture Tools
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-65
High CPU utilization – Interrupt
Verify CEF is enabled globally and on all interfacesDUT#show cef state
CEF Status:
RP instance
common CEF enabled
IPv4 CEF Status:
CEF enabled/running
dCEF enabled/running
CEF switching enabled/running
DUT#show ip interfaces | include line pro|CEF switching
Vlan2 is up, line protocol is up
IP CEF switching is enabled
Vlan3 is up, line protocol is up
IP CEF switching is enabled
Verify if CEF is enabled globally and per interface
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-66
High CPU utilization – InterruptSwitching path statistics – per interface basis
DUT#show interface gig7/4 stats
GigabitEthernet7/4
Switching path Pkts In Chars In Pkts Out Chars Out
Processor 4406750 353281375 32881 12422509
Route cache 74026 4589612 0 0
Distributed cache 0 0 0 0
Total 4480776 357870987 32881 12422509
DUT#show interface switching
GigabitEthernet2/2
Protocol Path Pkts In Chars In Pkts Out Chars Out
IP Process 11594 717908 16 1838
Cache misses 0
Fast 0 0 0 0
Auton/SSE 0 0 0 0
ARP Process 94 5640 5 560
Cache misses 0
Fast 0 0 0 0
Auton/SSE 0 0 0 0
. . . .
Process switched
SW CEF switched
Hw-switched
Process name
Process switched
Distributed switched packets
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-69
NetDriver (Netdr) Debug
DUT#debug netdr capture ?
acl (11) Capture packets matching an acl
and-filter (3) Apply filters in an and function: all must match
continuous (1) Capture packets continuously: cyclic overwrite
destination-ip-address (10) Capture all packets matching ip dst address
dstindex (7) Capture all packets matching destination index
ethertype (8) Capture all packets matching ethertype
interface (4) Capture packets related to this interface
or-filter (3) Apply filters in an or function: only one must match
rx (2) Capture incoming packets only
source-ip-address (9) Capture all packets matching ip src address
srcindex (6) Capture all packets matching source index
tx (2) Capture outgoing packets only
vlan (5) Capture packets matching this vlan number
<cr>
Be as specific as possible; on SP, remote login switch, then same set of commands)
This debug should not be service-impacting
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-70
Does the CPU Inband Driver See the Packet?
DUT#show netdr captured-packets
A total of 289 packets have been captured
The capture buffer wrapped 0 times
Total capture capacity: 4096 packets
------- dump of incoming inband packet -------
interface Vl1000, routine mistral_process_rx_packet_inlin
dbus info: src_vlan 0x3E8(1000), src_indx 0x45(69), len 0x40(64)
bpdu 0, index_dir 0, flood 1, dont_lrn 0, dest_indx 0x43E8(17384)
80000401 03E80400 00450000 40800000 E0000000 00000000 00000008 43E80000
mistral hdr: req_token 0x0(0), src_index 0x45(69), rx_offset 0x76(118)
requeue 0, obl_pkt 0, vlan 0x3E8(1000)
destmac FF.FF.FF.FF.FF.FF, srcmac 00.A0.CC.21.94.C4, protocol 0806
layer 3 data: 00010800 06040001 00A0CC21 94C40500 01660000 00000000
05000102 00000000 00000000 00000000 00000000 000001FE
00000006 00000000 000003E8
...
DUT#undebug netdr
DUT#debug netdr clear-capture
Example of inbound packet on interface VLAN 1000
Make sure to turn it off afterwards
Make sure to clear memory used up by captured packets
ARP packet
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-71
Enhanced crashinfo
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-72
Crashes
Crashes will require TAC involvement
Open a TAC service request and collect the following info:
• Crashinfo file
• Core file (if configured so)
• Show tech-support
• What you were doing that made it crash!!
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-73
Example of Process Crash Output
00:05:29: %DUMPER-3-PROCINFO: pid = 16427: (sbin/tcp.proc), terminated due to signal SIGTRAP, trace trap (not reset when caught) (Signal from user)00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: zero at v0 v1 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R0 00000000 00000000 00000004 00000000 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: a0 a1 a2 a3 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R4 7BC22298 00000000 00000000 00000000 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: t0 t1 t2 t3 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R8 00000000 00000000 00000000 00000000 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: t4 t5 t6 t7 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R12 00000000 00000000 00000000 00000000 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: s0 s1 s2 s3 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R16 00FDDFA0 00000000 00000000 00000000 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: s4 s5 s6 s7 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R20 00000000 00000000 00000000 00000000 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: t8 t9 k0 k1 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R24 00000000 722B3F4C 00000000 00000000 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: gp sp s8 ra 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R28 7828FF90 00FDDF60 00000000 72297450 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: sr lo hi bad 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R32 1001FC73 00000000 00000000 78288970 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: cause pc epc 00:05:29: %DUMPER-3-REGISTERS_INFO: 16427: R36 00800020 722B3F5C 00000000 00:05:29: %DUMPER-3-TRACE_BACK_INFO: 16427: (libc.so+0x2EF5C) (libc.so+0x12450) (s72033_rp-adventerprisek9_wan-58-dso-p.so+0x17C00) (libc.so+0x127AC) 00:05:30: %DUMPER-3-CRASHINFO_FILE_NAME: 16427: Crashinfo for process sbin/tcp.proc at bootflash:/crashinfo_tcp.proc-20050910-01284100:05:30: %DUMPER-3-CORE_FILE_NAME: 16427: Core for process sbin/tcp.proc at disk0:/tcp.proc.012842.dmp.Z00:05:31: %DUMPER-5-DUMP_SUCCESS: 16427: Core dump success00:05:31: %SYSMGR-3-ABNORMTERM: tcp.proc:1 (jid 91) abnormally terminated, restarted scheduled
Crashing process nameCrashing process ID
Crashinfo filename and location
Core filename and location
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-74
Example of What Files to Collect After Crash
For previous slide tcp.proc process crash you need to collect the following files:
Crashinfo filename and location
Both filenames encode the process that crashed
Cat6K#dir bootflash:Directory of bootflash:/
4 -rw- 139528 Sep 9 2008 19:28:42 -06:00 crashinfo_tcp.proc-20050910-012841
65536000 bytes total (64979832 bytes free)
Cat6K#dir disk0:Directory of disk0:/
1 -rw- 111923344 Sep 1 2008 10:26:54 -06:00 s72033-adventerprisek9_wan_dbg-vz.PP_R31_INTEG_050829 2 -rw- 112078968 Sep 9 2008 14:50:54 -06:00 s72033-adventerprisek9_wan_dbg-vz.pikespeak_r31_0908_1 3 -rw- 107608208 Sep 9 2008 18:50:04 -06:00 s72033-adventerprisek9_wan-vz.122-99.SX1010 4 -rw- 131517 Sep 9 2008 19:28:42 -06:00 tcp.proc.012842.dmp.Z
512040960 bytes total (180281344 bytes free)
© 2006, Cisco Systems, Inc. CAT6KS v2.0—2-75
Best Practices
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-76
Overview of Reliability in the Cisco Catalyst 6500 Series Switch
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-77
Resiliency (Layer 2 or Layer 3): SSO, NSF
Protection Schemes: HSRP/GLBP/VRRP, EtherChannel, 802.1s/w, PVST+
OperationsOIR of Line Cards
OIR of Sup
OIR of PSU, Modules
TDR
NAIS
RedundancySupervisor
Switch Fabric
Service Modules
Clock
Fans
Power Supplies
Cisco 6500 System Reliability
Fault DetectionGOLD
Soft HANetworkElement
Redundancy
Network Resilience
Operational
Processes
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-78
Using Route Processor Redundancy and RPR+
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-79
RPR and RPR+
The Catalyst 6500 supports failover between two supervisors installed in the switch. Two fault tolerant modes can be configured; Route Processor Redundancy (RPR) and Route Processor Redundancy Plus (RPR+).
Sup720-A
Sup720-B
RPR
RPR+
RPR+ provides failover
generally within 30-60 seconds
RPR provides failover
generally within 2 to 4 minutes
PSU PSU
Catalyst 6500
RPR+ requires both supervisors to be the same, and both must
run the same IOS image.
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-80
Configuration of RPR and RPR+ is achieved by entering redundancy configuration mode, then choosing the mode you wish to run.
6500# conf tEnter configuration commands, one per line. End with CNTL/Z.6500(config)# redundancy6500(config-red)# mode ? rpr Route Processor Redundancy rpr-plus Route Processor Redundancy Plus
RPR RPR+6500(config-red)# mode rpr 6500(config-red)# mode rpr-plus
Configuring RPR and RPR+
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-81
The redundant configuration status of the switch can be viewed using the following command:
6500# show redundancy states my state = 13 -ACTIVE peer state = 1 -DISABLED Mode = Simplex Unit = Primary Unit ID = 5
Redundancy Mode (Operational) = Route Processor Redundancy PlusRedundancy Mode (Configured) = Route Processor Redundancy Plus Split Mode = Disabled Manual Swact = Disabled Reason: Simplex mode Communications = Down Reason: Simplex mode
client count = 11 client_notification_TMR = 30000 milliseconds keep_alive TMR = 9000 milliseconds keep_alive count = 0 keep_alive threshold = 18 RF debug mask = 0x0
Redundant State Configured
Confirming RPR, RPR+ Status
© 2006, Cisco Systems, Inc. CAT6KS v2.0—2-82
Catalyst 6500 Supervisor Redundancy
Using SSO and NSF
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-83
SSO Overview
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-84
SSO Overview
• Active and standby supervisors run in synchronized mode.
• Redundant MSFC is in hot-standby mode.
• Switch processors synchronize STP, port and VTP states.
• PFCs synchronize Layer 2 and Layer 3 FIB, Netflow and ACL tables.
• DFCs are not repopulated with Layer 2 and Layer 3 FIB, Netflow and ACL tables.
• Very fast failover (0 to 3 seconds) between supervisors but still need to rebuild routes on external routers.
Standby Supervisor
Sup MSFC PFC
Line Card
Sup MSFC PFC
Active Supervisor
Line Card
Line Card
DFCDFCDFC
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-85
SRM with SSO Overview
Active Standby
STP, Port, VTP States
Layer 2 and Layer 3 FIB, Netflow, ACL Tables
Layer 2 and Layer 3 FIB, Netflow, ACL Tables
RPNew RP builds table andreestablishes neighbor relationships.
Layer 3 traffic forwardson lastknown FIB in hardware.
DFCs not affected by supervisor failover
ActiveStandby
STP, Port, VTP States
Layer 2 and Layer 3 FIB, Netflow, ACL Tables
Layer 2 and Layer 3 FIB, Netflow, ACL Tables
RP RP
SP
PFCx
SP
PFCx
SP
RP
PFCx PFCx
SP
DFCx DFCx
Before Failover After Failover
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-86
NSF Overview
• NSF-aware neighbors do not reconverge.
• NSF-aware neighbors help the NSF-capable router restart.
• NSF-aware neighbors continue forwarding traffic to the restarting router.
NSF-capable router
NSF-aware neighbor
Failover time: 0 to 3 seconds
• NSF-capable router rebuilds Layer 3 routing protocol database from neighbor.
• Data is forwarded in hardware based on preswitchover CEF information while routing protocols reconverge.
• Predictable traffic path • No route flap
NSF-aware neighbor
PSU1
Linecard 1
Catalyst 6500
Linecard 3
Linecard 3
Linecard 4
Primary Supervisor 720
Redundant Supervisor 720
Linecard 7
Linecard 8
Linecard 9
PSU2
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-87
NSF Configuration
To configure SSO to use NSF:6500(config)# redundancy
6500(config-red)# mode sso
To verify the configuration:6500# show redundancy states
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-88
BGP NSF Configuration
To configure BGP NSF:6500(config)# router bgp as-number
6500(config-router)# bgp graceful-restart
To verify the configuration:6500# show ip bgp neighbors x.x.x.x
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-89
OSPF NSF Configuration
To configure OSPF NSF:6500(config)# router ospf processID
6500(config-router)# nsf
To verify the configuration:6500# show ip ospf
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-90
ISIS NSF Configuration
To configure ISIS NSF:6500(config)# router isis tag
6500(config-router)# nsf [cisco | ietf]
To verify the configuration:6500# show running-config
6500# show isis nsf
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-91
EIGRP NSF Configuration
To configure EIGRP NSF:6500(config)# router eigrp as-number
6500(config-router)# nsf
To verify the configuration:6500# show running-config
6500# show ip routing
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-92
Redundancy Modes
RPR 2-4 minutes All releases
RPR+ 30-60 seconds All releases
SRM with SSO 0-3 seconds
Layer 2
12.2(17b)SXA
12.2(17d)SXB
NSF with SSO 0-3 seconds
layers 2-4
12.2(18)SXD
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-93
Reasons to Use Storm Control
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-94
DoS Protection: Control Plane Protection
High rates of link level broadcast traffic impact switch CPU and the stability of the network:
• Storm control limits the rate of broadcast traffic received by the distribution switch.
• Broadcast traffic within the local switch remains unrestrained.
• Local subnet devices may still be affected, but the network remains alive.
CONST_DIAG-SP-6-HM_MESSAGE: High traffic/CPU util seen on Module 5 [SP=40%,RP=99%,Traffic=0%]
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-95
DoS Protection: Storm Control
Storm control is also known as broadcast suppression:• limits the volume of
broadcast, multicast and/or unicast traffic
• protects the network from intentional and unintentional flood attacks and STP loops
• limits the combined rate of broadcast and multicast traffic to normal peak loads
Threshold
Dropped Packets
0 1 2 3Time
Seconds
Quantity
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-96
0
10
20
30
40
50
60
70
80
90
0.1 0.05 1 1.5 2 2.5 3
Percentage of Broadcast Traffice
Per
cen
tag
e o
f C
PU
Uti
lizai
ton
Protecting the Distribution Layer
Configure storm control on distribution downlinks. Limit broadcast and multicast to 1.0% of a GigE link to ensure distribution CPU remains in the safe zone.
! Enable storm control
storm-control broadcast level 1.0storm-control multicast level 1.0Conservative Max
Sup720 CPU Load
Broadcast Traffic CPU Impact
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-97
Configuring Storm Control
Storm control suppression is configured in interface configuration mode as follows:
6500(config-if)# storm-control ? broadcast Broadcast address storm control multicast Multicast address storm control unicast Unicast address storm control
6500(config-if)# storm-control broadcast ? level Set storm suppression level on this interface
6500(config-if)# storm-control broadcast level ? <0 - 100> Enter Integer part of storm suppression level
6500(config-if)# storm-control multicast level ? <0 - 100> Enter Integer part of storm suppression level
6500(config-if)# storm-control unicast level ? <0 - 100> Enter Integer part of storm suppression level
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-98
Configuring Storm Control (Cont.)
6500# show interface g1/9 counters broadcast
Port TotalSuppDiscardsGi1/9 1033
6500# show interface g1/9 counters multicast
Port TotalSuppDiscardsGi1/9 12
6500# show interface g1/9 counters unicast
Port TotalSuppDiscardsGi1/9 2046500#
Statistics for storm control suppression can be displayed as follows:
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-99
Fault Management
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-100
Fault Management on the Catalyst 6500
Misconfigured system
Memory corruption
Software inconsistency
Hardware faults
Fault Management
DetectionIsolation
Correction
Enhanced System Stability
Enhanced Network Stability
Improving resiliency in redundant and nonredundant deployments:
• Software enhancements for better fault detection
• Mechanisms to detect and correct soft failures in the system
• Proactive fault detection and isolation
• Routines to detect failures that the runtime software may not be able to detect
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-101
Detects and correct soft failures
Soft High Availability
Detects system problems proactively
GOLD Troubleshooting
Provides intelligent troubleshooting and debugging mechanisms
EEM
Automates actions based on events that have occurred; TCL-based configurable
fault policy
Reports Faults and Takes Action
Call Home, Syslogs, SNMP
Fault Management Framework
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-102
Generic Online Diagnostics
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-103
Generic Online Diagnostics
GOLD implements a number of health checks both at system startup and while the system is running. GOLD complements existing HA features like NSF/SSO running in the background, and alerting HA features when disruption occurs.
Bootup Diagnostics
Check operational status of components
Run Time Diagnostics
On-demand diagnostics statically triggered by an administrator
Scheduled diagnostics to run at a specific time
Non-disruptive health diagnostics running in the background
SYSLOG Message
%DIAG-SP-3-MAJOR: Module 2: Online Diagnostics detected a
Major Error. Please use diagnostic Module 2' to see test
results.
Diagnostic Results
Diagnostic Action
Invoke action to resolve issue i.e. reset component, invoke HA
action, CallHome, etc
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-104
GOLD
Boot Up Diagnostics
Health Monitoring Diagnostics
Proactive diagnostics serve as high availability triggers and take faulty hardware out of service.
• Quick go and no-go tests• Disruptive and nondisruptive tests
• Periodic background tests • Nondisruptive tests
On-demand Diagnostics and Schedule Diagnostics
Reactive diagnostics for troubleshooting
• Can run all the tests • Include disruptive tests used
in manufacturing
Fault Detection Framework for high availability :
Troubleshooting Tools:
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-105
Bootup Diagnostics:• EARL learning tests (Sup & DFC)
• L2 tests (channel, BPDU, capture)
• L3 tests (IPv4, IPv6, MPLS)
• Span and multicast tests
• CAM lookup tests (FIB, NetFlow, QoS CAM)
• Port loopback test (all cards)
• Fabric snake tests
Health Monitoring Diagnostics:• SP-RP inband ping test (Sup’s SP/RP,
EARL(L2&L3), RW engine)
• Fabric channel health test (fabric enabled line cards)
• MacNotification test (DFC line cards)
• Non-disruptive loopback test
• Scratch registers test (PLD & ASICs)
GOLD Test Suite
On-demand Diagnostics:• Exhaustive memory test
• Exhaustive TCAM search test
• Stress Testing
• All bootup and health monitoring tests can be run on-demand
Scheduled Diagnostics:• All bootup and health monitoring tests
can be scheduled
• Scheduled switch-over
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-106
Q & A
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-107
Trivia
¿Qué tienen en común la Copa Confederaciones FIFA con los Catalyst Switches de Cisco?
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-108
Sesión de Preguntas y Respuestas
El experto responderá verbalmente algunas de las preguntas que hayan realizado. Use el panel de preguntas y respuestas (Q&A) para preguntar a los expertos ahora
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-109
Nos interesa su opinión!!!Habrá un sorteo con los que llenen el questionario de evaluación
Tres asistentes recibirán un
Regalo sorpresa
Para llenar la evaluación haga click en el link que está en el chat. También saldrá automáticamente al cerrar el browser de la sesión.
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-110
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-111
Próximo Webcast en portugués
Martes 6 de diciembre
7:00 a.m. Ciudad de México
8:30 a.m. Caracas
10:00 a.m Bs.As.
2:00 p.m. Madrid
Michelle Jardim
http://tools.cisco.com/gems/cust/customerSite.do?METHOD=E&LANGUAGE_ID=P&SEMINAR_CODE=S17480&PRIORITY_CODE=
Tema: Resolución de problemas en el Session Initiation Protocol (SIP)
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-112
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-113
Respuesta a la Trivia
En 1999, Cisco lanzó la familia de switches inteligentes multi-gigabit Cisco Catalyst 6000. Ese mismo año México se convierte en la primera nación que gana la copa confederaciones FIFA en casa.
¿Qué tienen en común la Copa Confederaciones FIFA con los Catalyst Switches de Cisco?
© 2007 Cisco Systems, Inc. All rights reserved. CAT6KS v2.0—2-114
Muchas gracias por su
asistencia
Por favor complete la encuesta de evaluación de este evento y gane premios