2013 12 Cascade Deploy Guide
2013 12 Cascade Deploy Guide
Deployment Guide
December 2013
© 2013 Riverbed Technology. All rights reserved.
Riverbed®, Cloud Steelhead®, Granite™, Interceptor®, RiOS®, Steelhead®, Think Fast®, Virtual Steelhead®, Whitewater®, Mazu®,
Cascade®, Shark®, AirPcap®, BlockStream™, SkipWare®, TurboCap®, WinPcap®, Wireshark®, TrafficScript®, Flyscript®, WWOS™,
and Stingray™ are trademarks or registered trademarks of Riverbed Technology, Inc. in the United States and other countries. Riverbed and
any Riverbed product or service name or logo used herein are trademarks of Riverbed Technology. All other trademarks used herein belong to
their respective owners. The trademarks and logos displayed herein cannot be used without the prior written consent of Riverbed Technology
or their respective owners.
Akamai® and the Akamai wave logo are registered trademarks of Akamai Technologies, Inc. SureRoute is a service mark of Akamai. Apple
and Mac are registered trademarks of Apple, Incorporated in the United States and in other countries. Cisco is a registered trademark of Cisco
Systems, Inc. and its affiliates in the United States and in other countries. EMC, Symmetrix, and SRDF are registered trademarks of EMC
Corporation and its affiliates in the United States and in other countries. IBM, iSeries, and AS/400 are registered trademarks of IBM
Corporation and its affiliates in the United States and in other countries. Linux is a trademark of Linus Torvalds in the United States and in
other countries. Microsoft, Windows, Vista, Outlook, and Internet Explorer are trademarks or registered trademarks of Microsoft Corporation
in the United States and in other countries. Oracle and JInitiator are trademarks or registered trademarks of Oracle Corporation in the United
States and in other countries. UNIX is a registered trademark in the United States and in other countries, exclusively licensed through X/Open
Company, Ltd. VMware, ESX, ESXi are trademarks or registered trademarks of VMware, Incorporated in the United States and in other
countries.
Portions of Cascade® Profiler Version 9 contain copyrighted information of third parties. Title thereto is retained, and all rights therein are
reserved, by the respective copyright owner. PostgreSQL is (1) Copyright © 1996-2009 The PostgreSQL Development Group, and (2)
Copyright © 1994-1996 the Regents of the University of California; PHP is Copyright © 1999-2009 The PHP Group; gnuplot is Copyright ©
1986-1993, 1998, 2004 Thomas Williams, Colin Kelley; ChartDirector is Copyright © 2007 Advanced Software Engineering; Net-SNMP is
(1) Copyright © 1989, 1991, 1992 Carnegie Mellon University, Derivative Work 1996, 1998-2000 Copyright © 1996, 1998-2000 The Regents
of The University of California, (2) Copyright © 2001-2003 Network Associates Technology, Inc., (3) Copyright © 2001-2003 Cambridge
Broadband Ltd., (4) Copyright © 2003 Sun Microsystems, Inc., (5) Copyright © 2003-2008 Sparta, Inc. and (6) Copyright © 2004 Cisco, Inc.
and Information Network Center of Beijing University of Posts and Telecommunications, (7) Copyright © Fabasoft R&D Software; Apache
is Copyright © 1999-2005 by The Apache Software Foundation; ILOG JView Component Suite is Copyright © 1987-2009 ILOG, Inc.; Click
is (1) Copyright © 1999-2007 Massachusetts Institute of Technology, (2) Copyright © 2000-2007 Riverbed Technology, Inc., (3) Copyright
© 2001-2007 International Computer Science Institute, and (4) Copyright © 2004-2007 Regents of the University of California; OpenSSL is
(1) Copyright © 1998-2005 The OpenSSL Project and (2) Copyright © 1995-1998 Eric Young ([email protected]); Netdisco is (1) Copyright
© 2003, 2004 Max Baker and (2) Copyright © 2002, 2003 The Regents of The University of California; SNMP::Info is (1) Copyright © 2003-
2008 Max Baker and (2) Copyright © 2002, 2003 The Regents of The University of California; mm is (1) Copyright © 1999-2006 Ralf S.
Engelschall and (2) Copyright © 1999-2006 The OSSP Project; ares is Copyright © 1998 Massachusetts Institute of Technology; libpq++ is
(1) Copyright © 1996-2004 The PostgreSQL Global Development Group, and (2) Copyright © 1994 the Regents of the University of
California; Yahoo is Copyright © 2006 Yahoo! Inc.; pd4ml is Copyright © 2004-2008 zefer.org; Rapid7 is Copyright © 2001-2008 Rapid7
LLC; CmdTool2 is Copyright © 2008 Intel Corporation; QLogic is Copyright © 2003-2006 QLogic Corporation; Tarari is Copyright © 2008
LSI Corporation; Crypt_CHAP is Copyright © 2002-2003, Michael Bretterklieber; Auth_SASL is Copyright © 2002-2003 Richard Heyes;
Net_SMTP is Copyright © 1997-2003 The PHP Group; XML_RPC is (1) Copyright © 1999-2001 Edd Dumbill, (2) Copyright © 2001-2006
The PHP Group; Crypt_HMAC is Copyright © 1997-2005 The PHP Group; Net_Socket is Copyright © 1997-2003 The PHP Group;
PEAR::Mail is Copyright © 1997-2003 The PHP Group; libradius is Copyright © 1998 Juniper Networks.
For detailed copyright and license agreements or modified source code (where required), see the Riverbed Support site at https://
support.riverbed.com. Certain libraries were used in the development of this software, licensed under GNU Lesser General Public License,
Version 2.1, February 1999. For a list of libraries, see the Riverbed Support at https://support.riverbed.com. You must log in to the support site
to request modified source code.
This documentation is furnished “AS IS” and is subject to change without notice and should not be construed as a commitment by Riverbed
Technology. This documentation may not be copied, modified or distributed without the express authorization of Riverbed Technology and
may be used only in connection with Riverbed products and services. Use, duplication, reproduction, release, modification, disclosure or
transfer of this documentation is restricted in accordance with the Federal Acquisition Regulations as applied to civilian agencies and the
Defense Federal Acquisition Regulation Supplement as applied to military agencies. This documentation qualifies as “commercial computer
software documentation” and any use by the government shall be governed solely by these terms. All other use is prohibited. Riverbed
Technology assumes no responsibility or liability for any errors or inaccuracies that may appear in this documentation.
Riverbed Technology
199 Fremont Street
San Francisco, CA 94105
Phone: 415.247.8800
Fax: 415.247.8801 Part Number
Web: http://www.riverbed.com 712-00113-05
Contents
Contents
Preface.........................................................................................................................................................1
About This Guide .............................................................................................................................................1
Audience....................................................................................................................................................2
Document Conventions .............................................................................................................................2
Additional Resources........................................................................................................................................3
Release Notes ............................................................................................................................................3
Riverbed Documentation and Support Knowledge Base ..........................................................................3
Online Documentation...............................................................................................................................3
Contacting Riverbed .........................................................................................................................................3
Internet.......................................................................................................................................................3
Technical Support ......................................................................................................................................4
Professional Services.................................................................................................................................4
Documentation ..........................................................................................................................................4
What Is New .....................................................................................................................................................4
Snaplen ...........................................................................................................................................................61
Chapter 8 - Troubleshooting.................................................................................................................... 87
RTT Values Not Available ..............................................................................................................................87
Not Receiving Reports by Email ....................................................................................................................88
DNS Names Not Being Resolved in Reports .................................................................................................88
Reports Are Not DNS-Resolving All Addresses............................................................................................88
Data in Reports Seems Inconsistent ...............................................................................................................89
Sensor Protocol Violations .............................................................................................................................90
Communication Issues....................................................................................................................................90
Appendix A - Licensing............................................................................................................................ 93
Licensing Overview........................................................................................................................................93
Runtime Licenses ....................................................................................................................................93
Capacity Licenses....................................................................................................................................94
Option Licenses .......................................................................................................................................94
License Installation.........................................................................................................................................94
Current-Generation Hardware License Installation.................................................................................94
Previous-Generation Hardware License Installation...............................................................................95
Other Device License Installation ...........................................................................................................95
Assigning Licenses .........................................................................................................................................95
Manual License Installation............................................................................................................................95
Automatic License Upgrades..........................................................................................................................96
Evaluation Licenses ........................................................................................................................................96
Licenses Available ..........................................................................................................................................96
Licensing the Express..............................................................................................................................96
Licensing the Profiler and Profiler-VE....................................................................................................96
Licensing the Enterprise Profiler Cluster ................................................................................................97
Licensing Gateway and Gateway-VE .....................................................................................................97
Licensing the Sensor and Shark ..............................................................................................................98
Index .......................................................................................................................................................... 99
Welcome to the Riverbed Cascade Product Family Deployment Guide. Read this preface for an overview of the
information provided in this guide, the documentation conventions used throughout, and contact information. This
preface includes the following sections:
“About This Guide” on page 1
“Additional Resources” on page 3
“Contacting Riverbed” on page 3
“What Is New” on page 4
For information about the Riverbed Cascade Sensor Virtual Edition (Sensor-VE), consult the appropriate
documentation for that software release.
Audience
This guide is written for network administrators, operators, and engineers familiar with WANs, LANs, and the data
center environment.
You must also be familiar with the information in the following documents:
Cascade Profiler and Cascade Express User’s Guide
Cascade Sensor and Cascade Gateway User’s Guide
Cascade Shark Appliance User’s Guide
Virtual Cascade Shark Appliance Quick Start Guide
Cascade Pilot Reference Manual
Cascade Profiler, Express, Sensor, and Gateway Appliance Installation Guide
Cascade Profiler and Cascade Express User’s Guide
Cascade Sensor and Cascade Gateway User’s Guide
RSP User’s Guide (RSP) or Steelhead EX Management Console User’s Guide (VSP)
Steelhead Appliance Deployment Guide
Document Conventions
This guide uses the following standard set of typographical conventions.
Convention Meaning
italics Within text, new terms and emphasized words appear in italic typeface.
boldface Within text, CLI commands and GUI controls appear in bold typeface.
| The pipe symbol represents a choice between the keyword or variable to the left or right of the symbol
(the keyword or variable can be either optional or required):
{delete <filename> | upload <filename>}
Additional Resources
This section describes resources that supplement the information in this guide. It includes the following information:
“Release Notes” on page 3
“Riverbed Documentation and Support Knowledge Base” on page 3
“Online Documentation” on page 3
Release Notes
The following online file supplements the information in this guide. It is available on the Riverbed Support site at
https://support.riverbed.com.
<product>_<version_number> Describes the product release and identifies fixed problems, known problems, and
<build_number>.pdf work-arounds. This file also provides documentation information not covered in the
guides or that has been modified since publication.
Examine the release notes file before you begin installation and configuration. It contains important information.
Online Documentation
The Riverbed documentation set is periodically updated with new information. To access the most current version of
Riverbed documentation and other technical information, consult the Riverbed Support site located at
https://support.riverbed.com.
Contacting Riverbed
This section describes how to contact departments within Riverbed.
Internet
You can learn about Riverbed products at
http://riverbed.com.
Technical Support
If you have problems installing, using, or replacing Riverbed products, contact Riverbed Support or your channel
partner who provides support. To contact Riverbed Support, open a trouble ticket by calling 1-888-RVBD-TAC (1-
888-782-3822) in the United States and Canada or +1 415 247 7381 outside the United States. You can also go to
https://support.riverbed.com.
Professional Services
Riverbed has a staff of professionals who can help you with installation, provisioning, network redesign, project
management, custom designs, consolidation project design, and custom coded solutions. To contact Riverbed
Professional Services, email [email protected] or go to
http://www.riverbed.com/us/products/professional_services/.
Documentation
The Riverbed Technical Publications team continually strives to improve the quality and usability of Riverbed
documentation. Riverbed appreciates any suggestions you might have about its online documentation or printed
materials. Send documentation comments to [email protected].
What Is New
The following changes were made since the December 2012 release of the Riverbed Cascade Product Family
Deployment Guide:
Updated - “Profiler and Profiler-VE Overview” on page 6
Updated - “Choosing the Right Equipment” on page 9
Updated - “Deploying the Express” on page 18
Updated - “Deploying the Express 360, Shark, and Pilot” on page 20
New - “REST API” on page 80
Updated - “Licensing Overview” on page 93
Updated - “Licenses Available” on page 96
Removed references to Sensor-VE. For information about Sensor-VE, consult the appropriate documentation for
that software release.
Important: Flow per minute limits changed in February 2013. For information about the Cascade Product Suite prior to February
2013, consult documentation for that software release.
This chapter provides an overview of the Cascade appliances. It includes the following sections:
“What Is the Cascade Product Family?” on page 5
“The Cascade Appliances” on page 6
Express - An entry-level product designed for small organizations. It includes Profiler, Sensor and Gateway
functionality in one product and supports up to 75,000 flows per minute.
Express 460 - An entry-level product designed for small organizations. It includes Profiler, Shark and Gateway
functionality in one product and supports up to 120,000 flows per minute.
For more information about the Profiler, see “Choosing the Profiler” on page 12.
Sensor Overview
The Sensor passively inspects packets from port mirroring ports or taps. It provides Layer-7 application classification
and sends performance information, including end-user experience metrics, to the Profiler.
For more information about the Sensor, see “Choosing the Sensor” on page 14.
Pilot Overview
Pilot seamlessly and securely integrates with a remote Shark to deliver a complete and feature-rich distributed network
analysis. Pilot is the only tool on the market to be fully integrated with Wireshark software, an open-source network
protocol analyzer. While the Profiler provides visibility across all flows across the network, Pilot provides an in-depth
view into problems requiring deep packet analysis.
For more information about Pilot, see “Choosing Pilot” on page 16.
Deployment of Cascade appliances requires advanced planning to ensure that you install the appliances to capture
critical traffic. You must deploy your appliances efficiently, without wasting resources on unnecessary coverage. This
chapter includes the following deployment sections:
“Choosing the Right Equipment” on page 9
“Deployment Scenarios” on page 16
“Port and Protocol Dependencies” on page 28
“Profiler and Express Flow Storage” on page 31
“Flow Redundancy with Cascade Appliances” on page 33
Important: Flow per minute licensing limits changed in February 2013. For information about the Cascade Product Family prior
to February 2013, consult documentation for that software release.
When determining what kind of equipment you need at each site—whether that site is a data center, a branch office, or
a large building on a corporate campus—answer the following questions:
What kind of information do I want to know about this location? Do I need response-time information,
optimization information, WAN link bandwidth information, and application usage information?
Do I have an extensive virtualized environment already in place?
How many users and how much traffic am I expecting at this location, now and in the future? Am I considering
how virtual solutions can limit flow capacities?
What kind of physical resources do I have at this location? Are there technicians that can help maintain the
hardware?
What kind of network resources do I have at this location? Can my switch provide SPAN and mirror traffic? Can
my routers provide flow information?
Do I have sufficient bandwidth to transfer flow data between this location and the Profiler?
How much visibility do I need at this location?
Do I need packet-level visibility to view objects calls and individual transactions within the application?
The following table shows additional Profiler solutions for several reporting attributes you might want to capture.
The following table shows additional Cascade Product Family solutions for several reporting attributes you might want
to capture.
Accurately calculate response-time information for non- The Shark, Sensor or Express
optimized flows
Accurately calculate response-time information for Steelhead appliance and the Shark, Sensor, or Express on the
optimized flows server-side
Report on and monitor link bandwidth information: for The Gateway or Express
example, to monitor percent use
Monitor types of Layer-7 applications on the network: The Sensor or Express 360
for example, to ensure that no one violates the network
usage policy
Obtain detailed packet information: for example, to The Shark or Express 460
analyze network traffic in case of a security violation
In choosing the right equipment, you want to make sure that the data you receive is the data you need. The following
table describes some of the different flow formats supported by Cascade appliances and specifies the features available
within these formats.
Performance metrics x x
VoIP metrics x
Different sites have varying numbers of users and volume of network traffic. A site with 10 users transferring large
files all day generates fewer flows than a site with 200 users viewing Web pages. For calculation purposes, Riverbed
recommends that you use 20-40 flows per minute as the estimated average flows per minute. Exact flows per minute
depend on the traffic characteristics in your environment.
Use multiplication to estimate the maximum number of flows per minute. For example, 100 users that each generate
20 flows per minute produce an approximate flow rate of 2,000 flows per minute. However, if the site has servers that
are accessed from remote locations, the overall flow rate is likely to increase, potentially by a large amount. If you have
used flow tools in the past, you might already have some flow estimates. You can also look at session counts on
firewalls or load balancers to obtain flow estimates.
You must have the appropriate number technical staff on site. In a small remote office of only a few non-technical
people, deploying a virtual version of an appliance might make more sense than installing a physical box.
Consider other network equipment that is already installed at a site when you decide which Cascade appliances to
install. If an office site contains multiple large switches capable of generating NetFlow or SPAN and port mirror traffic,
a Shark, Sensor, or Gateway might make sense. Conversely, if a small office contains only a wireless Internet router
with no other network infrastructure, you have limited options for deploying visibility solutions; it is possible you
might not need any Cascade appliances.
If you have a site that reports significant quantities of data across a WAN, consider the bandwidth used by Cascade
appliances for the transfers. Typical WAN bandwidth use is 1.5% of monitored traffic. Cascade appliances report flows
once per minute. If reporting multiple megabytes of traffic per minute seriously impedes the performance of WAN
links, you might need a different solution: for example, restricting the amount of data being monitored.
The Express
There are two models of the Express: the Express 360 and the Express 460.
After deduplication, the Express 360 has flow rates ranging from 25,000 to 75,000 flows per minute. The Express 460
has flow rates ranging from 15,000 to 120,000. The Express is best suited for smaller organizations or a small
subsection of a larger network. Because the Express can forward the flows it receives directly to a different model of
Profiler, this deployment can make sense for sites where there is a need for local visibility and enterprise-wide
visibility.
The Express includes functionality similar to that of the Profiler and Gateway. The additional capabilities enable a
compact deployment.
The following table shows the Express model options. Most features are available in the base unit. The base unit is 2U
high, and you can upgrade in the field to the next-higher flow-rate version.
Base Unit and Deduplicate Flow Included Ports Optional Expansion Ports
Flow License Rate
CAX-000360 (L) Up to 25 K FPM Primary 10/100/1000 for Two port 10 Gbps SFP (LR and SR
management option for additional Sensor
CAX-000360 (M) Up to 50 K FPM monitoring)
Four ports 10/100/1000 to monitor
CAX-000360 (H) Up to 75 K FPM Sensor
Performs Layer 7 Application
Identification
The following table shows the Standard Profiler model options. Most features are available in the base unit. Each unit
is 2U high. and you can upgrade in the field to the next-higher flow-rate version. You can add a platform analytics
license (LIC-CAP-2260-CAA) if you want analytics and service dashboards.
Base Unit and Deduplicate Flow Included Ports Optional Expansion Ports
Flow License Rate
CAP-02260 (M) Up to 300 K FPM Primary 10/100/1000 for SAN card (two fiber HBA ports)
management
CAP-02260 (H) Up to 600 K FPM
Base Unit and Deduplicate Flow Included Ports Optional Expansion Ports
Flow License Rate
To plan for future expansion, you must know the current estimated number of flows per minute and the expected flows
per minute in the timeframe being planned for. For example, if the network currently has 6,000 hosts and is expected
to grow to 9,000 hosts in the next two years, a Standard Profiler is sufficient to handle the growth. A software license
and hardware upgrade enables a Profiler licensed for 150,000 flows per minute to be upgraded to 600,000 flows.
Another example is a network currently providing service to 14,000 hosts and expected to grow to 25,000 in the next
year. In this situation, an Enterprise Profiler is a better choice. The Standard Profiler is sufficient in a 14,000-host
network, but it is unlikely to provide adequate performance and license limits to manage the network when it grows to
25,000 hosts.
To provide visibility into a subset of the network and a full overview of the entire network, you can install a smaller
capacity Profiler (such as Profiler-VE, a Express, or a Standard Profiler sufficient for local traffic flow) in combination
with a larger capacity Profiler (such as a Standard or Enterprise Profiler sufficient for overall traffic flow). This ensures
that the system meets both the immediate and planned growth needs.
CAG-1060-VE-F1 Up to 15 K FPM
CAG-1060-VE-F2 Up to 30 K FPM
CAG-1060-VE-F3 Up to 60 K FPM
CAG-1060-VE-F4 Up to 90 K FPM
The following table shows the Sensor option. Start with the base unit and add appropriate media cards.
CAS-02260 Primary 10/100/1000 for management Two port 10 Gbps SFP (LR and SR option)
Four ports - 10/100/1000 copper for
monitoring Sensor
Choosing Shark-VE
You must choose the appropriate Shark-VE model to ensure that the appropriate quantity of packets are stored and are
available for analysis. The available models are shown in the following table. You deploy Shark-VE in VMware ESXi
environments through connectivity to a standard or distributed vSwitch or to a Cisco Nexus 1000V Switch. You install
Shark-VE similarly to other virtual machine disk format (VMDKs), and you use a vSwitch promiscuous-mode port
channel to obtain packets. If you use the Cisco Nexus 1000V, Shark-VE uses a SPAN port. You can limit traffic to only
inter-VM traffic by using the appropriate capture Berkeley packet filter (BPF).
The following table shows the Shark-VE models.
For more information about installing and configuring Shark-VE, see the Virtual Cascade Shark Appliance Quick Start
Guide.
Choosing Pilot
When you deploy Pilot, you must consider only how many users must perform deep packet analysis. Pilot is Windows
client software and is licensed per installed machine. Pilot can analyze traffic from a Shark, an Embedded Cascade
Shark probe, and any standard packet capture files. You do not need Pilot for Profiler-level analysis and
troubleshooting.
Deployment Scenarios
This section describes the following deployment scenarios:
“Deploying the Shark and Pilot” on page 16
“Deploying the Express” on page 18
“Deploying the Shark and Sensor” on page 20
“Deploying the Express 360, Shark, and Pilot” on page 20
“Deploying the Standard Profiler and Gateway” on page 23
“Deploying the Enterprise Profiler and Gateway” on page 24
“Deploying the Profiler, Gateway, Shark, and Pilot” on page 25
“Deploying the Profiler, Gateway, Shark, Shark-VE, and Pilot” on page 26
If you connect the Shark to a network mirror port or TAP, you can detect network activity that you want to monitor but
not necessarily store: for example, you can create watches to detect certain conditions without capturing the traffic.
You can preserve only the desired information, thereby reducing the amount of disk space you use compared to a
capture job that captures all traffic.
For more details about watches, see the Cascade Pilot Reference Manual.
To store network traffic, you must define capture jobs on the Shark. Capture jobs tell the Shark what sort of packets to
store to disk. The capture job can store packets based on a wide variety of criteria, including physical source, medium,
or various aspects of packet-header information. You can define multiple capture jobs on each Shark to capture packets
that meet different, specific requirements. For example, you can define one capture job to capture all traffic on specific
VoIP ports, and define another capture job to capture all traffic destined for specific critical servers. The different
capture jobs operate independently of each other and can capture overlapping data.
Use Pilot to analyze the data stored on a Shark and to look at real-time and historical traffic. You can use a variety of
filters and drill-down techniques to analyze traffic. Pilot has numerous views available to assist with the analysis.
Because Pilot can connect to multiple Sharks, the location of Pilot is not as critical as the location of the Shark. You
can optimize the Pilot-to-Shark communication by applying views and filters to the data so that only the necessary
information is sent between the Shark and Pilot.
Pilot does not pull down all of the packets unless prompted to open the packets in Wireshark or save the packets to a
local file. Typically, when you save packets or pull packets into Wireshark, you have already filtered the data so that
you move only specific packets.
When looking at real-time (or near real-time) data, increasing the physical distance between Pilot and the Shark can
force more bandwidth travel on the WAN. Full-packet data sent from the Shark across a WAN, can use significant
amounts of bandwidth and possibly have an impact on other traffic.
To prevent these issues, place Pilot as close as possible to the Shark. If you place Pilot across a slower WAN from the
Shark, you must apply appropriate views and filtering before viewing raw packets or saving these packets locally.
Figure 2-1 shows an example Shark and Pilot deployment. Although this example shows only a single Shark appliance,
you might need additional Shark appliances for large data centers or to monitor additional locations.
Figure 2-1. Example Shark and Pilot Deployment
Standalone Deployment
The Express is designed to act as a standalone system capable of both receiving network traffic information and
providing all the reporting and monitoring functionality expected of Profiler solutions. You can achieve this with two
1-GB network monitor interfaces for receiving packets and flow data directly from the source.
The physical location of the Express is extremely important. Generally, you install the Express at a data center, close
to the core switching and routing infrastructure. This location creates the shortest connection paths between devices,
and provides the most flexible monitoring. Because there are only two monitoring interfaces for receiving and
analyzing SPAN, mirror, and TAP traffic, you must place the device as close to the sources of that data as possible.
Additionally, because the Express can receive flow data directly from flow sources, it is important to place it close to
sending devices so there is no impact on the WAN.
Figure 2-2 shows an example of a standalone Express deployment. Flow is collected locally at the data center from
routers and Steelhead appliances, and additional flow is collected from remote sites. There is port mirroring of traffic
for critical applications, sent directly to the Express monitoring ports.
Figure 2-2. Example Standalone Cascade Express Deployment
Integrated Deployment
When you deploy the Express as an integrated deployment, consider what portions of the network you want visible to
users of the different devices being deployed. There is no way to restrict visibility directly within the Profiler, but you
can use an Express to simulate limited visibility.
The Express receives data directly from the source—through built-in monitoring ports and direct flow reception—and
can forward the data to other Profilers. Because of this, you can use the Express to limit the view to a subset of the
network and still feed a larger system to provide a full view.
When you deploy an Express with a limited view, make sure that the Express supports the required flow rate for the
covered area. The largest Express has a limit of 90,000 deduplicated flows per minute, and it can be quickly
overwhelmed by larger deployments. For example, using an estimate of 20 flows per minute per host, 90,000
deduplicated flows should provide coverage for a network consisting of roughly 4,500 hosts; flows over the 90,000
are dropped.
Twenty flows per minute per host is an approximation of how much traffic a host can generate on a per-minute basis
for internal communications. If the host is also communicating with resources on the Internet, then the number of flows
generated is higher.
Consider physical location when you deploy the Express in an integrated environment. The Express provides all the
same advanced network metrics as other Profilers when installed correctly. For example, to provide accurate optimized
response time, you must deploy the monitoring interfaces between the server-side Steelhead appliance and the servers.
If you place the Express in the wrong location (for example, between the client-side Steelhead appliance and the
clients), you can prevent accurate collection and calculation of these values.
If you install the Express in close proximity to the data center, an do not plan appropriately, you can lose visibility into
other important areas of the network. If the data center is in one physical location but you are going to use the Express
to monitor a separate physical location, you have to choose between not having local visibility or not having certain
information available. You can avoid this issue by deploying an additional component, such as the Shark. For details,
see “Deploying the Express 360, Shark, and Pilot” on page 20.
Figure 2-3 shows the Express as part of a larger deployment that includes a Standard Profiler. This example shows that
the local network operator monitors all traffic on the Express and can configure local policies and local service
dashboards. The data received by the Express is also sent to a global Profiler. Collection from other sources by the
global Profiler is not shown.
Figure 2-3. Example Express in a Larger Deployment Environment
In addition to acting as a standalone device, you can configure the Express 360 to receive flow data from additional
sources and integrate with other products. To provide both high- and low-level views of the data on the network, you
can integrate the Express 360 with the packet capturing abilities of the Shark appliance and the detailed analysis
capabilities of the Pilot. This deployment has many advantages, including that the Express 360 provides a high-level
view of network activity but still allows easy drill-down access to the analysis engine on the Pilot.
When you use the Express 360 with the Shark and Pilot, the design considerations are similar to deploying the Express
independently or as part of an integrated solution. Primarily, consider the flow limits. The Express 360 is limited to no
more than 75,000 deduplicated flows, and the Shark can export up to 600,000 flows per minute (depending on the
incoming traffic rate). Excess flows from the Shark (if any) are dropped by the Express and are not used in analysis or
stored on the Express 360.
When you deploy the Express 360 with the Shark, it is not critical that you place the Express 360 in the data center,
for the following reasons:
You can leverage the Shark interfaces (instead of the Express 360 interfaces) to monitor the traffic between the
server-side Steelhead appliance and the data center.
You can use the Shark to augment reporting of non-optimized response-time information, rather than relying on
only the Express 360 to provide that data.
In an environment with multiple physical locations, you can remove the restriction of where you locate the Express
360. For example, you benefit from local visibility in a larger environment. You can place the Express 360 at a remote
office, monitoring local flow data and network traffic, and configure the server-side Steelhead appliance to forward
only traffic not already sent from the Express 360. A server-side Shark appliance can also detect optimized flow
response-time values.
One significant benefit of integrating the Express 360, the Shark, and Pilot is that you can use the Express 360 high-
level view of the network and automated monitoring functions, while retaining the ability to drill down to more detail
with Pilot, and even further, with Wireshark.
If you want to view packet data, you must define a capture job to capture the packets on the Shark. Riverbed
recommends that you set a capture job to store all packets being forwarded to the Express by the Shark, based on:
your particular monitoring preferences.
capacity.
the network flow rate you want to monitor.
other uses of the Shark.
Figure 2-5 shows an example deployment that includes the Express 360, the Shark, and Pilot. Routers and Steelhead
appliances send flows from the network to the Express 360, providing broad visibility into the network. A Shark
monitors traffic from switches in the data center, collecting packets for deeper visibility. The data from the Shark
merges with the flow data collected. You can log in to the Express and view applications flowing across the entire
network. When troubleshooting, if you need deeper packet-level analysis, the Profiler UI automatically launches
appropriate information into Pilot. This takes you from the Profiler view of network traffic directly into Pilot views of
packet data.
Figure 2-5. Example Express, Shark, and Pilot Deployment
Figure 2-6 shows an example deployment that includes the Profiler and Gateway. All Steelhead appliances and routers
at remote sites, and routers within the data center, send flow data. There are no data flows from smaller sites (not shown
in Figure 2-6). Because these much smaller sites primarily communicate back to the data center, traffic detection is
based upon collection from the data center routers and Steelhead appliance.
Figure 2-6. Example Profiler and Gateway Deployment
Figure 2-7 shows a Gateway collecting and deduplicating the data flow, then forwarding the flow to the Enterprise
Profiler. Because this deployment does not require network performance and deep packet analysis, you do not need to
install the Shark or the Sensor. This solution enables you to report, analyze, and troubleshoot traffic across the entire
large enterprise network.
Figure 2-7. Example Enterprise Profiler and Gateway Deployment
Physical - Collecting packets by using SPAN, port mirroring, and TAP on only the desired links
Virtual - Selecting only those specific packets that you want to monitor using the built-in filtering capabilities
Figure 2-8 shows an example deployment that includes a Profiler, Gateway, a Shark, and Pilot. Routers and Steelhead
appliances send flows across the network to the Gateway and provide wide visibility into the network. A Shark sits off
of switches in the data center and collects packets for deeper visibility. Flow data from the Shark merges with all other
flow data collected by the Profiler. You can log in to the Profiler to view applications flowing across the entire network.
When troubleshooting, if you need deeper packet-level analysis, the Profiler UI automatically launches Pilot. This
takes you from the Profiler view of flow data directly into Pilot views of packet data.
Figure 2-8. Example Profiler, Gateway, Shark, and Pilot Deployment
Figure 2-9 shows an example deployment that includes the Profiler, Gateway, the Shark, Shark-VE, and Pilot. Shark-
VEs are deployed on each ESXi platform in which you want visibility. Metrics are sent from within the virtual
environment to the Profiler. Using Pilot, you can also perform packet analysis.
Figure 2-9. Example Profiler, Gateway, Shark, Shark-VE, and Pilot Deployment
Local Storage
Every Express, Profiler, and Enterprise cluster includes some amount of local storage. The following table lists the
system storage type.
CAP-4260 16 23.6 TB
Systems with a single partition use the partition to store the flow information, and the boot and configuration
information for the Profiler. On systems with two partitions, one partition is used for the system software and the other
is dedicated to flow storage.
The primary advantages to local storage are performance and cost. Because the storage is located within the system, it
is extremely fast when performing reads and writes, limited only by the physical disks and bus connecting the disks to
the core system. The Profiler includes storage and no external storage is required.
The biggest disadvantage of local storage is that is has expansion limits. There is no option for internal disk expansion.
Note: This estimation assumes that you have 50% of available storage dedicated to storing flow records. On normal
implementations, half of the storage is dedicated to storing the minute-by-minute flows and half is used to store pre-aggregated data,
called rollups.
If an xx60 Express Profiler receives one flow per minute, it can store flows covering a time span of approximately
6,450 years. On a more realistic network sending 50,000 flows per minute, the same Express can store approximately
47 days worth of flow data.
If you must store flows for 180 days, then the storage included on the Express is inadequate. You must upgrade to a
larger system with additional storage capacity. When you determine the upgrade path to take, ensure that the path you
choose is the most logical approach. The following upgrades are available:
Standard Profiler (with 11.8 TB of storage built in)
Enterprise cluster (with 11.8 TB of storage in a base cluster and the ability to add an additional 82.6 TB of
storage)
When you choose the appropriate upgrade, take into account the desired flow storage capacity and the cost of the
system. While the Enterprise Profiler cluster might meet the needs of the network, unless you expect significant growth
in the near future, it is unlikely to be cost effective.
Option 1 - all unique flows go to one Gateway, and the Gateway send the flows two Profilers
Option 2 - all unique flows go to two Gateways, and each Gateway send the flows to one Profiler
Option 3 - a blend of option one and option two.
Figure 2-14 shows Option 1: all unique flows go to one Gateway, and the Gateway sends the flows to two Profilers.
Figure 2-14. Option 1: Sending Flows to a Single Gateway
Figure 2-15 shows how you can scale Option 1 to the size of your organization. You can use this design if you run out
of flow volume and have multiple Gateways. Keep in mind that each flow source can send to only a single Gateway.
If the Gateway goes offline, you lose the flows for that Gateway for the period of time it is not operational.
Figure 2-15. Scalable Option 1: Sending Flows to a Single Gateway
Figure 2-16 shows Option 2: all flows go to two Gateways. Each Gateway sends its flows to only one Profiler. This
design provides Gateway redundancy as well as Profiler redundancy.
Figure 2-16. Option 2: Sending Flows to Two Gateways
Figure 2-17 shows how you can scale Option 2 to the size of your organization. You can scale this design as long as
each Gateway sends to only one Profiler.
Figure 2-17. Scalable Option Two: Sending Flows to Two Gateways
Figure 2-18 shows Option 3: flow sources that go to only one Gateway are sent to two Profilers, and the flows that go
to both Gateways are sent to a single Profiler. Riverbed recommends this option for cases that absolutely require this
level of complexity. Gateways must have a per-flow-source configuration, which means that you must specify the flow
sources on the Gateway for export.
Figure 2-18. Option 3: Blending Options 1 and 2
The Shark and Sensors can send flow directly to two Profilers. When configuring flow redundancy, you want to plan
how the configuration is synchronized between the two Profilers. You can synchronize your configuration by using the
Cascade backup and restore mechanism. One of the Profilers acts as the primary appliance on which configuration
changes are made. The second Profiler acts as the secondary appliance, which receives a copy of the configuration
from the primary appliance.
For more information about backup and restore, see the Cascade Profiler and Cascade Express User’s Guide.
This chapter describes the flow collection for Cascade appliances. It includes the following sections:
“Base Requirements” on page 37
“Flow Data Fields Consumed by Cascade Appliances” on page 39
“Flow Type Considerations” on page 40
“Flow Collection Considerations” on page 40
“Flow Collection in Virtual Environments” on page 41
“Validating Flow Collection” on page 41
“Sample Third-Party Configurations” on page 43
In this chapter, the term flow refers to standard flow types, including NetFlow, sFlow, Netstream, IPFIX, and jFlow.
The term device refers to a router, switch, or another networking device that supports standard flow export.
A Bluecoat Packeteer shaper supports flow-detail-records v2 (FDR) for application identifier collection. If the device
is a Steelhead appliance, Riverbed recommends that you use CascadeFlow instead of NetFlow to collect retransmit and
response time information. If the device supports multiple types of flow formats, NetFlow is preferable to sFlow.
For details about collecting data from Sharks and Sensors, see “Packet Collection for Cascade Appliances” on page 51.
For details about collecting CascadeFlow from Steelhead appliances, see “Cascade Appliances and Steelhead
Appliance Integration” on page 63.
Base Requirements
You must meet the following requirements to set up your router:
Configure devices that support NetFlow for NetFlow v1, v5, v7, or v9 with no aggregation and no sampling.
Riverbed recommends that you use v5 or v9.
Configure devices that support sFlow for sFlow versions v2, v4, or v5 with the lowest possible sampling rate.
Riverbed recommends that you use v5.
Configure devices to export flow to the Express or Gateway management interface. Use default-configured
destination port on the Express or Gateway.
Synchronize devices with an NTP server. Riverbed recommends that you synchronize devices with the same NTP
server used by the Profiler. For proper operation and reporting, you must synchronize the timestamps on the
network equipment and the Express or Gateway.
Note: Cisco IOS versions show this timeout in either minutes or seconds.
Do not adjust the inactive timeout setting from the default setting of 15 seconds. If you must, the time must be
less than 60 seconds.
When you use NetFlow v5, make sure to add the ip route-cache flow (or appropriate) command for all active
interfaces and VLANs in addition to the ones you actively use. Because NetFlow v5 is typically ingress only, you
can calculate egress only by aggregating ingress from the other interfaces.
If NetFlow v9 is available, you can selectively control which interfaces to use, and specify both ingress and
egress. Additionally, with NetFlow v9, you can configure the TTL command. This enables ordered-path reporting
in the Profiler. To enable TTL export, enter one of the following commands:
– If using standard NetFlow configuration, the command syntax from global configuration mode is ip flow-
capture ttl.
– If using flexible NetFlow configuration, the command syntax within the flow record template is match ipv4
ttl maximum.
You must configure SNMP access to any devices sending flow to the Profiler. Standard flow export provides
information with only SNMP ifindex values. By enabling SNMP on these devices, the Express or Gateway can
look up the actual names, descriptions, speeds, and other information about the interfaces. For more information
about SNMP integration, see “SNMP Integration for Flow Sources” on page 73.
Additional requirements and considerations for Cisco equipment include:
If you use NetFlow on a Cisco 4500 switch, the Supervisor Engine IV or V must be equipped with a NetFlow
Services daughter card and the required software versions.
If you use NetFlow on a Cisco 6500 switch equipped with both MSFC and SUP1 modules, you must enable
NetFlow on the router level and the switch level. The route once, switch many concept applies to this hardware
configuration. A new flow is first routed by the MSFC module before it is placed in the MLS cache and is
switched. The Profiler must receive NetFlow data from both modules to avoid missing any data. A similar
concept applies to a chassis with SUP2 or 720 modules.
If you use NetFlow with the Cisco Nexus 7000 series, and you are using NX-OS v4, you must have a minimum
version NX-OS v4.2(8). If you are using NX-OS v5, you must have a minimum version of NX-OS v5.2(1).
Earlier NX-OS releases have incorrect packets-per-second and bits-per-second statistics.
NetFlow export from the Cisco ASA is does not include standard NetFlow records. Cisco ASA exports NetFlow
Event Log (NSEL) in a NetFlow wrapper. NSEL is event driven, exporting bytes only for the first and last packet
in the flow. There is no concept of an active timer, so you do not get regular updates. NSEL is considered a
replacement for syslog that enables the ASA to scale. The Profiler, Express and Gateway do not currently support
reporting from NSEL.
Some Cisco devices support NetFlow export for Layer-2 switched traffic in addition to Layer-3 traffic. Generally,
Layer-2 switched NetFlow is available for forwarding ASICs PFC3B, PFC3BXL, or PFC3C. For verification on
whether your hardware or software supports Layer-2 NetFlow, see Cisco documentation. Use the following
command to enable NetFlow export for Layer-2 (if your hardware or software supports Layer-2 traffic export):
Router (config)# ip flow export layer2-switched vlan <vlanlist>
Inbound SNMP ifindex SNMP ifindex that identifies the All standard versions
interface through which the conversation
is received for the device
Outbound SNMP ifindex SNMP ifindex that identifies the All standard versions
interface through which the conversation
is transmitted out of the device
Packet count Number of packets sent during the All standard versions
conversation
Byte count Number of bytes sent during the All standard versions
conversation
Timestamps Timestamps for the beginning and end of All standard versions
the conversation
Application identifier Layer-7 application identifier NBAR through NetFlow v9 with specific
hardware, also available from Sensors and
Packeteer through FDR records
Total response time, server delay, Measurement of response time metrics CascadeFlow from Sensors and Sharks
client delay across the network
VoIP metrics: Voice-over-IP-metrics computed by the Shark v9.5 and later export
Shark
• MOS score
• R-Factor score
• Jitter
• RTP packet loss
2. Select the Devices & Interfaces (Tree) tab to view Cascade appliances that send data the Profiler.
3. Expand the display for each Gateway to view which devices the Gateway is receiving flow data from.
4. Further expand the display for each flow-sending device listed in the tree to see specific interfaces.
5. Hover your mouse over the name of each interface to see details about the interface.
Figure 3-1 shows an expanded gateway-DataCenter, with further expansion of WAN-RTR-Hartford. The pop-up
window shows the details about the interface WAN-RTR-Hartford:wan, including inbound and outbound speed and
utilization.
Figure 3-1. Profiler Device/Interfaces Page
When you validate flow collection on the Devices/Interface page you might have the following display issues:
If you do not see interface names and speeds it is likely because you have not configured SNMP polling to the
devices.
For details about how to configure SNMP polling for the flow-sending devices, see the Cascade Profiler and
Cascade Express User’s Guide.
If you only see outbound traffic, it can be that you are not exporting traffic for that particular interface.
All interfaces for which a flow record is received are in the list, even though you might not be exporting flow for
that interface. You might see the data if the device is exporting data for the opposing interface and the flow
outbound interface is the one in question. For example, you are exporting flows for Interface 1, but the flow is
destined for Interface 2. When the flow is received on Interface 1, the record indicates that it is destined for
Interface 2. Therefore, Interface 2 is in the list, even though you might not be exporting for Interface 2.
1. At the switch level (SUP2), enter the following commands to turn on NetFlow and set version, flow mask, and
timing:
Router(config)# mls netflow
Router(config)# mls nde sender version 5
Router(config)# mls flow ip interface-full
Router(config)# mls nde interface
Router(config)# mls aging normal 32
Router(config)# mls aging long 64
2. At the routing module (MSFC), enter the following commands to set the device source interface, version,
destination, and timeouts:
Router(config)# ip flow-export source loopback 0
Router(config)# ip flow-export version 9
Router(config)# ip flow-export destination <cascade-gateway-or-express_ip> <udp_port_number>
Router(config)# ip flow-cache timeout inactive 15 (this might be the default depending upon
code version)
Router(config)# ip flow-cache timeout active 1
Note: If you are running Cisco IOS v12.2(18) or later, use NetFlow v9. If NetFlow v9 is not available, use NetFlow v5.
If you are running Cisco IOS v12.3(14) or later and are exporting NetFlow v9, you can include export of the TTL,
enabling the Profiler and Express to show network segment diagrams:
Router(config)# ip flow-capture ttl
If you are running Cisco IOS v12.3(14) or later, running NetFlow v9, and have hardware that supports export of
NBAR Layer-7 information, include the following command:
Router(config)# ip flow-capture nbar
Next, to enable NetFlow on your interfaces, enter the following commands, where applicable, for each interface
or interface grouping where you require NetFlow accounting (three types of interfaces):
interface <type> <slot>/<port>
For example:
Router(config)# interface fastethernet 0/1
Router(config-if)# ip route-cache flow
or
interface vlan <vlan_id>
For example:
Router(config)# interface vlan 3
Router(config-if)# ip route-cache flow
or
interface port-channel <channel_id>
For example:
Router(config)# interface port-channel 3
Router(config-if)# ip route-cache flow
3. Optionally, if you want to export Layer-2 switched flows (and your switch supports Layer-2 NetFlow export), enter
the following commands for the set of VLANs where you want the Layer-2 flows exported:
Router (config)# ip flow export layer2-switched vlan <vlanlist>
To configure the SUP and MSFC modules of a 6500 series switch in hybrid mode
1. At the switch level (SUP), enter the following commands to enable NetFlow data export (NDE) and to set
destination of flow, timers, and full flow:
Router(config)# set mls nde enable
Router(config)# set mls nde enable <gateway-or-express_ip> <udp_port_number>
Router(config)# set mls agingtime 16
Router(config)# set mls agingtime fast 32 0
Router(config)# set mls agingtime long-duration 64
Router(config)# set mls flow full
2. At the routing module (MSFC), enter the following commands to configure NDE and set the destination of flow:
Router(config)# ip flow-export <ip_address> < udp_port> <version>
3. At the interface level, enter the following commands to enable NetFlow on each interface on which you want to
collect statistics and set timers:
Router(config)# interface <type> <slot>/<port-adapter>
For example:
Router(config)# interface fastethernet 0/1
Router(config-if)# ip route-cache flow
Router(config)# ip flow-cache timeout active 1
Router(config)# ip flow-cache timeout inactive 15
To configure a Cisco 7500 series router using the Cisco IOS CLI
2. Enter the following commands to enable NetFlow at the interface level on each interface on which you want to
collect statistics:
Router(config) # interface <type> <slot>/<port-adapter>
For example:
Router(config)# interface fastethernet 0/1
For 7500:
Router(config-if)# ip route-cache flow
To configure a Cisco 7600 series router using the Cisco IOS CLI
2. Enter the following commands to enable NetFlow at the interface level on each interface on which you want to
collect statistics:
interface <type> <slot>/<port-adapter>
For example:
Router(config)# interface fastethernet 0/1
Router(config-if)# ip flow ingress
2. Enter the following commands to create the flow exporter and monitor:
Switch# flow exporter Cascade
Switch# destination <ip address of Gateway or Express>
Switch# transport udp <udp port of Gateway or Express>
Switch# flow monitor Cascade
Switch# record Cascade-record
Switch# exporter Cascade
Switch# cache timeout active 60
Switch# cache timeout inactive 60
1. Enter the following commands to configure a record to include all necessary fields for the Profiler, Express, or
Gateway:
Switch# config t
Switch(config)# flow record Cascade-record
Switch(config-flow-record)# match interface input
Switch(config-flow-record)# match interface output
Switch(config-flow-record)# match ipv4 source address
Switch(config-flow-record)# match ipv4 destination address
2. At the global level, enter the following commands to configure required timeout settings:
Switch# conf t
Switch(config)# feature netflow
Switch(config-netflow)# flow timeout active 60
Switch(config-netflow)# flow timeout inactive 15
Switch(config-netflow)# flow timeout session
5. Enter the following commands to apply a flow monitor to a VLAN or interface (one time for each Layer-3
interface):
Switch# config t
Switch(config)# vlan 30
Switch(config-vlan)# ip flow monitor cascade-monitor input
1. Enter the following commands to configure NetFlow Exporter and timing parameters:
n1000v# config t
n1000v(config)# flow exporter Cascade-export
n1000v(config-flow-exporter)# destination <cascade-gateway-or-express_ip>
n1000v(config-flow-exporter)# source mgmt 0
n1000v(config-flow-exporter)# transport udp 2055
!--- Listening port configured on Gateway
n1000v(config-flow-exporter)# version 9
n1000v(config-flow-exporter-version-9)# option exporter-stats timeout 60
n1000v(config-flow-exporter-version-9)# template data timeout 1200
n1000v(config-flow-exporter-version-9)# option interface-table timeout 3600
3. Enter the following commands to apply the flow monitor to either each virtual interface or each port profile:
For an interface:
n1000v(config)# interface veth 2
n1000v(config-if)# ip flow monitor Cascade-monitor input
n1000v(config-if)# ip flow monitor Cascade-monitor output
For a port profile (the port profile must be configured with other appropriate parameters and inherited on the
appropriate interfaces or port groups):
n1000v(config)# port-profile type vethernet <Profile-Name>
n1000v(config-port-prof)# ip flow monitor Cascade-monitor input
n1000v(config-port-prof)# ip flow monitor Cascade-monitor output
2. Enter the following command to enable IPFIX at a port level, for each port where you want each export:
ERS# config ip ipfix port 5/2, 5/3, 5/4, 5/5, 5/6 all-traffic enable
3. Enter the following commands to set the timing parameters for the Cascade appliance compatibility (active timeout
is in minutes, export interval in seconds):
ERS# config ip ipfix active-timeout 1
ERS# config ip ipfix aging-interval 15
ERS# config ip ipfix export-interval 60
Depending on your router and software version, you might need to specify slot numbers in the previous
commands. The following example shows the commands with slot numbers:
ERS# config ip ipfix slot 5 active-timeout 1
ERS# config ip ipfix slot 5 aging-interval 15
ERS# config ip ipfix slot 5 export-interval 60
4. Enter the following commands to enable export and to export to the Express and Gateway:
ERS# config ip ipfix exporter-state enable
ERS# config ip ipfix collector add <gateway-or-express-ip-address> dest-port <gateway-or-
express-ip-address-listening-port> enable true
or
ERS# config ip ipfix slot 5 exporter-state enable
ERS# config ip ipfix slot 5 collector add <gateway-or-express-ip-address> dest-port <gateway-
or-express -listening-port> enable true
In this example, 1 is the sflow instance. If this instance ID is already in use, then enter either 2 or 3 in the previous
and the following commands.
The example shows a sampling rate of one out of every 500 packets. Riverbed recommends that you set the
sampling rate to the lowest value recommended by HP; the lowest value recommended depends on device and
link speed. In the example, all results in using this sampling rate for all ports.
In the example, all results in using this polling rate for all ports, and 60 indicates the polling and export interval.
This chapter describes the different methods for Cascade appliance packet capture. You use packet capture to monitor
traffic monitoring and analyze packets. This chapter includes the following sections:
“Cascade Appliances for Packet Collection” on page 51
“SPAN and Port Mirroring” on page 52
“Network Tap Instrumentation” on page 57
“VACL Configuration Examples” on page 58
“Shark Passthru” on page 60
“Packet Deduplication” on page 60
“Snaplen” on page 61
Many switches have a limit on the number of monitoring ports that you can configure. This limit is often two
monitoring ports. If the limit is a problem in your environment, you can add a tap to an existing monitoring port
(essentially making a copy of the traffic already being monitored by another device), or you can use VLAN
access control lists (VACLs) to configure what amounts to an additional SPAN port, provided that your
equipment supports VACLs. For more information, see the following sections in this chapter.
RSPAN
RSPAN enables an extension of a SPAN over the network to another switch on a Layer-2 nonroutable RSPAN VLAN.
You can use RSPAN when you have one or more access switches, and you want to configure a SPAN to a single Sensor,
Shark, or Express monitoring port at a distribution switch. To ensure that network traffic is not impeded, dedicate a
trunk port to carry the traffic from the access switches to the distribution switch.
Figure 4-2 shows a monitoring configuration in which you detect traffic to and from local servers on two different
switches. The monitoring port is on an upstream switch. The Shark and Sensor have two or more monitoring ports that
enable you to duplicate this configuration multiple times using the same Shark or Sensor.
Figure 4-2. RSPAN Connectivity
ERSPAN
ERSPAN enables an extension of a SPAN over the network to another switch through a routed GRE-encapsulated
tunnel. You can use ERSPAN when a Sensor, Shark, or Express is monitoring from a distant switch. In this case, you
must have adequate bandwidth over the routed path that carries the mirrored traffic so that mirroring does not adversely
affect production network traffic.
Figure 4-3 shows a monitoring configuration that enables you to detect traffic to and from local servers on two different
switches when the monitoring port is on an upstream switch over a routed network. The Shark and Sensor have two or
more monitoring ports that enable you to duplicate this configuration multiple times using the same Shark or Sensor.
Figure 4-3. ERSPAN Connectivity
You must use ERSPAN in an virtualized environment that uses the Cisco Nexus 1000V. The Cisco Nexus 1000V
mirrors traffic sent between virtual machines by sending ERSPAN to an external Cisco Catalyst 6500 switch.
To configure a SPAN for all traffic for VLANs 1 through 100 using a Cisco Catalyst 6500 SPAN
1. From the switch CLI, enter configuration mode to set up a monitor session and configure the source traffic you
want to monitor:
Switch# conf t
Switch (config)# monitor session 1 source vlan 1-100 rx
2. Enter the following command to configure the destination port where the Sensor, Shark, or Express monitoring
port is connected:
Switch (config)# monitor session 1 destination gigabitethernet 4/3
The following example shows capturing all traffic to and from sources on the downstream port 5/1 and sending the
collected traffic to port 5/3.
To configure a SPAN for all traffic to and from a downstream switch on port 5/1 using a Cisco
Catalyst 6500 SPAN
1. From the switch CLI, enter configuration mode to set up a monitor session and configure the source traffic you
want to monitor:
Switch# conf t
Switch (config)# monitor session 1 source gigabitethernet 5/1 both
2. Enter the following command to configure the destination port where the Sensor, Shark, or Express monitoring
port is connected:
Switch (config)# monitor session 1 destination gigabitethernet 5/3
To configure a SPAN for all traffic for VLANs 1 through 100 using a Cisco Nexus 5000 SPAN
1. From the switch CLI, enter configuration mode to set up a monitor session:
Switch# conf t
Switch (config)# monitor session 1
Switch (config-monitor)# exit
Switch (config)#
2. Enter the following commands to configure the destination port to which the Sensor, Shark, or Express monitoring
port is connected (first set the port as a monitoring port, and next place it into the created session):
Switch (config)# interface ethernet 5/4
Switch (config-if)# switchport monitor
Switch (config-if)# exit
Switch (config-if)# monitor session 1
Switch (config-monitor)# destination interface ethernet 5/4
3. While still in configuration mode, enter the following command to configure the source traffic you want to
monitor:
Switch (config-monitor)# source vlan 1-100
The following example shows all traffic SPANing to and from a downstream switch on port 5/2. You want to make
sure that you are capturing all traffic to and from sources on the downstream port. Capture traffic in both directions on
the port (default if unspecified).
To configure a SPAN for all traffic to and from a downstream switch on port 5/2 using a Cisco Nexus
5000 SPAN
1. From the switch CLI, enter configuration mode to set up a monitor session:
Switch# conf t
Switch (config)# monitor session 1
Switch (config-monitor)# exit
Switch (config)#
2. Enter the following commands to configure the destination port to which the Sensor, Shark, or Express monitoring
port is connected (first, mark the port as a monitoring port, and next place it into the created session):
Switch (config)# interface ethernet 5/5
Switch (config-if)# switchport monitor
Switch (config-if)# exit
Switch (config-if)# monitor session 1
Switch (config-monitor)# destination interface ethernet 5/5
3. While still in configuration mode, enter the following command to configure the source traffic you want to
monitor:
Switch (config-monitor)# source interface ethernet 5/2 both
1. From the switch CLI, enter configuration mode to set up a monitor session and provide a description:
Switch# conf t
Switch (config)# monitor session 1 type erspan-source
Switch (config-monitor)# desc CascadeErspanSource
3. Enter the following commands to provide the destination IP address of the 6500 switch (use any reachable IP
address on the 6500) and an identifier:
Switch (config-monitor)# Destination ip [6500 IP address]
Switch (config-monitor)# erspan-id 100
Switch (config-monitor)# no shut
1. From the switch CLI, enter configuration mode to set up a monitor session, and provide a description:
Switch# conf t
Switch (config)# monitor session 1 type erspan-destination
2. Enter the following commands to configure the specific destination interface, identifier, and receiving IP address:
Switch (config-monitor)# destination interface gix/y/z
Switch (config-monitor)# source
Switch (config-monitor)# erspan-id 100
Switch (config-monitor)# ip address [6500 IP address]
Switch (config-monitor)# no shut
Regeneration taps - Send the same traffic for the same monitored link to multiple devices. These taps are useful
if you want to send traffic from link to both the Sensor, Shark, or Express and another device, for example, an
IDS.
Aggregation taps - Enable you to aggregate both directions of traffic on a monitored link through a single port so
that you need only a single port on the Shark or Sensor for a link you want to monitor. If you use this method, you
can potentially miss some packets if the full-duplex link is running close to line rate in both directions.
Some aggregation taps can regenerate and send traffic from a monitored link to multiple monitoring devices
(sometimes referred to as port aggregation). Some aggregation taps can combine multiple monitored links to one
or more monitoring devices, sometimes referred to as link aggregation.
Advanced/Intelligent taps - Many of the same vendors that offer intelligent SPAN or port-mirror solutions also
offer solutions you can use for taps.
Best practices for tap deployment:
Ensure that you understand which type of tap you are using, keeping in mind that basic taps require two
monitoring ports per monitored link.
You can use taps on existing SPAN and port-monitoring ports. Using taps is useful if there are no longer SPAN
and monitoring ports available on the switch you want to monitor.
You can chain taps. For example, if you already have a tap deployed to a monitoring device such as an IDS, you
can tap into the feed to the IDS for monitoring with the Sensor, Shark, or Express.
1. Enter the following commands to create the VACL and specify it as a capture VACL:
> set security acl ip CascadeMonitor permit any any capture
> show security acl info CascadeMonitor editbuffer
3. Enter the following commands to map the VACL to all VLANs you want to monitor:
> set security acl map CascadeMonitor vlan1,vlan2, vlan3
4. Enter the following commands to specify the capture port on which you have connected the Sensor, Shark, or
Express monitoring port (enables for normal switching and creates a copy on the capture port):
> set security acl capture-ports 5/3
> show security acl capture-ports
To configure VACL port mirroring on a Cisco Catalyst 6500 running Cisco IOS
1. From the switch CLI, enter the following commands to create the VACL:
Switch# conf t
Switch(config)# ip access-list CascadeMon
Switch(config-access-list)# permit ip any any
Switch(config-access-list)# exit
Switch(config)#
2. Enter the following commands to configure the assigned capture or monitoring port as a trunk port (Interface 5/3):
Switch(config)# interface GE5/3
Switch(config-if)# no ip address
Switch(config-if)# switchport
Switch(config-if)# switchport mode trunk
Switch(config-if)# switchport trunk encapsulation dot1q
4. Enter the following commands to configure the action clause as capture for the access map:
Switch (conf-map_name)# match ip address CascadeMon
Switch (conf-map_name)# action forward
or
Switch (conf-map_name)# action forward capture // Depending on Cisco IOS rev.
Switch (conf-map_name)# exit
5. Enter the following commands to apply the access map to all VLANs that you want to monitor:
Switch (conf)# vlan filter map_name vlan-list 1-10,15,16...
6. Enter the following commands to specify the capture port (previously configured trunk port):
Switch (conf)# interface GE5/3
Switch (config-if)# switchport capture
Shark Passthru
The only reason to use passthru mode is to tap a SPAN port that another device is already using: for example, a Sensor.
In passthru mode, you do not have to configure an additional SPAN on the device. With this solution, you are using
two ports on the Shark to monitor a single SPAN port.
When you place the Shark in passthru mode, it acts as a tap on a live interface. In passthru mode, Shark passes traffic
between two physical interfaces on the same card.
Note: The passthru mode does not fail-to-wire. If the Shark loses power or stops operating for whatever reason, the link does not
pass traffic.
Packet Deduplication
Depending upon the packet capture method you use, you might send multiple copies of the same packet to the Shark
or Sensor. This can occur when you are:
port mirroring multiple VLANs from the same monitoring port and the packet is routed on the device from one
VLAN to another. Even if you are mirroring only ingress to the VLAN, the switch can mirror a copy of the packet
when it enters the first VLAN, and mirror a second copy when it enters the second VLAN.
port mirroring both ingress and egress on the port or VLAN and the packet is routed into and out of the same port
or VLAN.
using an aggregating tap and the packets are detected on both ports being aggregated.
using an intelligent monitoring solution that is capturing the same packet from multiple ports and is not
performing deduplication.
If any of these actions apply to your environment, Riverbed recommends that you use port deduplication on the Sensor,
Shark, and Express. The Shark or Sensor can deduplicate packets when necessary. You must enable this feature on the
Shark, but it is enabled by default on the Sensor. Both appliances deduplicate packets by evaluating the packet
identifier along with other information in the packet. Deduplicated packets can capture TCP retransmissions; and
duplicate packets, due to instrumentation, are dropped. The Shark performs duplication on a per-port basis.
Some network devices might retransmit TCP packets as part of their normal operation. If you are collecting packets
on both sides of such devices to the same port on the Shark or the Sensor, enabling packet deduplication does not
remove retransmission counts as these are true retransmits. The following are two examples:
If you capture traffic between an Interceptor appliance and Steelhead appliance and are using full transparency,
the packets appear as retransmissions to the Profiler and Express if the packets are captured is on the same port as
the originating packets. To avoid this, do not capture traffic between the Interceptor appliance and Steelhead
appliance if configured with full transparency.
If you capture traffic on either side of a CISCO ASA Firewall to the same port on a the Shark or Sensor, the ASA
has a security feature that is enabled by default to help protect against TCP session hijacking. This feature causes
the ASA to rewrite sequence numbers for packets traversing it, resulting in observed retransmitted packets if the
packets are captured on the same Shark or Sensor monitoring port. To avoid this, you can disable the connection
random-sequence-number feature on ASA, or you can change your instrumentation so that you do not capture
traffic from both sides of the firewall to the same monitoring port.
Snaplen
Snaplen is an abbreviation for snapshot length. Snaplen equals the number of bytes captured for each packet. Having
a snaplen smaller than the maximum packet size on the network enables you to store of more packets, but you might
not be able to inspect the full packet content.
In most cases, you want to configure the Shark to capture full packets. If this is your case, do not adjust the default
snaplen parameter. Do not adjust this parameter. This enables full-packet analysis within Pilot. If you adjust the snaplen
to be smaller, some Pilot views cannot fully analyze the data. For example, volumes of data represented can appear to
be smaller than they actually are, and more detailed views do not contain all the data necessary for full analysis.
Because you do not typically use the Sensor for full-packet analysis, the snaplen is set to 250 bytes by default. This
enables TCP/IP headers and some application-level headers to be captured and viewed for a larger number of packets.
However, because the Sensor performs packet sampling, it is not useful to view a full sequence of packets. In either
case, setting snaplen on the Shark or Sensor does not affect the accuracy of the flow data sent to the Profiler.
This chapter describes how to configure Cascade appliances and the Steelhead appliance into an integrated solution for
traffic monitoring and troubleshooting. When you integrate Cascade appliances and the Steelhead appliance into your
environment, you can successfully analyze the traffic on your network for capacity planning and troubleshooting, and
thus realize the benefits of optimization. This chapter includes the following sections:
“Steelhead Appliance and Cascade Appliances Overview” on page 63
“Cascade Appliance Deployment Considerations” on page 66
“Configuring Steelhead Appliance for Flow Data Export” on page 69
Note: In RiOS v7.0.1 and later, RSP was replaced with Virtual Services Platform (VSP). VSP comes preinstalled in the Steelhead
EX appliance. For more information about VSP, see the Steelhead EX Management Console User’s Guide.
When you use CascadeFlow, the Steelhead appliance sends four flow records for each optimized TCP session to the
NetFlow collector: ingress and egress for the inner channel connection, and ingress and egress for the outer channel.
A pass-through connection still sends four flow records even though there are no separate inner and outer channel
connections. In either case, the Profiler, Express, and Gateway merges these flow records together with flow data
collected for the same flow from other devices.
Figure 5-1. NetFlow v9
For additional details about ifindex values, see “SNMP Integration for Flow Sources” on page 73.
In-Path Deployments
In an in-path configuration, you deploy Steelhead appliances in the physical path of the client and server, where they
detect all traffic. You can source flow export from either the Steelhead appliance primary or auxiliary interface to the
Gateway or the Express. Enable flow export for all traffic on all Steelhead appliance interfaces that have traffic
traversing them: for example, lan0_0 and wan0_0 for a single in-path Steelhead appliance deployment.
Riverbed recommends that you enable simplified routing when using Cascade appliances and Steelhead appliance in-
path configurations. Simplified routing avoids situations where traffic can potentially run through the Steelhead
appliance more than once—commonly known as ricochet. When packet ricochet occurs, the same traffic is reported
by the Steelhead appliance multiple times, which causes an unexpected increase in bandwidth, packets, and other
traffic statistics in various Profiler reports. Ricochet can happen when you install the Steelhead appliance in a different
subnet from the client or server, and you do not configure the appropriate static routes to avoid traffic passing through
the Steelhead appliance multiple times on the way to and from the default gateway.
For more details about simplified routing and in-path deployments, see the Steelhead Appliance Management Console
User’s Guide and the Steelhead Appliance Deployment Guide.
For more details about virtual in-path deployments, see the Steelhead Appliance Deployment Guide.
In a virtual in-path deployment you must configure LAN subnets on each, because the LAN subnets behind each
Steelhead appliance are typically unique.
1. On the Steelhead appliance, choose Configure > Networking > Subnet Side Rules.
5. Select whether the subnet is on the LAN or WAN side of the appliance.
Out-of-Path Deployments
In an out-of-path deployment, you do not install the Steelhead appliance directly in the data flow between the client
and server. Because non-optimized traffic does not always pass through the Steelhead appliance, you must export
NetFlow from the router for the Profiler or Express to detect non-optimized and optimized traffic. Export only
optimized traffic from the Steelhead appliance. To export flow data to the Express or Gateway, you can export flow
from the primary or auxiliary interface.
As with virtual in-path configuration, you must enable SNMP fake index to properly report the direction of the
optimized traffic through the Steelhead appliance. You do not need to configure subnet side rules, because the out-of-
path Steelhead appliance detects only optimized traffic and never passes through any flows. For more details about
SNMP fake index, see “Virtual In-Path Deployments” on page 67.
For more details about out-of-path deployments, see the Steelhead Appliance Deployment Guide.
1. On the Steelhead appliance, choose Configure > Networking > Flow Export.
4. Select Flow Export to display the Networking > Flow Export page.
9. Click Apply.
1. On the Flow Export page, select the Add a New Flow Collector tab.
2. Enter the IP address and listening UDP port number of the Express or the Gateway.
4. For the desired interfaces, select All to export both optimized and non-optimized flow information.
When you click Apply and Add, the Management Console updates the running configuration. Your changes are
written to disk only when you save your configuration.
The Cascade Product Family includes a number of additional integrations that enable you to complete your deployment
by evaluating additional data or integrating with other management and reporting systems. This chapter includes
information about the most commonly used Cascade integrations:
“SNMP Integration” on page 73
“SNMP for Switch Port Discovery” on page 75
“Switch Port Discovery Supported Routers and Switches” on page 76
“Active Directory” on page 78
“REST API” on page 80
For additional assistance, contact Riverbed Professional Services.
SNMP Integration
This section describes the following SNMP integrations. It includes the following sections:
“SNMP Integration for Flow Sources” on page 73
“SNMP Integration for Device Management of Cascade Components” on page 74
“SNMP Integration for Sending Traps” on page 74
Ensure that you configure firewalls between the Express or Gateway and flow-reporting devices to enable SNMP
access between the Express or Gateway and remote device. If there are any access rules on the flow-reporting devices,
you must enable these access lists to allow SNMP access from the Express or Gateway.
For more information about configuring of the Profiler and Express for SNMP collection of these items, see the
Cascade Profiler and Cascade Express User’s Guide.
Airespace wireless 3500, 4101, 4102 No Yes APs appear as switch ports
controllers
Aruba wireless 5000, 6000 Yes Yes APs appear as switch ports
controllers
Cisco Catalyst 3500 3508GXL, 3524XL, 3548SL No Yes Layer-2 devices—only when
series you run Cisco IOS
Cisco 3550 (partial) 3400 with MetroBase, 3550- No Yes Running Cisco IOS
12T
Cisco Catalyst 3550 3550, 3560, 3550-24, 3550-48 Yes Yes Running Cisco IOS
(partial)
Cisco wireless 2006, 4112, 4124, 4136, 4402, No Yes APs appear as switch ports
controllers 4404
HP ProCurve 2312, 2324, 2510, 2512, 2524, No Yes ProCurve devices are widely
2600, 2610, 2626, 2650, 2800, supported (newer devices not
2810,2900, 2910al, 3124, in this list are likely
3324XL, 3400cl, 3500, 3500yl, supported)
4000, 4100GL, 4104GL,
4108GL, 4200vl, 5300XL,
5400yy, 5400zl, 6108, 6200yl,
6400cl, 6410cl, 6600, 6600ml,
8000, 8200zl
Juniper M-series Router All Yes No
series
Nortel Alteon AD series 180, 183, 184, AD2, AD3, AD4 Yes Yes
Nortel BayStack Hub 102, System 5000 No Yes Requires Advanced NMM
series
Nortel Business Switch -50, 110, 120, 210, 220, 1010, Yes Yes
series 1020
Nortel Centillion series 5000BH, 5005BH, C50, C100 No Yes v4.x/5.x or later
Nortel Ethernet 2526, 2550, 3510, 4524, 4526, Yes Yes
Routing/BaystackYes- 4548, 4550, 5510, 5520, 5530
Yes-
Nortel Routing, Accelar 1050, 1100, 1150, 1200, 8106, Yes Yes For 8600, code for switch
Family 8110, 8603, 8606, 8610, 8610co support must be v3.2 and
later
Nortel Baystack Switch 303, 304, 350, 380, 410, 420, No Yes
series 425, 450, 460, 470, BPS
Active Directory
The Profiler provides a user identity feature that maps active directory (AD) user names with IP addresses. This feature
enables you to view:
the users associated with an end station on the network (Figure 6-2).
all the end stations that a user has logged into (Figure 6-3).
Figure 6-2. Users Logged into a Given Host for a Selected Time Period
Figure 6-3. Hosts That a Given User Logged into for a Selected Time Period
This feature relies on the security audit events obtained from one or more Microsoft active directory domain
controllers. You can send this event data directly to the Profiler from a domain controller, or for AD-2008, an event
collector host. Riverbed provides a service application named Cascade AD Connector that forwards the appropriate
events from a domain controller, or event collector, to the Profiler.
REST API
Cascade v10.0.5 and later includes a REST API for the Shark and Profiler. Using REST API, you can perform such
activities as:
Packet captures on Shark
Traffic reports on Profiler
WAN optimization reports on Profiler
Appliance configuration
You can see more information about specific functions of the REST API directly on your appliance at
https://{Profiler or Shark address}/rest/api/index.php.
Cascade appliance service monitoring simplifies discovering, modeling, and configuring monitoring for enterprise
applications. This chapter describes how you can account for the analytic license limit when mapping services. This
chapter also provides best practices for how to stay within these limits and which specific metrics to use.
This chapter includes the following sections:
“Analytic License Limits per Profiler Platform” on page 81
“Understanding the Analytics License Limits” on page 82
“Reducing the Number of Metrics” on page 83
“Conditions Required for Baseline Establishment” on page 85
“Determining Which Metrics to Use” on page 85
This chapter assumes you are familiar with the Cascade Profiler and Cascade Express User’s Guide.
Express Up to 5000
The available analytic policy metrics number includes the total number of analytic policy metrics to be tracked system
wide. It includes the following:
All metrics tracked through service configuration, up to eight metrics PER segment monitored
All metrics tracked through performance and availability policy configuration:
– Link congestion, up to two metrics per policy configured
– Link availability, up to two metrics per policy configured
Using the example shown in Figure 7-1, five metrics are selected (Figure 7-2) for each of the segments during service
discovery for the SharePoint service.
Figure 7-2. Five Metrics for SharePoint Service
For the backend segments, DBTransactions and AuthenticationService, there are a total of 10 metrics used (five
metrics times two segments). However, for SharePoint-Web, there are three end-user locations. Because it is necessary
to monitor each location individually, this yields a total of fifteen metrics (five metrics time three locations). The total
number of metrics used to monitor the SharePoint service is twenty-five.
A location with a 100 end users is more representative of a larger enterprise network. If there are 100 end-user
locations, the SharePoint service requires over 500 metrics (510 metrics to be exact) for monitoring.
You can view the number of metrics on a running system:
Note: The Commit Changes to Service Page only shows how many metrics are added when the service is committed. It does
not display the total used or how many are still available.
– You can reduce the number of locations you use for a specific service. Figure 7-5 shows how to reduce the
number of locations during discovery for any service by choosing a subset of the end-user locations to
monitor.
Figure 7-5. Reducing the Number of Locations on the Customize Monitoring on the Locations Page
Note: Both methods cause a reduction in the number of configured policies configured.
Not tracking by groups - You can turn off by-group tracking and track all front-end metrics as one item instead
of a detailed breakdown by groups. This might make sense if all sites or groups have similar characteristics (for
example, response time) when attaching to the front end of the application. To turn off by-group tracking, edit
and deselect the Track By End-User checkbox on the front-end end-user component.
Note: You continue to receive a list of clients that have an impact if an analytic has an error.
Reducing monitoring - You can reduce the number of metrics being monitored by eliminating a metric per end-
user location and a metric for each back-end segment in the service. Figure 7-6 shows four metrics configured by
default and four additional metrics you can configure. Turning off only one of these metrics, particularly if there
is a large number of end-user locations, can result in a large reduction in metrics you use.
Figure 7-6. Default and Configurable Metrics on the Customize Monitoring on the Metrics Page
As mentioned earlier, you can aggregate locations into regions. You do not reduce the number of metrics you have, but
you can more easily manage the Services Dashboard. If you have hundreds of locations in the ByLocation group, you
can create a ByRegion group type instead. Specify the group type to represent the end-user locations on the General
Settings page. The default setting specifies the ByLocation group type.
Bandwidth Yes
Applications with low connectivity rates - For back-end segments for which applications have connectivity
between only a few servers, or front-end segments for which only a few clients are connected at a time, the active
connection rate is very low, and the tolerance band might be very tight. You might detect alerts when there is a
very minor change in connectivity (one new session connects longer than what is normal).
For these situations, you can disable this metric, or you can increase the tolerance band and add an appropriate
noise floor to the metric. The noise floor can help control minor fluctuations. Figure 7-7 shows a segment that has
only a few connections active per second, with a raised tolerance to 5 for low and 6 for high, and an added noise
floor of four connections per second.
Figure 7-7. Metric for a Low Connectivity Rate Segment
Active connection rate metric consideration without weekly seasonality - If you are trying to keep the number
of alerts low, Riverbed recommends that you not disable the active connections metric until after the weekly
baseline is set. The baseline is three weeks and one day of data.
UDP applications - For UDP applications, the TCP health and TCP performance measurement-based metrics do
not work. You can disable TCP resets, TCP retransmissions, and response time. For UDP segments that have
periodic bandwidth, you can enable the bandwidth metric.
Back-end segments with continuous communications - For many back-end segments, you can enable the
average application throughput per connection metric. This metric tracks the bandwidth that is consumed during
the active parts of the session. You are alerted when the baselined value dips below the threshold. This dip can
indicate that less data is transferred, which can indicate that the application efficiency has dropped, and this can
have an impact on user experience.
Single-transaction-oriented TCP sessions - For application segments that tend to set up a new TCP session for
each transaction, you can enable the average connection duration metric. This metric tracks the duration of the
connections and alerts you if it dips below that baseline. For this type of segment, tracking new connections in
addition to active connections can also be beneficial.
Revisit metrics and tuning after three weeks of data - Although three days and one hour of data are required
for the analytic metrics to initialize, it takes three weeks and one day for the analytics to begin using a weekly
baseline. This baseline becomes more predictable when you monitor weekly seasonality is monitored (for
example, lower traffic volumes on the weekend). Tuning and final decisions on which metrics might not be best
for the segment are made after this time period.
Understanding the characteristics of your application - To better understand the characteristics of the
segments on your application, you can run service-level-objective (SLO) reports after the segments have
initialized. The SLO reports enable you to see the baselined periodicity of each metric. If the segment has not yet
initialized, you can run reports to gain a better understanding of the segment characteristics. Running reports in
this manner helps you to choose which metrics to use per segment and to fine-tune after initialization.
Troubleshooting Cascade appliances can be a complex process involving looking at multiple different areas of the
product.
In its simplest form, the Profiler is divided into two distinct areas: the Web-based UI and the supporting infrastructure
(system processes, scripts, and so on). Problems can occur in one area only or across multiple areas. For example,
identifying why specific data is missing from a report might reveal a problem with the way the report is being run (a
UI-based problem), a problem with the underlying query processing engine (an infrastructure-related problem), or a
combination of the two.
This chapter includes troubleshooting information in the following areas:
“RTT Values Not Available” on page 87
“Not Receiving Reports by Email” on page 88
“DNS Names Not Being Resolved in Reports” on page 88
“Reports Are Not DNS-Resolving All Addresses” on page 88
“Data in Reports Seems Inconsistent” on page 89
“Sensor Protocol Violations” on page 90
“Communication Issues” on page 90
“Switch Port Discovery Troubleshooting” on page 91
Retransmits during the initial flow setup - The Profiler does not show RTT information if there is retransmitted
information during the initial flow setup. If the Profiler does not know which packet is the correct packet to use,
there is no way to accurately calculate RTT information.
Delay between the packets - If the delay between the SYN, SYN-ACK, ACK, and DATA packets is too great
(multiple minutes), the RTT timer might expire and RTT information is not calculated.
Drops questionable values - The Profiler takes a conservative approach and drops values that are questionable.
Flows that start before the initial startup time - Because RTT information is calculated only during the initial
flow setup, any flows that started before the beginning of the report time frame do not include RTT information:
for example, a report from 14:00:00-15:00:00 that includes flows that started prior to 14:00:00 do not show RTT
information.
2. In its UI Preferences settings, you must configure each user account to resolve IP addresses to DNS names.
The following are options for DNS resolution in UI Preferences:
Resolve host names using DNS - Turns on the use of DNS to resolve an IP address into a host name.
Resolve host names for hosts managed by DHCP - Uses the optional Cascade DHCP integration to use the
information provided during DHCP imports for name resolution.
Suppress DHCP/DNS search domains from resolved host names - Suppresses the display of the listed search
domains (for example, riverbed.com) when showing names.
number of DNS resolution requests the Profiler sends to a DNS server at one time.
maximum number of addresses the Profiler attempts to resolve addresses for.
Riverbed recommends that you set these values to 500 each to prevent overwhelming the DNS server. This mean that
the Profiler does not attempt to resolve more then 500 rows from any one table and sends up to 500 requests at one
time. You can increase these values to allow more addresses to be processed.
Be aware that the Profiler waits only one second for responses from DNS servers, to prevent slow DNS servers from
delaying the return of reports. Any addresses that are not resolved before the time expires do not display the associated
DNS name.
– Routing issues - The Profiler must detect all the details of each flow that it reports on to provide accurate
information. When you have asymmetric routing (where traffic takes one path from client-to-server and a
different path from server-to-client), the Profiler can miss one side of the conversation. This results in
inaccurate information from reports.
Different data resolution - While the Profiler provides several different data resolutions many other devices do
not provide multiple resolutions or do not allow detailed control over which resolution you use. Comparing a
report from two different resolutions (for example, one hour on the Profiler and five minutes on a router) is very
likely to result in differences in reported values.
Note: If the issue is time sensitive—it only occurs when backups are also running—you must perform the test around the same
time that the issue occurred.
Lack of time synchronization - If one Shark, Sensor, or Gateway is unable to NTP synchronize with the
Profiler, the time on that device can drift sufficiently from the Profiler time. The Profiler then has difficulty
ensuring that the data being sent is for the same time slice the Profiler is currently processing. You must ensure
that no firewall or ACL are blocking NTP.
Communication Issues
The Cascade appliances communicate with each other on select ports. These ports must be open between the Profiler
and the remote device for all functions to work correctly. The following primary ports are used for communications
among devices:
TCP/41017 - Used to pass data back and forth between the Profiler and remote devices such as the Shark and
Gateway. You must open this port bidirectionally between devices.
TCP/8443 - Used to facilitate the exchange of SSL keys between the Profiler and remote devices such as the
Gateway and Sensor. You must open this port bidirectionally between devices.
UDP/123 - Used for NTP synchronization between the Profiler and the remote devices such as the Shark and
Gateway. The Profiler acts as the NTP server for the remote devices.
If anything is blocking communications on the specified ports, that portion of the Profiler system does not work
correctly. For example, if UDP/123 (NTP) is blocked between the Profiler and Shark, the time on the Shark is likely
to drift, resulting in inaccurate reports.
To ensure that a port is open, use the following telnet and CLI commands:
[mazu@cascade-gateway etc]$ telnet 10.38.7.8 41017
Trying 10.38.7.8...
Connected to 10.38.7.8.
Escape character is '^]'.
^]
telnet> quit
Connection closed.
In this example, the connection was successful, and the CLI output shows port TCP/41017 is open between the host
and 10.38.7.8. Had the port been closed, the conversation might have looked like this:
[mazu@cascade-gateway etc]$ telnet 10.38.7.2 41017
Trying 10.38.7.2...
telnet: connect to address 10.38.7.2: connection refused
Command output includes information about whether or not the device is reachable and supported. You can give
Riverbed Support the output of the command for additional information.
For more details, see “Additional Cascade Appliance Integration” on page 73.
This appendix explains various aspects of licensing the Cascade Product Family. It includes the following sections:
“Licensing Overview” on page 93
“License Installation” on page 94
“Other Device License Installation” on page 95
“Assigning Licenses” on page 95
“Manual License Installation” on page 95
“Automatic License Upgrades” on page 96
“Evaluation Licenses” on page 96
“Licenses Available” on page 96
Important: Flow per minute limits changed in February 2013. For information about the Cascade Product Family prior to February
2013, consult documentation for that software release.
Licensing Overview
The Profiler, Gateway, and Sensor systems have the following types of licenses:
“Runtime Licenses” on page 93
“Capacity Licenses” on page 94
“Option Licenses” on page 94
Runtime Licenses
All devices require a runtime license. Runtime licenses permit basic system operation. If you do not have a runtime
license installed, your system operates in a basic mode, which enables basic UI interaction, but does not process new
flow data.
Capacity Licenses
Capacity licenses control the maximum amount of data the device can process. Capacities are set based on the
maximum number of flows that the device can process each minute (for example, an F1 Gateway can accept no more
than 100,000 flows per minute).
Different types of Cascade devices have different flow capacities:
Gateway - 100,000, 200,000, 500,000, 800,000, and 1,400,000 flows per minute
Gateway-VE - 90,000 flows per minute
Express 360 - 15,000, 30,000, 60,000, and 90,000 flows per minute
Express 460 - 15,000, 30,000, 60,000, 90,000, and 120,000 flows per minute
Profiler - 150,000, 300,000, and 600,000 flows per minute
Profiler-VE - 90,000 flows per minute
Enterprise cluster - 800,000 or more, depending on the number of analyzer or expansion modules you have
installed
Some Cascade appliances do not require a capacity license. The Sensor and Shark enable data to be processed up to the
capacity of the system without requiring additional capacity licenses.
Option Licenses
Option licenses enable you to add functionality to the Express, Profiler, Profiler-VE, or Enterprise Profiler cluster.
Examples of functionality that requires an option license include:
Profiler or Express analytics
Profiler or Express security module
SAN storage support
The security module and analytics licenses do not require you to purchase an additional part number. The Express,
Profiler, and Enterprise Profiler cluster appliances support the security module through the runtime license and include
the analytics license (as of February 2013).
License Installation
License installation varies depending on the type of hardware the license is installed on. Cascade appliances systems
based on current-model hardware use an automatic license server that provides license keys directly to the Cascade
appliance or through a Web portal that enables you to manually install the license. Older hardware relies on manually
installed licenses, using instructions provided with the license.
Assigning Licenses
When you purchase Cascade appliance hardware, all appropriate licenses are assigned to each unit. The build-time
license (indicating what type of system the unit is: for example, the Gateway) is installed during the manufacturing
process and you can not change it. Additional licenses (capacity and option licenses) are also generated during the
manufacturing process but are not installed directly on the system at that time.
You can retrieve the additional licenses on the Riverbed licensing portal. For example, if you purchase a single CAG-
2260 with an F1 capacity license, a license is generated on the Gateway that enables it to support 100,000 flows per
minute. This license is not activated, but it is available to you in the Riverbed licensing portal. The license
automatically downloads to the Gateway when the Gateway licenses are synchronized with the portal.
Sometimes you must manually assign licenses to specific hardware. This helps ease the process of installing different
models of hardware in different locations.
For example, if you want to deploy 10 Gateways at sites around the world, each site requires a different capacity level.
You purchase four F4 Gateways, two F3 Gateways, and four F1 Gateways. If each Gateway is automatically assigned
an operational and a capacity license, you must ensure that the appropriate units are shipped to the appropriate
destinations. However, with the flexible licensing model, all you have to do is ship a Gateway to each location. When
the Gateway is at the location and installed, you can use the licensing portal to assign capacity licenses to the Gateways
installed at the other locations. You can deploy different capacity licenses (or option licenses) to different systems
without interacting directly with each system prior to deployment.
Evaluation Licenses
You can evaluate all of the licenses Cascade appliances support. Evaluation licenses are provided with specific
expiration dates, after which the license no longer works. You can test out some functionality, such as monitoring
analytics, for a specific period of time. The expiration date is displayed on the license in the licensing portion of the UI.
Because all licenses are installed with expirations, you can install the runtime license as a temporary license. When the
runtime license expires, the system stops functioning correctly. You then must install a license with a later expiration
date or no expiration.
Licenses Available
This section describes the licenses available for different Cascade appliances.
S
SAN 32
Sensor
model options 15
overview 7
protocol violations 90
Sensor-VE
overview 7
Shark
model options 15
overview 7
passthru 60
REST API 80
virtual 7
Shark-VE
model options 15
overview 7
Simplified routing
Cascade appliances 66
Snaplen 61
SNMP
best practices 74
switch port discovery 75
SNMP integration
device management of Cascade
components 74
flow sources 73
sending traps 74
SNMP interface persistence 65
SPAN 52
Staffing needs 11
Standard
model options 13
Steelhead appliance 63
flow data export 69
in-path deployment 66
Storage
flow 31
local 32
Subnet side rules 67
Switch port discovery
SNMP 75
supported routers and switches 76
troubleshooting 91
T
Tap deployment
best practices 58
Technical publications, contacting 4
Technical staffing needs 11
Technical support, contacting 4
V
VACL
configuration examples 58
port mirroring configuration on Catalyst 6500
running Cisco IOS 59
port mirroring configuration on Cisco 6500
Running CatOS 58
VSP 63