Tecspg 3204
Tecspg 3204
TECSPG-3204
Cisco Webex App
Questions?
Use Cisco Webex App to chat
with the speaker after the session
How
1 Find this session in the Cisco Live Mobile App
2 Click “Join the Discussion”
3 Install the Webex App or go directly to the Webex space Enter your personal notes here
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Agenda
➢ System Architecture: System anatomy & health
➢ Operating System & Configuration: IOS-XR & configuration models
➢ Control, Management, Security: Processing of control & exceptions
➢ Transit Packet/Frame Journey: Life of L3/L2 unicast/multicast
➢ MPLS Operation: Processing, forwarding & L3/L2 service operation
➢ Troubleshooting: Diagnostics, counters, drops, and packet capture
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Not covered
• We can have separate discussions about:
• Clustering
• Satellites in pdf
• 1st generation hardware
• 2nd generation (Typhoon) is in pdf
• SIP-700 and TDM
• ISM & VSM
• Technology and protocol troubleshooting [will focus on platform specifics]
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Introduction
• About us
➢ Mike Mikhail, Delivery Architect, [email protected]
➢ Aleks Vidakovic, Principal Engineer, [email protected]
➢ Thomas Wang, Technical Leader, [email protected]
➢ Available at “Meet the Engineer” for 1:1 discussions
➢ Interests: SRv6, SP platforms & technologies, API’s, ML, Telemetry
• ASR 9000 today
➢ The Best SP & WAN edge router. High bandwidth Ethernet services platform
➢ HW forwarding, high density: ~3B pps per LC, >4Tbps/slot
➢ Distributed processing and distributed forwarding
➢ Continued dev, rich roadmap, a wealth of new features
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
ASR 9000 is known as
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Agenda
➢ System Architecture: System anatomy & health
➢ Operating System & Configuration: IOS-XR & configuration models
➢ Control, Management, Security: Processing of control & exceptions
➢ Transit Packet/Frame Journey: Life of L3/L2 unicast/multicast
➢ MPLS Operation: Processing, forwarding & L3/L2 service operation
➢ Troubleshooting: Diagnostics, counters, drops, and packet capture
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
1 System
Architecture
System
Components &
Sub-Systems
ASR 9900 Family
Chassis, cards, power, air flow
ASR 9901 ASR 9902 ASR 9903 ASR 9904 ASR 9906 ASR 9910 ASR 9912 ASR 9922
RP Built-in 1+1 RP 1+1 RP 1+1 RSP 1+1 RSP 1+1 RSP 1+1 RP 1+1 RP
Rack units 2 2 3 6 14 21 30 44
Air flow Front to back Front to back Front to back Right to left Front to back Front to back Front to back Front to back
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
1.5 Tbps/slot
“Fixed” hw:
RP+Fabric
+LC+ports
ASR 9901 ASR 9904 ASR 9906 ASR 9010 ASR 9910 ASR 9912 ASR 9922
RP Built-in 1+1 RSP 1+1 RSP 1+1 RSP 1+1 RSP 1+1 RP 1+1 RP
Rack units 2 6 14 21 21 30 44
Air flow Front to back Right to left Front to back Front to back Front to back Front to back Front to back
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
1.5 Tbps/slot
“Fixed” hw:
RP+SP+LC+
ports+bays
ASR 9001 ASR 9904 ASR 9006 ASR 9010 ASR 9910 ASR 9912 ASR 9922
RP Built-in 1+1 RSP 1+1 RSP 1+1 RSP 1+1 RSP 1+1 RP 1+1 RP
Fabric Built-in 2x RSP 2x RSP 2x RSP 6+1 6+1 6+1
Line cards & 4x SFP+
2 4 8 8 10 20
ports 2x MPA
Rack units 2 10U 2-post 23” 10 21 21 30 44
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
System Health: Inventory
components and serial numbers
RP/0/RSP0/CPU0:rasr9906-1y#admin show platform
Sun Jan 1 10:05:42.505 PST
Location Card Type HW State SW State Config State
----------------------------------------------------------------------------
▪ Subscribe to Cisco 0/0
0/1
A99-8X100GE-CM
A99-48X10GE-1G-SE
OPERATIONAL
OPERATIONAL
OPERATIONAL
OPERATIONAL
NSHUT
NSHUT
notifications 0/2
0/RSP0
A99-10X400GE-X-SE
A9K-RSP5-SE
OPERATIONAL
OPERATIONAL
OPERATIONAL
OPERATIONAL
NSHUT
NSHUT
– www.cisco.com/cisc 0/RSP1 A9K-RSP5-SE OPERATIONAL OPERATIONAL NSHUT
0/FC0 A99-SFC3-T OPERATIONAL N/A NSHUT
64Bit eXR
o/support/notification 0/FC1
0/FC2
A99-SFC3-T
A99-SFC3-T
OPERATIONAL
OPERATIONAL
N/A
N/A
NSHUT
NSHUT
s.html 0/FC3
0/FC4
A99-SFC3-T
A99-SFC3-T
OPERATIONAL
OPERATIONAL
N/A
N/A
NSHUT
NSHUT
0/FT0 ASR-9906-FAN OPERATIONAL N/A NSHUT
▪ Field notices? 0/FT1
0/PT0
ASR-9906-FAN
A9K-AC-PEM-V3
OPERATIONAL
OPERATIONAL
N/A
N/A
NSHUT
NSHUT
Power Shelf 0:
================================================================================
Power Supply --------Input------- ----Output---- Status
Module Type Volts A/B Amps A/B Volts Amps
================================================================================
0/PT0-PM0 6kW-AC 0.0/0.0 0.0/0.0 0.0 0.0 FAILED or NO PWR
0/PT0-PM1 6kW-AC 209.4/0.0 7.9/0.0 53.7 29.0 OK
0/PT0-PM2 6kW-AC 209.1/0.0 8.0/0.0 54.0 28.9 OK
================================================================================
Location Card Type Power Power Status
Allocated Used
Watts Watts
================================================================================
0/0 A99-8X100GE-CM 915 778 ON
0/1 A99-48X10GE-1G-SE 470 336 ON
0/2 A99-10X400GE-X-SE 1370 852 ON
0/3 - 10 - RESERVED
▪ Use Telemetry or SNMP to check on power population and status
▪ Use Power Calculator http://tools.cisco.com/cpc/launch.jsp . If changing chassis power version/type [v2/v1, AC/DC]:
http://www.cisco.com/en/US/docs/routers/asr9000/hardware/installation/guide/asr9kIGmaintaining.html#wp1323197
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
System Health: Heat Dissipation & Alarms
Fans, temperature sensors, and alarms
RP/0/RSP0/CPU0:rasr9906-1y# admin show environment temperatures RP/0/RSP0/CPU0:rasr9906-1y# admin show environment fan
Sun Jan 1 10:33:08.316 PST Sun Jan 1 10:50:53.013 PST
================================================================================ =====================================================================================
Fan speed (rpm)
Location TEMPERATURE Value Crit Major Minor Minor Major Crit
Location FRU Type FAN_0 FAN_1 FAN_2 FAN_3 FAN_4 FAN_5 FAN_6
Sensor (deg C) (Lo) (Lo) (Lo) (Hi) (Hi) (Hi) -------------------------------------------------------------------------------------
-------------------------------------------------------------------------------- 0/FT0 ASR-9906-FAN 7974 7976 7984 7978 7978 7905 7980
0/RSP0 0/FT1 ASR-9906-FAN 8032 7995 8059 8010 7970 7977 7974
AIR_Outlet 33 -10 -5 0 80 85 100
Inlet 24 -10 -5 0 70 85 100
Hotspot 38 -10 -5 0 90 93 95 RP/0/RSP0/CPU0:rasr9906-1y# admin show environment leds
0/RSP1 RP/0/RSP0/CPU0:rasr9906-1y# admin show led
AIR_Outlet 34 -10 -5 0 80 85 100 Sun Jan 1 11:08:32.125 PST
Inlet 26 -10 -5 0 70 85 100 =============================================================
Hotspot 36 -10 -5 0 90 93 95 Location LED Name Mode Color
0/FC1
SKB0_HOTSPOT 37 -10 -5 0 80 83 85 =============================================================
Inlet 22 -10 -5 0 60 65 80 0/0
DIE_FabSwitch0 52 -10 -5 0 115 125 140 0/0-Status LED WORKING GREEN
0/FC2 0/1
SKB0_HOTSPOT 38 -10 -5 0 80 83 85 0/1-Status LED WORKING GREEN
Inlet 22 -10 -5 0 60 65 80 0/2
DIE_FabSwitch0 52 -10 -5 0 115 125 140 0/2-Status LED WORKING GREEN
...
0/FT0 0/RSP0
Inlet 27 -10 -5 0 105 115 120 0/RSP0-Fail LED WORKING OFF
Hotspot 28 -10 -5 0 105 115 120 0/RSP0-ACO LED WORKING OFF
0/FT1 0/RSP0-Alarm Minor LED WORKING OFF
Inlet 30 -10 -5 0 105 115 120 0/RSP0-Alarm Major LED WORKING RED
Hotspot 31 -10 -5 0 105 115 120 0/RSP0-Alarm Critical LED WORKING OFF
0/PT0-PM0 0/RSP0-FC Fault LED WORKING OFF
PM0-Inlet Temperature - -10 -5 0 61 65 70
PM0-Outlet Temperature - -10 -5 0 80 92 105
PM0-Heat Sink Temperature - -10 -5 0 105 112 120
0/PT0-PM1 RP front
PM1-Inlet Temperature 19 -10 -5 0 61 65 70
PM1-Outlet Temperature 43 -10 -5 0 80 92 105 status LED
PM1-Heat Sink Temperature 56 -10 -5 0 105 112 120
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
ASR 9000 System & Switch Fabric Overview
SFC2 SFC3
Fabric Capacity per SFC 215G 600G
Fabric Capacity 1.29T N+1 3.6T N+1
Per Line Card Slot 1.51T N+0 4.2T N+0
Fabric Redundancy N+1 N+1
Dedicated Fabric Cards
Tomahawk
Typhoon
LC Support LightSpeed
Tomahawk
LightSpeed Plus
ASR 9904 ASR 9006 ASR 9010 ASR 9906 ASR 9910 ASR 9912 ASR 9922
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
System Architecture
9904, 9006, 9010
Arbitration
Fabric Interface
Fabric Interface
and VOQ 2: Arbitration and VOQ
Crossbar
Fabric
3: Fabric Grant ASIC
Crossbar
4: load-balanced Fabric
ASIC
transmission across
Arbitration
fabric links
RSP1
Fabric Interface
and VOQ
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
RSP880
Third generation RP and fabric
1G/10G SFP+ LEDs
EOBC ports for nV Cluster USB Type A Status, Alarm
Aux
IEEE 1588, GPS
SyncE, IEEE1588 master and slave
10/100M Copper Ethernet Console
BITS/J.211
Sync 0, Sync 1
RJ45
Management
Ethernet
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
RSP880 Architecture
The RP and fabric
▪ Intel x86 8-core proc.
@2 GHz
▪ SE and TR versions
– SE: 32 GB RAM
– TR: 16 GB RAM
▪ Storage
– 2x 32 GB SSD
– 1x 8 GB USB
▪ EOBC on panel
– 4 SFP+ EOBC ports for
clustering
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
RSP5/RP3 Front Panel
A9K-RSP5-SE/TR
• RAM: -TR 24G; -SE 40G • Alarm output serial port
• 2x BITS ports on RJ-45 • 1x USB, 1x CMP
• 100Mbps, 1588 port – RJ-45 • 2x Management ports on RJ-45
• TOD – RJ-45 • AUX & Console on RJ-45 connectors
• 10Mhz on SMA • LED’s for major/critical and normal oper alarms or states
• 1PPS on SMA
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
RSP5-X/RP3-X Front Panel
A99-RP3-X-SE/TR
• New PIDs: A9K-RSP5-X-TR / SE and A99-RP3-X-TR /SE (-TR RAM 24G; -SE RAM 48G)
• Supported Release: IOS-XR 64-bit 7.6.2 (August 2022)
• RSP5-X & RP3-X brings Class C timing compliant to ASR 9K Modular Chassis
5Th Generation modular Line card already supports Class C timing
• Use case for 5G applications (Mobile-Back Haul & 5G transport) requiring Class C timing
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Route Switch Processors and Route Processors
RSP5-X RSP5 RSP880-LT
(IOS-XR 64Bit) (IOS-XR 64Bit) (IOS-XR 32/64Bit)
Description RP and Fabric ASIC RP and Fabric ASIC RP and Fabric ASIC
1.2T + 1.2T (9006/9010) 1.2T + 1.2T (9006/9010) 400G + 400G (9006/9010)
Switch Fabric
1.8T + 1.8T (9904) 1.8T + 1.8T (9904) 700G + 700G (9904)
Bandwidth
600G + 600G + 3.0T (9906/9910)* 600G + 600G + 3.0T (9906/9910)* 200G per RSP/SFC (9906/9910)
Intel (Skylake EP) Intel Skylake EP Intel (Ivy Bridge EP)
Processor
8 Cores 2GHz 8 Cores 2GHz 4 Cores, 2.4GHz
-TR: 24GB -TR: 24GB -TR: 16GB
RAM
-SE: 48GB -SE: 40GB -SE: 32GB
SSD 2 x 128GB SSD 2 x 128GB SSD 2 X 128GB SSD
Punt BW 40GE 40GE 40GE
Timing LS+: Class C Available at XR762 Class B Class B
Platforms
ASR 9904, 9006, 9010, 9910, 9906 ASR 9904, 9006, 9010, 9910, 9906 ASR 9904, 9006, 9010, 9910, 9906
Supported
3rd Party App
Supported Supported Not Supported
Support
*For line card slots equipped with Tomahawk line cards, switch fabric bandwidth is equal to RSP880-LT
RSP used in ASR9910/9906/9904/9006/9010, RP in ASR9922/9912
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Route Switch Processors and Route Processors
RSP used in ASR9910/9906/9904/9006/9010, RP in ASR9922/9912
RSP880
RP2 RSP5 RP3
A99-RSP
Description 3rd Gen RP and Fabric ASIC 4th Gen RP and Fabric ASIC
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
RP
Processor and storage: RSP5-SE
RP/0/RSP0/CPU0:rasr9906-1y# show version RP/0/RSP0/CPU0:rasr9906-1y# show filesystem
Sun Jan 1 13:27:47.999 PST Sun Jan 1 13:28:11.786 PST
Cisco IOS XR Software, Version 7.7.2 File Systems:
Copyright (c) 2013-2022 by Cisco Systems, Inc.
USB Size(b) Free(b) Type Flags Prefixes
Build Information:
4060278784 4036325376 flash-disk rw disk0:
Built By : ingunawa
Built On : Wed Oct 26 12:57:07 PDT 2022 20507914240 20433276928 flash-disk rw apphost:
Built Host : iox-ucs-057 0 0 network rw tftp:
Workspace : /auto/srcarchive14/prod/7.7.2/asr9k-x64/ws 0 0 network rw ftp:
Version : 7.7.2 1015304192 1011585024 flash rw /misc/config
Location : /opt/cisco/XR/packages/ 23653642240 18958163968 harddisk rw harddisk:
Label : 7.7.2
SSD
3921260544 3913465856 harddisk rw harddiska:
3921260544 3913465856 harddisk rw harddiskb:
cisco ASR9K () processor
System uptime is 5 weeks 15 hours 17 minutes
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
RP
Redundancy
RP/0/RSP0/CPU0:rasr9906-1y# show redundancy
Sun Jan 1 13:26:57.892 PST
Redundancy information for node 0/RSP0/CPU0:
==========================================
Node 0/RSP0/CPU0 is in ACTIVE role
Partner node (0/RSP1/CPU0) is in STANDBY role
Standby node in 0/RSP1/CPU0 is ready
Standby node in 0/RSP1/CPU0 is NSR-ready
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
RP
Redundancy failover example: RSP0 removed
RP/0/RSP1/CPU0:Dec 16 20:57:47.049 : ce_switch_srv[53]: %PLATFORM-CE_SWITCH-6-UPDN : Interface 8
(Peer_RSP) is down
RP/0/RSP1/CPU0:Dec 16 20:57:47.091 : sc_reddrv[392]: %PLATFORM-REDDRV-6-RESET_STANDBY : Active
is going to reset standby peer node node0_RSP0_CPU0
RP/0/RSP1/CPU0:Dec 16 20:57:47.093 : rmf_svr[386]: %HA-REDCON-6-GO_ACTIVE : this card going
active
RP/0/RSP1/CPU0:Dec 16 20:57:47.094 : sysmgr[93]: %OS-SYSMGR-5-NOTICE : This standby node is
going active at Mon Dec 16 20:57:47 2013
RP/0/RSP1/CPU0:Dec 16 20:57:47.400 : dao_tmp[56]: Card Removed 0/RSP0/CPU0
RP/0/RSP1/CPU0:Dec 16 20:57:47.449 : sysmgr[93]: %OS-SYSMGR-5-NOTICE : This node is active now
at Mon Dec 16 20:57:47 2013
RP/0/RSP1/CPU0:Dec 16 20:57:47.450 : sysmgr[93]: %OS-SYSMGR-5-NOTICE : Critical failover elapsed
time 0.353 seconds (86.080% idle)
RP/0/RSP1/CPU0:Dec 16 20:57:47.457 : isis[1003]: %ROUTING-ISIS-6-INFO_STARTUP_START : Cold
controlled start beginning
RP/0/RSP1/CPU0:Dec 16 20:57:47.468 : ospf[1011]: %ROUTING-OSPF-5-HA_NOTICE : Process 100:
Attempting Cisco NSF-enabled restart of vrf default
RP/0/RSP1/CPU0:Dec 16 20:57:47.470 : ospf[1011]: %ROUTING-OSPF-5-HA_NOTICE : Process 100:
Signaled PROC_AVAILABLE
RP/0/RSP1/CPU0:Dec 16 20:57:47.784 : mpls_ldp[1043]: %ROUTING-LDP-3-ERR_LPTS_FILT : Failed to
remove LPTS filter for local 10.101.111.1 remote=10.101.112.1: Host is down
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
ASR 9000 5th Gen Fabric PIDs
• ASR 9922 • ASR 9906
• A99-RP3-SE/TR • A9K-RSP5-SE/TR
• A99-SFC3 • A99-SFC3-T
• ASR-9922-FAN-V3
• ASR 9904 / ASR 9010 / ASR 9006
• ASR 9912 • A9K-RSP5-SE/TR
• A99-RP3-SE/TR A99-SFC3
• A99-SFC3
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
The Integrated Switch Fabric
ASR 9010, 9006, 9904
instance 0
▪ 3-Stage fabric
– Allows for variable number of FIA’s
and FIA links on LC instance 1
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
The Dedicated Switch Fabric
ASR 9922, 9912
Fabric Stage
Fabric Stage
▪ 3-Stage fabric
Linecard
Linecard
– Allows for variable number of
FIA’s and FIA links on LC
Fabric Stage
Fabric Stage
– SFC1: 110G [Typhoon gen]
Linecard
Linecard
– SFC2: 215G [Tomahawk gen]
– SFC3: 600G [Lightspeed gen]
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
The Hybrid Switch Fabric
RSPs
ASR 9910, 9906
Fabric Stage
Fabric Stage
▪ 3-Stage fabric
Linecard
Linecard
– Allows for variable number of
FIA’s and FIA links on LC
Fabric Stage
Fabric Stage
– SFC1: 110G [Typhoon gen]
Linecard
Linecard
– SFC2: 215G [Tomahawk gen]
– SFC3: 600G [Lightspeed gen]
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Slot Address
Internal slot address, slot mask, and fabric group ID
LC4-18 6-20
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Slot Address
Internal slot address, slot mask, and fabric group ID
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Slot Address
Internal slot address, slot mask, and fabric group ID
Slot Slot Mask Slot Slot Mask
9910/12/22
00000000 0000
LC1 1 0000000010 0x0002
LC1-18 3-20
LC0 0 0000000001 0x0001
LC0 2 0000000100 0x0004
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Fabric Statistics
Link statistics
Instance 0 Instance 1
RP/0/RSP0/CPU0:rasr9000-2w-a#show controllers fabric
crossbar statistics instance 1 location 0/RSP0/CPU0
Tue Dec 17 02:59:36.376 EST
Port statistics for xbar:1 port:2
==============================
Hi priority stats (unicast)
===========================
Ingress Packet Count Since Last Read : 17347357500
Ingress Channel Utilization Count : 5
Output Buffer Queued Packet Count : 1
Egress Packet Count Since Last Read : 19006087016
Egress Channel Utilization Count : 4
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Fabric Mode
High bandwidth, or mixed
• Default:
• Max 1024 VQI per system
• Multicast traffic uses the first 5 fabric cards
• highbandwidth:
• Max 2048 VQI per system (➔ only 3rd Generation and later allowed)
• Multicast traffic uses the first 5 fabric cards
• A99-highbandwidth:
• Max 2048 VQI per system
• Multicast traffic uses all 7 fabric cards (➔ only A99 3rd Generation and later allowed)
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
ASR 9000 3rd Gen 5 & 7-Fabric LC Interworking
1.075 < 1.44
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
ASR 9000 Mixed 5 & 7-Fabric LC Interworking
• 7-fabric LC uses 5 fabrics if there is a 5-fab LightSpeed Plus or Tomahawk LC in system
1.075T with 5 fabrics
All Tomahawk LCs interoperate at full
throughput w/ fabric redundancy; except 860G w/ 4 fabrics
for 12x100GE LC, which will be at 1.075T 3T with 5-fabrics
215G Prevents “high priority” packet
drop due to fabric congestion
Tomahawk LC 215G
(5-fabric) 600G
SM15 3.2T LSP LC
SKB (7-fab)
• Any chassis with 4 fabric cards (asr9010, asr9006 with dual RSP880):
• 71Gbps per 100G port (total of 852 Gbps; fabric connection 4x230Gbps = 920 Gbps)
• Syslog:
• LC/0/0/CPU0:Dec 27 12:05:16.429 EST: pfm_node_lc[299]: %FABRIC-FIA-1-
RATE_LIMITER_ON : Set|fialc[163907]|0x1072000|Insufficient fabric
capacity for card types in use - FIA egress rate limiter applied
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
ASR 9000 HW Offer: 3rd Generation LC Portfolio
200G to 1.2T per slot
A99-12X100GE
12 Ports of QSFP28 1.2 Tbps LAN No Class B
4 Ports of QSFP28 400 Gbps
A9K-4X100GE
A9K-4X100GE-TR/SE
A9K-24X10GE-1G-TR/SE
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
ASR 9000 3rd Gen TomaHawk 100G Options
4x100GE Octane 4x100GE SkyHammer
MOD200/400 + MPA
8x100GE Octane 12x100GE SkyHammer
A9K-4X100GE-TR A9K-MOD200-TR/SE w/ MPA
A9K-4X100GE-SE A9K-MOD400-TR/SE w/ MPA A9K-4X100GE
PIDs
A9K-8X100GE-TR A9K-MPA-1X100GE A99-12X100GE
A9K-8X100GE-SE A9K-MPA-2X100GE
4x 100G 2x 100G 4x 100G
Interface
8x 100G 4x 100G 12x 100G
1000W (Typical) 445W (Typical) 450W (Typical)
Power
1100W (Typical) 660W (Typical) 1350W (Typical)
Chassis Support ASR 99xx & 90xx ASR 99xx & 90xx ASR 99xx & 90xx
MACSec
Yes Yes No
Capabale
CFP2 and CPAK (w/ CFP2-CPAK
Optics CPAK. Breakouts option available QSFP28. 4x10GE breakout available
adapter). Breakout option available
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
ASR 9000 3rd Gen TomaHawk 10G Options
MOD400 48p PowerGlide MOD200 24p PowerGlide
Interface 40x 10GE 48x 10GE / 1GE 20x 10GE 24x 10GE / 1GE
Chassis
ASR 99xx & 90xx ASR 99xx & 90xx ASR 99xx & 90xx ASR 99xx & 90xx
Support
Fabric variants 5-fabric only 5- & 7-fabric 5-fabric only 5-fabric only
Scale Tomahawk SE & TR scale Tomahawk SE & TR scale Tomahawk SE & TR scale Tomahawk SE & TR scale
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
ASR 9000 3rd Gen TomaHawk 10G/1G Options
MOD200/400 48p PowerGlide
A9K-MOD200-TR/SE or A9K-MOD200-TR/SE or
A9K-48X10GE-1G-TR/SE or
PIDs A9K-MOD400-TR/SE w/ A9K-MOD400-TR/SE w/
A99-48X10GE-1G-TR/SE
A9K-MPA-20X1GE (2) A9K-MPA-32X1GE (2)
Chassis
ASR 99xx & 90xx ASR 99xx & 90xx ASR 99xx & 90xx
Support
MACSec No Yes No
Scale Tomahawk SE & TR scale Tomahawk SE & TR scale Tomahawk SE & TR scale
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
3rd GEN Line Cards: A9K-8X100GE-TR/SE
8x 100G CPAK Line Cards
A9K-8X100G
• SE and TR versions
SE System Edge: More memory, scalable QoS
TR Transport: Basic QoS, mostly sufficient for Transport or core-facing
• Port breakout
1x 100G or 2x 40G or 10x 10G with breakout cables (or passive panel)
Router(config)#hw-module 0/2/cpu0 port 3 breakout 10xTenGigE
• Power control per slice [110W/slice]
Router(config)#hw-module power saving slice 3 location 0/2/cpu0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Line Cards: 3rd Generation [Tomahawk NP]
12x 100G QSFP Line Card
A9K-8X100G
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Line Cards: 3rd Generation [Tomahawk NP]
8x & 4x 100G CPAK Line Cards
A9K-8X100G
A9K-4X100G
CPAK TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Tomahawk Line Card
Notes on 8x 100G line card
• SE and TR versions
• SE System Edge: More memory, scalable QoS
• TR Transport: Basic QoS, mostly sufficient for Transport or core-facing
• Port breakout
• 1x 100G or 2x 40G or 10x 10G with breakout cables (or passive panel)
• Router(config)#hw-module 0/2/cpu0 port 3 breakout 10xTenGigE
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Line Card Architecture
8x 100 GE: A9K-8X100G LC CPU
CPAK 0
Slice 0
CPAK 1
PHY NP0 FIA0
CPAK 2
Slice 1
CPAK 3
PHY NP1 FIA1
Switch
…
CPAK 4 Fabric
Slice 2
CPAK 5
PHY NP2 FIA2
Up to
14x115G
CPAK 6
Slice 3
CPAK 7
PHY NP3 FIA3
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Line Card Architecture
4x 100 GE: A9K-4X100G LC CPU
CPAK 0
Slice 0 PHY NP0 FIA0
CPAK 1
Slice 1 PHY NP1 FIA1
Switch
…
CPAK 2 Fabric
Slice 2 PHY NP2 FIA2
Up to
14x115G
CPAK 3
Slice 3 PHY NP3 FIA3
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Tomahawk Interface Flexibility
Single CPAK Product ID → Three SW selectable Options
Configurable 100GE Interconnect
Options for 10GE interfaces: LGX
Interface HunGigE 0/x/y/z Panel
CPAK-100G-LR4 DUPLEX SC TO
Breakout Interface Convention: LC /SC/ST SM
Rack/Slot/Bay/Port (phy)/Breakout#
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Line Cards: 3rd Generation [Tomahawk NP]
Modular Line Card [2 MPA Bays]
IPoDWDM A9K-MPA-1X200GE
MPAs
20x1GE
2x10GE
A9K-MPA-2X100GE 4x10GE
8x10GE
1x40GE
2x40GE
A9K-MPA-20X10GE
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Line Card Architecture
Modular line card: A9K-MOD400-SE and A9K-MOD400-TR
LC CPU
Supported
MPA
2x100GE Tomahawk
1x100GE
NP FIA
2x40GE
20x10GE
8x10GE
Switch
…
Fabric
Supported
MPA
2x100GE Up to
1x100GE Tomahawk
NP FIA 14x115G
2x40GE
20x10GE
8x10GE
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
ASR 9901 Architecture
A router + LC in 2 RU
8x1GE
SFP
12x1/10GE
SFP/SFP+
Tomahawk
NP
FIA
Switch Fabric
1x100GE
QSFP28/QSFP+
EOBC LC RP
1x100GE CPU CPU
QSFP28/QSFP+
12x1/10GE Tomahawk
SFP/SFP+ NP
FIA
8x1GE
SFP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Dense 1G/10GE Dual Rate Tomahawk LCs
Trident/Typhoon migration to Tomahawk
200Gbps
SFPs0-7 Ports0-7 Octal PHY0
…
SFPs24-31 Ports24-31 Octal PHY3
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
48x and 24x10G/1G Port Configuration Rules
• By default all ports are 10G
• Set of 12 ports are grouped together as follows {P0 to P11}, {P12 to P23}, {P24 to
P35}, {P36 to P47}.
• 1G port configuration rule: If the first port in any set of 12 ports is configured as 1GE,
then the entire group of 12 ports have to be configured as 1GE
• 10G Ports have to be configured in sets of four. Starting ports could be P0, P4, P8,
P12 and so on
• Valid examples: {P0, P1, P2, P3}, {P4, P5, P6,P7}, {P8,P9,P10,P11}.
• Invalid examples: (P1, P2, P3, P4), {P2, P3, P4, P5} and so on.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
48x/24x 1G/10G Port Configuration Examples
24-port Line card
P0 P1 P2 P3 P4 P5 P6 P7 P8 P9 P10 P11 P12 P13 P14 P15 P16 P17 P18 P19 P20 P21 P22 P23 CLI to configure ports as
shown
1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 12X1,12X10
10G 10G 10G 10G 1G 1G 1G 1G 1G 1G 1G 1G 10G 10G 10G 10G 10G 10G 10G 10G 1G 1G 1G 1G 4X10,8X1,8X10,4X1
10G 10G 10G 10G 10G 10G 10G 10G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 8X10,16X1
10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 1G 1G 1G 1G 10G 10G 10G 10G 16X10,4X1,4X10
10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 24X10
P0 P1 P2 P3 P4 P5 P6 P7 P8 P9
48-port Line card
P10 P11 P12 P13 P14 P15 P16 P17 P18 P19 P20 P21 P22 P23 P24 P25 P26 P27 P28 P29 P30 P31 P32 P33 P34 P35 P36 P37 P38 P39 P40 P41 P42 P43 P44 P45 P46 P47
CLI to configure ports
as shown
1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 12X1,12X10,12X1,12X10
10G 10G 10G 10G 1G 1G 1G 1G 1G 1G 1G 1G 10G 10G 10G 10G 10G 10G 10G 10G 1G 1G 1G 1G 10G 10G 10G 10G 1G 1G 1G 1G 1G 1G 1G 1G 10G 10G 10G 10G 10G 10G 10G 10G 1G 1G 1G 1G 4X10,8X1,8X10,
4X1,4X10,8X1,8X10,4X1
10G 10G 10G 10G 10G 10G 10G 10G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 10G 10G 10G 10G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G
24X10,24X1
10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G 1G
36X1,12X10
10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 10G 48X10
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
ASR9000 Edge Linecard Silicon Evolution
1st Gen
Trident
120G Trident Octopus Santa Cruz PowerPC
90nm,15 Gbps 130nm,60 Gbps 130nm,90 Gbps Dual Core,1.2 Ghz
2nd Gen
Typhoon
360G Typhoon Skytrain Sacramento PowerPC
55nm,60 Gbps 65nm,60 Gbps 65nm,220 Gbps Quad Core,1.5 Ghz
3rd Gen
Tomahawk
1.2T Tomahawk Tigershark SM15 X86
28nm,240 Gbps 28nm,200 Gbps 28nm,1.2 Tbps 6 Core, 2 Ghz
NPU FIA Fabric LC-CPU
4th Gen
LightSpeed
3.2T LightSpeed SKB X86
16nm,400 Gbps 16nm,3.6 Tbps 8 Core, 2.2 Ghz
5th Gen
LightSpeed+
4T LightSpeed+ SKB
SKB X86
7nm,400 Gbps 7nm,3.6
16nm,3.6Tbps
Tbps 8 Core, 2.2 Ghz
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
ASR 9000 4/5th Gen NPU Architecture
Pluggable physical interfaces
PHY
• speeds: 10GE, 25G, 40GE, 100GE, 400GE
• colors: gray, CWDM, DWDM, Tunable
Network Processor
• forwarding and feature engine for the LC NP • New, 22 billion
LightSpeed Plus
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
ASR 9000 4/5th Gen Line Card Architecture
• Runs distributed control plane protocols
• Main forwarding engine for L2 and L3 lookups for increased scale
• Multicast replication toward Optics • BFD, CFM, ARP
• User level QoS and security features • Receive FIB table from RP and program
CPU hardware forwarding table
Switch
NPUP1 P1
PHY P2
FIA P2
P3
BE
Fabric
ASIC
TM P3
BE
• Dedicated queue ASIC – TM (traffic manager) • Provides data connection to switch fabric
per NPU for QoS functions • Manage VoQ, Superframe and loadbalancing
• User configurable queue on TM data traffic across switch fabric
• Default Qort Queue always created • Mcast replication table for replication toward NPs
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
A99-32x100G-TR – Preparing for Zettabyte Era
Innovation Leading the Market
4 x capacity increase per system
Cisco NPU 4 in 1 (16nm): Integrated NPU, PHY, FIA, Memory
10GE, 40GE, 100GE and 400GE densities w/ rich features
Native support for 10/25/40/100/400G
Hitless FPD upgrade possible (no LC reload)
Integrated 100GE FEC
Sub Sec ISSU
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Line Cards: 4th Generation (Lightspeed)
A99-32X100GE–TR
A99-16X100GE–TR
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Line Cards: 4th Generation (Lightspeed) 43.75G x 2x8 lanes x 7 fab
Slice 0
= 4.9T (raw)
CPU = 4.2T (actual)
QSFP 0 Retimer Lightspeed NPU 0
QSFP 3 Switch x8
Fabric 0 x8
QSFP 4 Retimer Lightspeed NPU 1 (SKB)
QSFP 7 x8
x8
QSFP 8 Retimer Lightspeed NPU 2 x8
QSFP 11
x8
QSFP 12
x8
Retimer Lightspeed NPU 3
QSFP 15
Slice 7
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
ASR 9000 5th Gen Platform Overview
Cisco NPU 4 in 1 (7nm): Integrated NPU, PHY, FIA, Memory 5th Generation Multi-rate 100GE,
Native support for 10/25/40/100/400G 400GE line cards
Drastically lower power profile: ~ .3W/GE A9K/A99-4HG-FLEX-TR/SE
o Offer power saving & power down capability per NPU
A9K-8HG-FLEX-TR/SE
A9K-20HG-FLEX-TR/SE
New Compact Systems
A99-32X100GE-X-SE/TR
ASR 9903
ASR 9902
A99-10X400GE-X-SE/TR
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
ASR 9000 5th Gen Line Cards Release
PORTS MACSEC TIMING RSP/RP/SFC CHASSIS
9904, 9906
7.1.15
32x QSFP28 No Class B RSP5, RP3 9910, 9912
A99-32X100GE-X-SE/TR/FC SyncE SFC3 9922
7.1.15
5x QSFP-DD Yes Class C RSP5, RP3
9912, 9922, 9006
A9K-20HG-FLEX-SE/TR/FC 15x QSFP28 SyncE RP2, SFC3
9010
7.1.15
2 Ports QSFP-DD Class C
Yes RSP880*, SFC2 9912, 9922, 9006
A9K-8HG-FLEX-SE/TR/FC 6 Ports QSFP28 SyncE RP2, RSP880-LT* 9010
9904, 9906
Class B RSP5, RP3
7.3.1
A99-10x400GE 10x QSFP-DD Yes 9910, 9912
A99-10X400GE-X-SE/TR/FC SyncE SFC3 9922
7.4.0
16x SFP28 Yes Class C 9912, 9922, 9006
A9K-4HG-FLEX-SE/TR/FC RSP880*, SFC2
24x SFP+ SyncE 9010
A99-4HG-FLEX-SE/TR/FC RP2, RSP880-LT*
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
ASR 9000 5th Gen LC Portfolio
400G to 4T
Ports Bandwidth Combo MACSec Timing RSP / RP
Ports
4 Ports QSFP28
MACSec RSP5, RSP880-LT,
A9K-4HG-FLEX-SE/TR 16 Ports SFP28 (25G) 400 Gbps Yes Class C
RSP880, RP3, RP2
A99-4HG-FLEX-SE/TR 24 Ports SFP+
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
ASR 9000 5th Gen 100G Offers
A99-10X400GE-X-SE A99-32X100GE-X-SE A9K-20HG-FLEX-SE A9K-8HG-FLEX-SE ASR 9903 + 2T PEC
Line Cards A99-10X400GE-X-TR A99-32X100GE-X-TR A9K-20HG-FLEX-TR A9K-8HG-FLEX-TR
ASR 9902
Systems
Max 100G 40* 32 20 8 36 8
Ports
MACSec Yes No Yes Yes Yes Yes
Support
PTP/Timing Class-C Class-C Class-C Class-C Class-C Class-C
Systems
*Breakout; **Roadmap
TECSPG-3204
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
ASR 9000 5th Gen LC 1G Options
* CC’d
** Not committed
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
5th Gen Line Cards: A9K-20HG-FLEX-SE/TR
400G/200G/100G Multi-Rate
Ports: 0/7/8/12/19
A9K-20HG-FLEX-SE/TR
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
A9K-20HG-FLEX-SE/TR (5-fabric) LC Architecture
(when used in 9922, 9912, 9910 & 9906)
5x Slices
CPU
QSFP-DD
QSFP28 PHY LightSpeed Plus NP0 FIA
QSFP28
QSFP28
QSFP-DD
QSFP28 PHY LightSpeed Plus NP1 FIA
QSFP28 Switch
QSFP28
Fabric 0
(SKB)
QSFP-DD
QSFP28 PHY LightSpeed Plus NP2 FIA
QSFP28
QSFP28
QSFP-DD
QSFP28 PHY LightSpeed Plus NP3 FIA
QSFP28
QSFP28
QSFP-DD
QSFP28 PHY LightSpeed Plus NP4 FIA
QSFP28 600G/fab x 5 fab
QSFP28
= 3.0T
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
A9K-20HG-FLEX-SE/TR (5-fabric) LC Architecture
(when used in 9010 & 9006)
5x Slices
CPU
QSFP-DD
QSFP28 PHY LightSpeed Plus NP0 FIA
QSFP28
QSFP28 Dual RSP5
= 2.4T
QSFP-DD
QSFP28 PHY LightSpeed Plus NP1 FIA
QSFP28 Switch
QSFP28 RSP0
Fabric 0
(SKB)
QSFP-DD
QSFP28 PHY LightSpeed Plus NP2 FIA
QSFP28
QSFP28
RSP1
QSFP-DD
QSFP28 PHY LightSpeed Plus NP3 FIA
QSFP28
QSFP28
Single RSP =
QSFP-DD
1.2T
QSFP28 PHY LightSpeed Plus NP4 FIA
QSFP28
QSFP28
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
A9K-20HG-FLEX-SE/TR (5-fabric) LC Architecture
(when used in 9904)
5x Slices
CPU
QSFP-DD
QSFP28 PHY LightSpeed Plus NP0 FIA
QSFP28
QSFP28 Dual RSP5
= 3.0T
QSFP-DD
QSFP28 PHY LightSpeed Plus NP1 FIA
QSFP28 Switch
QSFP28 RSP0
Fabric 0
(SKB)
QSFP-DD
QSFP28 PHY LightSpeed Plus NP2 FIA
QSFP28
QSFP28
RSP1
QSFP-DD
QSFP28 PHY LightSpeed Plus NP3 FIA
QSFP28
QSFP28
Single RSP =
QSFP-DD
1.5T
QSFP28 PHY LightSpeed Plus NP4 FIA
QSFP28
QSFP28
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
ASR 9000 Line Card Backpressure
Egress NP congestion → backpressure to ingress FIA →
Packet is en-queued in the dedicated VoQ →
No impact of the packet going to different egress NP --- No head-of-line-block issue
One VoQ set (4 queues P1-3, BE)
for each entity in the system
Backpressure: egress NP → egress FIA →
fabric Arbiter → ingress FIA → VoQ
Ingress side of LC1 Egress side of LC2
CPU CPU 1
PHY NP0 NP0 PHY
P1 2
P2
P3
PHY NP1 BE
NP1 PHY
FIA FIA
PHY NP2 P1
P2
Switch NP2 PHY 3
P3
BE
Fabric
PHY NP3 NP3 PHY
Packet going to different egress NP put into different VoQ set → Congestion on
one NP won’t block the packet going to different NP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
ASR 9000 5th Gen Line Card Compatibility
LSP Line Card
A9K-4HG-FLEX-SE
A99-10X400GE-X-SE A99-32X100GE-X-SE A9K-20HG-FLEX-SE A9K-8HG-FLEX-SE A9K-4HG-FLEX-TR
Support of: A99-10X400GE-X-TR A99-32X100GE-X-TR A9K-20HG-FLEX-TR A9K-8HG-FLEX-TR A99-4HG-FLEX-SE
(7-fabric) (7-fabric) (5-fabric) (5-fabric) A99-4HG-FLEX-TR
(5 and 7-fabric)
ASR 9922, 9912, 9910,
9906 & 9904 chassis ✓ ✓ ✓ ✓ ✓ (5 & 7 fabric)
4000 Gbps
10 W/Gbps 3200 Gbps
10 100nm 4000 Gbps
90nm
9 90nm
8 80nm
Silicon (nm)
1200 Gbps
6 60nm
55nm
5 50nm
4 40nm
28nm
3 30nm 2.5 W/Gbps
2 20nm
360 Gbps 1.5 W/Gbps
16nm 40 Gbps
1 10nm
0.5 W/Gbps 7nm
40 Gbps 0.39 W/Gbps
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
ASR 9000 5th Gen Line Card Power Saving
• ASR 9000 5th Gen LC does not require a specific Power System version!
➢ Chassis must have enough power budget available to accommodate new line
cards/commons
TECSPG-3204
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
ASR9k Power Compatibility Matrix A9K-AC-PEM-V2: 4 PSUs/PEM
A9K-AC-PEM-V3: 3 PSUs/PEM
A9K-DC-PEM-V2: 4 PSUs/PEM
A9K-DC-PEM-V3: 4 PSUs/PEM
A9K-AC-PEM-V2 ✔ ✔ ✔ ✔ ✔
AC Power
PEM
A9K-AC-PEM-V3 ✔ ✔ ✔ ✔ ✔
Power PWR-3KW-AC-V2 ✔ ✔ ✔ ✔ ✔
Supply PWR-6KW-AC-V3 ✔ ✔ ✔ ✔ ✔
A9K-DC-PEM-V2 ✔ ✔ ✔ ✔ ✔
DC Power
PEM
A9K-DC-PEM-V3 ✔ ✔ ✔ ✔ ✔
Power PWR-2KW-DC-V2 ✔ ✔ ✔ ✔ ✔
Supply PWR-4.4KW-DC-V3 ✔ ✔ ✔ ✔ ✔
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
ASR9922/9912/9910/9906: Tomahawk to
LightSpeed Plus Migration
Up to 4.2T per slot LSP based System
Tomahawk LC can co-exist ASR9910/9906 ASR9912 ASR9922
with LightSpeed LCs in the New: 2x RSP5, 5xSFC3-(S/T) New: 7x SFC3, RP3 New: 7xSFC3, RP3, V3 fan tray
same chassis! Reuse: V1 FTs, V3 PEMs Reuse: V1 FTs, V2/V3 PEMs Reuse: V2/V3 PEMs
✚ A99-32GE-X-SE/TR LC
1.5T per slot o
o
3.2T BW per LC w/ 7xFabrics
3.2T BW per LC w/ 6xFabrics
Tomahawk based System
✚ A9K-20HG-FLEX-SE/TR Combo LCs**
Today: Tomahawk LCs o 2T BW per LC w/ 5 x Fabrics
o 2T BW per LC w/ 4xFabrics
RSP880/RP2/SFC2
9906/9910: V3 PEMs, V1 FTs ✚ A9K-8HG-FLEX-SE/TR Combo LC **
9922: V2/V3 PEMs, V2 FTs o 800G BW per LC w/ 5xFabrics
9912: V2/V3 PEMs, V1 FTs o 800G BW per LC w/ 4xFabrics
✚ A9K-8HG-FLEX-SE/TR*** Combo LC
860G per slot o 800G BW per LC w/ Dual RSP5
o 800G BW per LC w/ Single RSP5
RSP880 based System
Today: Tomahawk LC ✚ A9K-4HG-FLEX-SE/TR**** Combo LC
2x RSP880, o 400G BW per LC w/ Dual RSP5
V2 PEMs, V2 FTs o 400G BW per LC w/ Single RSP5
* It's allowed to have RSP5 and RSP880 in the same chassis during RSP migration.
** No specific requirements for Power System version; just check power budget using Power Calculator
*** A9K-8HG-FLEX-SE/TR can be used with Dual RSP880, but needed RSP5 to provide fabric redundancy
**** A9K-4HG-FLEX-SE/TR can be used with Dual RSP880
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
ASR9904: Tomahawk to LightSpeed Plus
Migration Up to 4.2T per slot LSP based System
New: 2x RSP5*,
Tomahawk LC can co-exist
Reuse: V1 FTs, V2 PEMs
with LightSpeed LCs in the
same chassis! ✚ A99-10X400GE-X-SE/TR LC
o 4T BW per LC w/ Dual RSP5
Trident / Typhoon cards are not o 2.1T BW per LC w/ Single RSP5
supported with LightSpeed Plus!
✚ A99-32X100-X-SE/TR LC
o 3.2T BW per LC w/ Dual RSP5
o 1.8T BW per LC w/ Single RSP5
* It's allowed to have RSP5 and RSP880 in the same chassis during RSP migration.
** A9K-8HG-FLEX-SE/TR can be used with Dual RSP880, but needed RSP5 to provide fabric redundancy
*** A9K-4HG-FLEX-SE/TR and A99-4HG-FLEX-SE/TR can be used with Dual RSP880
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
2 RU ASR 9902 Compact System
FAN
9902 Board
PSU LC CPU
SDRAM SSD Tornado ASIC
24GB 128GB (Arbiter)
1.6kW
Switch Fabric
1.6kW
SFP+
SFP+
SFP+ QSFP28
SFP+
SFP+
SFP+
SFP+
SFP+
SFP+
SFP+
SFP+
SFP+ QSFP28
SFP+
SFP+
SFP+
FAN
SFP28 QSFP28 SFP+ SFP+ QSFP28 SFP28
QSFP28 SFP+
SFP+ SFP+SFP+ QSFP28
SFP+ SFP+ SFP+
SFP+ SFP+
SFP+ QSFP-DD SFP+ SFP+ QSFP-DD SFP+
SFP+
SFP+
SFP28 SFP+
SFP+ SFP+ SFP28
SFP+
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
ASR 9902 Data Plane Architecture
2x Slices 100G 12x10G 8 x 25G 400G 120G 400G 540G (raw)
SFP28 “0”
SFP28
LC CPU
8x
1 x QSFP-DD
3 x QSFP28
128GB
12 x
SFP+ “18”
PHY
SFP+ “24”
X24
SFP+
12 x
SFP+ “30”
1 x QSFP-DD
3 x QSFP28
QSFP28 “36”
and
(Arbiter)
8x
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
ASR 9902 Port Configuration Options (FCS)
QSFP-DD
QSFP28
Slice #0 (NPU 0)
Group 1 Group 2 Group 0
Slice#1 (NPU 1)
1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 41 43 45 47
0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46
Group
Group 2 Group 3 Group 1 Group 3 2
SFP28 SFP+ Not used
RP/Fabric/Power/Fan Redundancy
Front-to-Back Airflow
➢ 2T PEC: up to 3.6T per chassis ➢ Integrated ports: Full feature parity with ASR 9000 platform
Maximum capacity, high-rate ports • 16x QSFP28: 100/40/4X25/4X10GE
• 5x QSFP-DD: • 20x SFP+: 10GE Line-rate MACSec support
400/200/100/40/4X25/4X10GE
• 15x QSFP28: 100/40/4X25/4X10GE ➢ Integrated Switch Fabrics:
• 2x Fabric ASICs for G.8273.2 Class C, Telecom Profiles, FlexE support
➢ 800G PEC: up to 2.4T per redundancy for 5G Mobile Edge
chassis
High density of low-rate ports 1GE support via either option: nV satellite solution,
• 32x SFP+/SFP28: 25/10GE
Smart SFP on 10G/25G ports (roadmap)
• 16x SFP+: 10GE
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
ASR 9903 Hardware Architecture
SDRAM SSD SDRAM SSD
PSU
LSP LSP LSP LSP
LSP LSP LSP LSP LSP
NPU NPU NPU NPU
NPU NPU NPU NPU NPU FAN
1.6kW
PHY PHY PHY PHY
PHY PHY PHY PHY PHY
PSU QSFP28
QSFP28 QSFP28
QSFP28
SFP+
SFP+
SFP+
SFP+
SFP+
SFP+
SFP+
SFP+
QSFP28
QSFP28
QSFP28
QSFP-DD QSFP-DD QSFP-DD QSFP-DD QSFP-DD
FAN
1.6kW
QSFP28
QSFP28 QSFP28
QSFP28 SFP+ SFP+ QSFP28
QSFP28 QSFP28 QSFP28
QSFP28 QSFP28
QSFP28 QSFP28
QSFP28
QSFP28 QSFP28 SFP+ SFP+ QSFP28 QSFP28
QSFP28 QSFP28 QSFP28 QSFP28
QSFP28 SFP+ SFP+ QSFP28
QSFP28 SFP+
SFP+ SFP+
SFP+
SFP+ SFP+
2T Port Expansion Card
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
ASR 9903 – 2T Port Expansion Card
400G/200G/100G Multi-Rate
Ports: 0/4/8/12/16
Port group#0 Port group#1 Port group#2 Port group#3 Port group#4
(NPU 4) (NPU 5) (NPU 6) (NPU 7) (NPU 8)
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
ASR 9903 800G Port Expansion Card
SFP28
SFP+
1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 41 43 45 47
0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
ASR 9000 Compact Platforms Details
ASR9901 ASR9902 ASR9903
RP Single RP Dual RP Dual RP
Form-factor 2RU 2RU 3RU
Switch Fabric Single Fabric Single Fabric Redundant Fabric (see Architecture section)
Air flow Front-to-back Front-to-back Front-to-back
120G-456Gbps 800Gbps 1.6Tbps / 2.4Tbps / 3.6Tbps
Throughput (# of NPU)
(2 Tomahawk) (2 LightSpeed Plus) (4-6-9 LightSpeed Plus)
Depth 23.62” (600mm) 19” (483mm) 23.62” (600mm)
Power Supply (# of PSU) AC or DC (2) AC or DC (2) AC or DC (4)
QSFP-DD N/A Up to 2 (100GE mode) Up to 5 (400GE / 200GE / 100GE mode)
• 2x 100GE/40GE QSFP-DD / QSFP28 • 16x 100GE + 20x 10GE fixed ports
• 6x 100GE/40GE QSFP28 • 20x 100GE or 10x 200GE or 5x 400GE
• 2x 100GE
Ports • 16x 25GE / 10GE (using 2T PEC - Port Expansion Card)
• 24x 10GE / 1GE
(1GE/10GE/25GE/40GE/100GE) • 24x 10GE • 32x 25GE/10GE or 48x 10GE (using 800G
• 16x 1GE
• Mix of 10GE, 25GE, 40GE, 100GE PEC)
• Aggregated to 800Gbps • Mix of 10GE, 25GE, 100GE
MACSec support All 100GE,10GE, 1GE ports All 100GE, 40GE, 25GE, 10GE, 1GE ports All 400G, 100GE, 40GE, 25GE, 10GE ports
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
ASR 9000 Optics Use Cases and QSFP-DD
Distance
Copper / MMF /
SMF SMF SMF
AOC SMF
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Challenges of traditional network architecture
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
Routed Optical Networking - Simplified Architecture
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
ASR 9000 DCI Opportunity with QSFP-DD
Cisco’s Optical and WAN Transport DCI solutions are appropriate for any opportunity
involving connecting multiple data centers, colocation or cloud sites together
Sample Topology:
DCO/ZR/ZR+ DCO/ZR/ZR+
Data DC WAN Fiber Optic WAN DC Data
Center Fabric Transport Cable Transport Fabric Center
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
ASR 9000 Product Public Portals
• ASR 9000 Salesconect
• https://salesconnect.cisco.com/c/r/salesconnect/index.html#/program/PAGE-10319
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
nV Satellite
nV Satellite Overview
(Carrier class Virtual Chassis Fabric system)
One logical ASR 9000 nV System
SDAC Protocol Satellite
Satellite access port is
physical represented
access port by virtual
interfaces on
Satellite nv fabric links the Host as if
they were
Host (ASR9k) regular local
Self-managed Access interfaces
From end user point of view, satellite looks/feels/works like a ASR9K “remote or virtual” line
card. The interfaces on the satellite looks/feels/works the same as the interfaces on the local
ASR9K line cards
From end user point of view, Host and associated satellites is one virtual Router system.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
ASR 9000v “Satellite”
Host-satellite operation: Control CPU MAC-DA MAC-SA Control VID Payload/FCS CPU
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
ASR 9000 nV Technology Overview
SP Services/ Third-Party Services/
Content Content
Before: nV Technology After: nV Technology
Cisco
Prime IP NGN
Core
Access
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
The nV Satellite solution
Satellite 1 N x 100-GE
Satellite 2 N x 10-GE
Satellite 3 N x 1-GE
ASR 9000
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
ASR 9000v “Satellite”
Configuration view
RP/0/RSP0/CPU0:rasr9000-2w-a#show running-config interface GigabitEthernet100/0/0/9
. mtu 4484
vrf NV-MGMT Satellite control service-policy input DSCP Sample satellite
description NV SATELLITE MANAGEMENT VRF [optional] service-policy output DSCP interface config
address-family ipv4 unicast vrf TRAFFIC
! ipv4 address 192.10.1.1 255.255.255.0
! negotiation auto
. !
control-plane
Allow TFTP for .
management-plane interface TenGigE0/1/0/3
inband satellite upgrade
description ASR9000v Host-satellite
interface Bundle-Ether3 bundle id 3 mode on
allow TFTP ! bundle links
! .
. interface TenGigE0/1/1/3
interface Bundle-Ether3 The host-satellite description ASR9000v
vrf NV-MGMT bundle (ICL) bundle id 3 mode on
ipv4 point-to-point !
ipv4 unnumbered Loopback100 .
nv nv
satellite-fabric-link satellite 100 satellite 100
remote-ports GigabitEthernet 0/0/0-29 type asr9000v Satellite control
!
. Host control/TCP serial-number CAT1702U20H configuration
description r9000v-1y-a
interface Loopback100 address [optional] ipv4 address 10.100.111.100
vrf NV-MGMT !
ipv4 address 10.100.111.1 255.255.255.0 !
! .
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
nV Satellite: Monitoring
& troubleshooting
Monitoring: Basic status check
RP/0/RSP0/CPU0:TARDIS# show nv satellite status brief
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
Monitoring: Discovery protocol status check
RP/0/RSP0/CPU0:TARDIS# show nv satellite protocol discovery brief
Interface Sat-ID Status Discovered links
-------------- ------ ------------------------------ -----------------------
Hu0/1/0/0 100 Satellite ready Hu0/1/0/0
Hu0/1/0/1 100 Satellite ready Hu0/1/0/1
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
Monitoring: Control protocol status check
RP/0/RSP0/CPU0:TARDIS#sh nv satellite protocol control brief
Sat-ID IP Address Protocol state Channels
------ ------------ -------------- -----------------------------------------
100 100.100.100.100 Connected Ctrl, If-Ext L1, If-Ext L2, X-link,
VICL, DevMgmt, Inventory, EnvMon,
Alarm, Password, Topology,
RP/0/RSP0/CPU0:TARDIS#sh nv satellite protocol control
Satellite 100
-------------
Status: Connected since 2015/10/28 16:11:35.930
IP address: 100.100.100.100 (VRF: default)
Channels:
Control (0)
-----------
Channel status: Open
Messages sent: 15 (15 control), received: 14 (14 control)
Version: 0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
Monitoring: Check Satellite Inventory
RP/0/RSP0/CPU0:TARDIS(admin)#show inventory
...
Satellite chassis, fan tray,
NAME: "fantray SAT100/FT0/SP", DESCR: "Cisco NCS 5002 Series Router Fan Back" power module, optics included
PID: NCS-5002-FN-BK, VID: N/A, SN: N/A within normal ASR9K
inventory reports
NAME: "fantray SAT100/FT1/SP", DESCR: "Cisco NCS 5002 Series Router Fan Back"
PID: NCS-5002-FN-BK, VID: N/A, SN: N/A
NAME: "power-module SAT100/PM0/SP", DESCR: "Cisco NCS 5000 Series Router power AC 650W Back"
PID: NC5K-PAC-650W-BK=, VID: V01, SN: LIT1919198Z
NAME: "power-module SAT100/PM1/SP", DESCR: "Cisco NCS 5000 Series Router power AC 650W Back"
PID: NC5K-PAC-650W-BK=, VID: V01, SN: LIT1919199H
NAME: "Satellite Chassis NCS5002 ID 100", DESCR: "80-Port 10 GE + 4-Port 100GE NCS5002 Chassis"
PID: NCS-5002, VID: V00, SN: FOC1920R0V7
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
Debugging on the satellite
(When all else fails … telnet into the satellite)
In rare cases, when all else fails, you may need to telnet in-band into the satellite for debug. Note that, if discovery and IP connectivity is the
issue under debug, then a direct console may be needed to the NCS 5002 device. Once in, the satellite will show normal XR console. Only
“basic” show commands should be used here to avoid conflicts with nV host driven state and XR config mode is blocked.
RP/0/RSP0/CPU0:TARDIS#telnet vrf **nVSatellite 10.0.100.1
Trying 10.0.100.1...
Connected to 10.0.100.1. Direct in-band telnet from ASR9K
Escape sequence is '^^q’. IOS-XR prompt to satellite
assigned IP address
User Access Verification (“telnet satellite <n>” also supported)
ICL on the satellite side with the IP inherited from unnumbered association to a loopback interface
Always fetch “show tech-support sdac” first before the traces wrap!
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
Debug scenarios – On NCS5k satellite
RP/0/RP0/CPU0:Satellite#show sdac protocol discovery
Thu Oct 29 04:15:33.383 UTC
Interface HundredGigE0/0/1/2
--------------------------------
Status: Discovered
Satellite IPv4 Address: 10.0.100.1
Host IPv4 Address: 10.0.0.1
Vendor: Cisco System Inc Check the satellite’s view of
Remote ID: 1216
Remote MAC address: 001d.e5e9.2a4c
SDAC discovery and control
Chassis MAC address: e4c7.223f.0ba6 State machines
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
Debug scenarios – On NCS5k satellite
RP/0/RP0/CPU0:Satellite#show sdac internal intf-mode
Thu Oct 29 04:19:32.987 UTC
Interface Modes: Show mapping mode per interface
Interface | Poss Acc Port | Act Acc Port | Poss ICL | Act ICL Indicates which is Active ICL ,
-----------+---------------+--------------+----------+--------
Hu0/0/1/0 | N | N | Y | N
active access port etc
Hu0/0/1/1 | N | N | Y | N
Hu0/0/1/2 | N | N | Y | Y
Hu0/0/1/3 | N | N | Y | N
Te0/0/0/0 | Y | N | N | N
Te0/0/0/1 | Y | N | N | N
Te0/0/0/10 | Y | Y | N | N Show mapping from satellite
Front ports to ICL port
RP/0/RP0/CPU0:Satellite#show l2vpn xconnect
Thu Oct 29 04:25:53.018 UTC
Legend: ST = State, UP = Up, DN = Down, AD = Admin Down, UR = Unresolved,
SB = Standby, SR = Standby Ready, (PP) = Partially Programmed
Here access port is Te0/0/0/4 which is mapped to ICL Hu0/0/1/2. 6 is the internal sat
vlan that is added to switch the packets between satellite and host.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
Agenda
✓ System Architecture: System anatomy & health
➢ Operating System & Configuration: IOS-XR & configuration models
➢ Control, Management, Security: Processing of control & exceptions
➢ Transit Packet/Frame Journey: Life of L3/L2 unicast/multicast
➢ MPLS Operation: Processing, forwarding & L3/L2 service operation
➢ Troubleshooting: Diagnostics, counters, drops, and packet capture
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
2 Operating
System &
Configuration
IOS-XR Architecture
IOS XR Architecture Overview
cXR-Classis IOSXR with 32 Bit; eXR-extended IOSXR with 64 Bit
RP
Control Plane
• QNX-based System 64-bit IOS XR.
Admin Linux Linux
• No virtualization
QNX Linux
• 64-bit in ASR9000, NCS 5500,
NCS 5000, NCS 1000 and IOS XR IOS-XR
in NCS 6000 Admin Plane
Line Card
Linux VM
• Linux based
• Larger addressable memory LC-CPU LC-CPUs
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
IOS-XR 32 Bit Operating System
32-bit Kernel and distributed processes, addressable memory 4GB
▪ Micro-kernel
– QNX kernel
▪ Restartable processes
– A process may
start/terminate based on
configuration
– Scheduler keeps track
of process
starts/spawning/priority/
path
– A process can
crash/restart/patched
▪ Distributed processing
– Processes run on RP
and LC CPU’s
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
IOS-XR 64 bit Architecture Overview
Runs processes
Cisco developed responsible to perform
packages for core system diags, monitor env.
network functions variables, and manage
(BGP, MPLS, etc.) hardware components
XR VM Admin VM
Yocto packages First VM to be booted by
for standard Linux (Control Plane) (Admin Plane)
the Hypervisor, responsible
tools and libraries for the start and
(bash, python, maintenance of the Control
tcpdump, etc.). Plane VM
Hypervisor
64-bit Host OS
Routing Processor
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 118
From IOS to IOS-XR
From monolithic to micro-kernel
Control Plane Data Plane Management Plane
Control Plane Apps
Control Plane Data Plane Management Plane
Management Plane Applications
SSH
Forwarding Plane Apps Control Plane Data Plane Management Plane
SSH
HA Infrastructure
Host Service
L2 Drivers
Interface
Routing
Per.fMg
Netflow
SNMP
Alarm
LPTS
OSPF
IGMP
SSH
ACL
QoS
BGB
XML
ISIS
FIB
PIM
PFI
RIB
RIP
CLI
mt
Network Stack
OS Scheduler
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 119
IOS-XR Operating System
Kernel and distributed processes
or both JID
1
TID CPU Stack pri state
1 0 0K 0 Running
TimeInState
0:00:00:0000
HR:MM:SS:MSEC NAME
25:25:11:0433 procnto-smp-instr
1 2 1 0K 0 Running 0:00:00:0000 25:22:47:0535 procnto-smp-instr
– Mandatory or 1 3 2 0K 0 Running 0:00:00:0000 25:19:47:0529 procnto-smp-instr
configuration-
1 4 3 0K 0 Ready 0:00:00:0000 25:18:23:0806 procnto-smp-instr
1 5 2 0K 10 Receive 0:03:18:0905 0:00:00:0473 procnto-smp-instr
dependent (e.g. .
RP/0/RSP0/CPU0:rasr9000-2w-b#show processes location 0/RSP0/CPU0 | include bgp
OSPF) Thu Nov 21 12:27:52.017 EST
143 1 1 36K 10 Receive 25:35:35:0474 0:00:00:0035 bgp_policy_reg_agent
143 2 1 36K 10 Receive 25:43:46:0465 0:00:00:0000 bgp_policy_reg_agent
▪ Restartable 143
1048
3
1
0 36K 10 Receive
2 388K 10 Receive
25:43:46:0345
0:00:25:0434
0:00:00:0000 bgp_policy_reg_agent
0:00:00:0253 bgp
– Means also
.
RP/0/RSP0/CPU0:rasr9000-2w-b#show processes location 0/0/CPU0 | include arp
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 120
Processes
On an 8-core CPU [RSP880]
RP/0/RSP1/CPU0:ASR9006-2w-a.PE2_CE1#admin show processes location 0/RSP1/CPU0
Thu Feb 16 16:27:59.815 EST
JID TID CPU Stack pri state TimeInState HR:MM:SS:MSEC NAME
1 1 0 0K 0 Running 0:00:00:0000 1003:07:39:0085 procnto-smp-instr
1 2 1 0K 0 Running 0:00:00:0000 1003:07:00:0840 procnto-smp-instr
1 3 2 0K 0 Running 0:00:00:0000 1002:11:09:0034 procnto-smp-instr
1 4 3 0K 0 Running 0:00:00:0000 1000:35:38:0237 procnto-smp-instr
1 5 4 0K 0 Running 0:00:00:0000 994:28:11:0049 procnto-smp-instr
1 6 5 0K 0 Running 0:00:00:0000 989:59:09:0679 procnto-smp-instr
1 7 6 0K 0 Ready 0:00:00:0000 980:21:04:0983 procnto-smp-instr
1 8 7 0K 0 Running 0:00:00:0000 978:19:01:0459 procnto-smp-instr
1 9 6 0K 10 Receive 0:00:00:0079 0:17:56:0824 procnto-smp-instr
1 10 6 0K 10 Receive 0:02:59:0387 0:21:13:0432 procnto-smp-instr
1 11 6 0K 10 Receive 1004:36:29:0567 0:00:00:0000 procnto-smp-instr
1 12 6 0K 10 Receive 1004:39:39:0705 0:00:00:0000 procnto-smp-instr
1 13 6 0K 10 Running 0:00:00:0000 0:28:36:0391 procnto-smp-instr
1 15 6 0K 10 Receive 0:00:00:0072 0:00:00:0033 procnto-smp-instr
1 17 3 0K 10 Receive 1004:36:29:0567 0:00:00:0000 procnto-smp-instr
1 19 6 0K 10 Receive 1004:36:29:0567 0:00:00:0000 procnto-smp-instr
1 20 4 0K 10 Receive 1004:39:39:0705 0:00:00:0000 procnto-smp-instr
1 22 6 0K 10 Receive 0:00:00:0000 0:28:57:0786 procnto-smp-instr
1 26 5 0K 10 Receive 1004:41:13:0004 0:00:00:0000 procnto-smp-instr
97 1 6 96K 10 Receive 1004:42:27:0059 0:00:00:0017 wd-critical-mon
97 3 3 96K 63 Nanosleep 0:00:00:0240 0:00:00:0007 wd-critical-mon
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 121
Distributed Processing
Process example
RP/0/RSP0/CPU0:rasr9k-1y#show processes location 0/0/cpu0
Wed Mar 13 12:52:30.904 UTC
JID TID CPU Stack pri state TimeInState HR:MM:SS:MSEC NAME
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 122
Running the Needed Processes
Process example
RP/0/RSP0/CPU0:rasr9k-1y#show processes location 0/rsp0/cpu0 | include eigrp
Wed Mar 13 17:04:38.971 UTC
203 1 3 36K 10 Receive 489:30:31:0725 0:00:00:0029 eigrp_policy_reg_agent
203 2 3 36K 10 Receive 489:30:32:0243 0:00:00:0000 eigrp_policy_reg_agent
203 3 2 36K 10 Receive 489:30:32:0193 0:00:00:0000 eigrp_policy_reg_agent
RP/0/RSP0/CPU0:rasr9k-1y#configure
Wed Mar 13 17:04:43.082 UTC
RP/0/RSP0/CPU0:rasr9k-1y(config)#router eigrp 100
RP/0/RSP0/CPU0:rasr9k-1y(config-eigrp)#commit
Wed Mar 13 17:04:50.633 UTC
RP/0/RSP0/CPU0:Mar 13 17:04:50.681 : rmf_svr[386]: %HA-REDCON-1-STANDBY_NOT_READY : standby card is NOT
ready
RP/0/RSP0/CPU0:Mar 13 17:04:50.682 : rmf_svr[386]: %HA-REDCON-1-BACKUP_NOT_READY : backup process groups
between 0/RSP0/CPU0 and 0/RSP1/CPU0 are NOT ready
RP/0/RSP1/CPU0:Mar 13 17:04:50.681 : rmf_svr[386]: %HA-REDCON-1-STANDBY_NOT_READY : standby card is NOT
ready
RP/0/RSP0/CPU0:Mar 13 17:04:50.684 : rmf_svr[386]: %HA-REDCON-1-BACKUP_READY : backup process groups
between 0/RSP0/CPU0 and 0/RSP1/CPU0 are ready
RP/0/RSP0/CPU0:Mar 13 17:04:50.684 : rmf_svr[386]: %HA-REDCON-1-BACKUP_NOT_READY : backup process groups
between 0/RSP0/CPU0 and 0/RSP1/CPU0 are NOT ready
RP/0/RSP0/CPU0:Mar 13 17:04:50.687 : rmf_svr[386]: %HA-REDCON-1-BACKUP_READY : backup process groups
between 0/RSP0/CPU0 and 0/RSP1/CPU0 are ready
RP/0/RSP0/CPU0:Mar 13 17:05:00.682 : rmf_svr[386]: %HA-REDCON-1-STANDBY_READY : standby card is ready
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
Running the Needed Processes
Process example - continued
RP/0/RSP0/CPU0:rasr9k-1y(config-eigrp)#do show processes location 0/rsp0/cpu0 | include eigrp
Wed Mar 13 17:05:32.977 UTC
203 1 3 36K 10 Receive 489:31:25:0732 0:00:00:0029 eigrp_policy_reg_agent
203 2 3 36K 10 Receive 489:31:26:0249 0:00:00:0000 eigrp_policy_reg_agent
203 3 2 36K 10 Receive 489:31:26:0199 0:00:00:0000 eigrp_policy_reg_agent
1002 1 2 124K 10 Receive 0:00:40:0441 0:00:00:0147 eigrp
1002 2 1 124K 10 Receive 0:00:42:0400 0:00:00:0000 eigrp
1002 3 2 124K 10 Receive 0:00:42:0387 0:00:00:0000 eigrp
1002 4 3 124K 10 Sigwaitinfo 0:00:42:0104 0:00:00:0000 eigrp
1002 5 2 124K 10 Receive 0:00:42:0169 0:00:00:0000 eigrp
1002 6 2 124K 10 Receive 0:00:42:0047 0:00:00:0003 eigrp
1002 7 1 124K 10 Receive 0:00:42:0031 0:00:00:0000 eigrp
1002 8 0 124K 10 Receive 0:00:42:0030 0:00:00:0000 eigrp
1002 9 2 124K 10 Receive 0:00:42:0030 0:00:00:0000 eigrp
1002 10 0 124K 10 Receive 0:00:42:0030 0:00:00:0000 eigrp
1002 11 2 124K 10 Receive 0:00:42:0029 0:00:00:0000 eigrp
RP/0/RSP0/CPU0:rasr9k-1y(config-eigrp)#no router eigrp 100
RP/0/RSP0/CPU0:rasr9k-1y(config)#commit
Wed Mar 13 17:05:46.305 UTC
RP/0/RSP0/CPU0:rasr9k-1y(config)#do show processes location 0/rsp0/cpu0 | include eigrp
Wed Mar 13 17:05:50.441 UTC
203 1 3 36K 10 Receive 489:31:43:0186 0:00:00:0029 eigrp_policy_reg_agent
203 2 3 36K 10 Receive 489:31:43:0704 0:00:00:0000 eigrp_policy_reg_agent
203 3 2 36K 10 Receive 489:31:43:0654 0:00:00:0000 eigrp_policy_reg_agent
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
IOS-XR Operating System
RSP and LC CPU’s
CPU utilization for one minute: 26%; five minutes: 25%; fifteen
▪ Instances of minutes: 22%
CPU utilization for one minute: 46%; five minutes: 48%; fifteen
minutes: 39%
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
Process Restart
Most processes are re-startable
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
Demonstrating Process Restart
Same Job ID, New Process ID
RP/0/RSP0/CPU0:rasr9000-2w-a#show processes bgp RP/0/RSP0/CPU0:rasr9000-2w-a#process restart bgp
Wed Jan 15 17:58:34.050 EST Wed Jan 15 18:03:24.836 EST
Job Id: 1048 RP/0/RSP0/CPU0:Jan 15 18:03:24.874 :
PID: 287056 sysmgr_control[65784]: %OS-SYSMGR-4-PROC_RESTART_NAME
Executable path: /disk0/iosxr-routing- : User cisco (con0_RSP0_CPU0) requested a restart of
4.2.3.CSCuh52959-1.0.0/0x100305/bin/bgp process bgp at 0/RSP0/CPU0
Instance #: 1 RP/0/RSP0/CPU0:rasr9000-2w-a#show processes bgp
Wed Jan 15 18:03:28.726 EST
Version ID: 00.00.0000
Job Id: 1048
Respawn: ON
PID: 3182840
Respawn count: 1
Executable path: /disk0/iosxr-routing-
Max. spawns per minute: 12
4.2.3.CSCuh52959-1.0.0/0x100305/bin/bgp
Last started: Thu Jan 2 09:11:18 2014
Instance #: 1
Process state: Run
Version ID: 00.00.0000
Package state: Normal
Respawn: ON
Started on config: default
Respawn count: 2
Feature name: ON
Max. spawns per minute: 12
Tag : default
Last started: Wed Jan 15 18:03:24 2014
Process group: v4-routing
Process state: Run (last exit due to SIGTERM)
core: MAINMEM
Package state: Normal
Max. core: 0
Started on config: default
Placement: Placeable
Feature name: ON
startup_path: /pkg/startup/bgp.startup
Tag : default
Ready: 0.700s
Process group: v4-routing
Available: 85.082s
core: MAINMEM
Process cpu time: 21.760 user, 2.619 kernel,
Max. core: 0
24.379 total
Placement: Placeable
JID TID CPU Stack pri state TimeInState
startup_path: /pkg/startup/bgp.startup
1048 1 2 384K 10 Receive 0:00:03:0395
Ready: 0.225s
.
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 127
Process Dumps
Where?
RP/0/RSP0/CPU0:rasr9000-2w-a#admin show exception
Sat Jan 4 00:15:27.885 EST
Exception path for choice 1 is not configured or removed
Exception path for choice 2 is not configured or removed
Exception path for choice 3 is not configured or removed
Choice fallback one path = dumper_harddisk:/dumper compress = on filename = <process_name>
Choice fallback two path = dumper_disk1a:/dumper compress = on filename = <process_name>
Choice fallback three path = dumper_disk0a:/dumper compress = on filename = <process_name>
Kernel dump not configured
Tftp route for kernel core dump not configured
No config for pakmem tuple
No config for sparse tuple
No config for sprsize tuple
No config for coresize tuple
No config for memory-threshold tuple
No config for core-verification tuple
RP/0/RSP0/CPU0:rasr9000-2w-a#dir harddisk:/dumper
Sat Jan 4 00:16:10.138 EST
Directory of harddisk:/dumper
24922 -rw- 216304651 Sat Jan 4 00:16:08 2014 ce_switch.log
24665 -rw- 42408 Tue Nov 5 19:06:35 2013 crashinfo.by.kernel.19070930-173606
24694 -rw- 1586390 Tue Nov 5 19:06:36 2013 kernel_core.by.kernel.19070930-173606.Z
24695 -rw- 1044480 Tue Nov 5 19:06:36 2013 pcds_dump.19070930-173606
24697 -rw- 4813080 Fri Nov 8 17:03:11 2013 first.mpls_lsd_338.node0_RSP0_CPU0.x86.Z
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
Process Dumps
On line cards
RP/0/RSP0/CPU0:rasr9000-2w-a#show filesystem location 0/1/CPU0 | include lc
Sat Jan 4 00:26:39.269 EST
1644150784 1635583488 rw lcdisk0:
411041792 410915840 rw lcdisk0a:
Directory of net/node0_0_CPU0/lcdisk0:/dumper
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
IOS-XR Components
eXR for Tomahawk, cXR for any
• Starting 6.1.2: eXR is 64-bit, cXR is 32-bit
• eXR only if all hardware supports. cXR for any mix
• eXR: Support for 3rd party app hosting ☺
• Wind River Linux OS
RP/0/RP0/CPU0:PE137# run uname -a
Wed Feb 1 08:28:57.332 EST
Linux xr-vm_node0_RP0_CPU0 3.14.23-WR7.0.0.2_standard #1 SMP Fri Jun 17 17:51:29 PDT 2016 x86_64 x86_64 x86_64 GNU/Linux
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
IOS XR 64 Bit: Architecture Overview
cXR-Classis XR-32 Bit eXR-extended XR Release-64 Bit
RP
• QNX-based
Control Plane
System 64-bit IOS XR.
• No virtualization Admin Linux Linux
QNX Linux
• 64-bit in ASR9000, NCS 5500,
NCS 5000, NCS 1000 and IOS XR IOS-XR
in NCS 6000 Admin Plane
Line Card
Linux VM
• Linux based
• Larger addressable memory LC-CPU LC-CPUs
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
IOS XR Key Components
IOS XR (aka cXR) IOS XR 64-bit (aka eXR)
RP
Admin
IOS XR System
Line card
Line card
Admin 64-bit linux
QNX Linux Linux
Host OS Linux
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 133
IOS XR 64 Bit
Container versus VM
• IOS XR 64 Bit Can Run with Container or IOS-XR Separate Admin Plane
VM IOS XR Admin Plane
LxC Routing
System Control Plane
• VM Based 64 Bit XR: Admin
64-bit IOS XR.
LxC Linux Linux
• In ASR9000, NCS6000 Routing
Apps
Linux
• VM OS Completely Separated from Host
OS Host OS (Linux)
IOS-XR
Admin Plane
Linux VM
• Container Based 64 Bit XR:
LC-CPUs LC-CPUs
• In NCS 5500, NCS5000 IOS XR Admin
LxC LxC Linux Linux
• Container OS share the same kernel as 64 bit Linux Kernel
Host OS Linux
Host OS (Linux)
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
ASR 9000 Network OS Difference Summary
32 BIT versus 64 BIT
Virtualization All applications running as different Two VMs: Admin VM and XR VM on RP/LC CPU
processes. No virtualization.
Software Packaging • PIE based packages. • ISO/RPM based packages.
• Special VM image for fresh • ISO image for bootup and fresh installation.
installation (Turboboot) • Flexible Golden ISO image for customer
• Offline RPM package management.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
Software Packaging Terminology
Package types
Mini?
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
Packages: Mandatory and Optional
MPLS Multicast
Optional
▪ Packages are unique sets of components
Mgbl Security and represent potential units of delivery
▪ Packages are visible in the code base –
RPLRouting
BGP “build” infrastructure prevents illegal
dependencies between packages
Package
OSPF ISIS
▪ Packages can be grouped into composites
for ease of delivery
Forwarding ▪ Code base files are organized into
Mandatory
components – these are versioned and
Base
Base visible to the development engineer
Admin
Composite
OS ▪ Packages can be downloaded from
Cisco.com via “tar” files
Line card
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
Packages: Mandatory
• Forwarding
• Administration
Forwarding • Base
Mandatory
Base • Operating system (OS)
Base
Admin • Routing
Composite
OS • Line card drivers
Line card
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
Packages: Optional
MPLS Multicast Optional packages provide additional features:
Optional
Mgbl Security • Manageability – Support for HTTP, XML,
SNMP and other management tools
• Multicast – Support for multicast protocols
• MPLS – Support for Multiprotocol Label
Switching (MPLS)
• Security – Support for Secure Sockets Layer
(SSL), certificates and other security tools
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
PIE – Package Installation Envelope
• PIEs are a delivery mechanism for packages
• Used to deliver
• Releases – (5.1.3, 5.3.4, 6.1.2)
• SMUs – Fix for a specific bug
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 141
Reading Installed Packages
Example
RP/0/RSP0/CPU0:rasr9000-2w-b#show install active disk0:iosxr-diags-5.1.3
detail disk0:asr9k-fwding-5.1.3
Sun Jan 4 23:43:14.325 EST
Secure Domain Router: Owner disk0:iosxr-fwding-5.1.3
Node 0/RSP0/CPU0 [RP] [SDR: Owner] disk0:iosxr-routing-5.1.3
Boot Device: disk0: disk0:iosxr-infra-5.1.3
Boot Image: /disk0/asr9k-os-mbi- disk0:asr9k-base-5.1.3
5.1.3/0x100305/mbiasr9k-rsp3.vm disk0:asr9k-mcast-px-5.1.3
Active Packages: disk0:asr9k-mcast-supp-5.1.3
disk0:asr9k-mpls-px-5.1.3 disk0:iosxr-mcast-5.1.3
disk0:iosxr-mpls-5.1.3
disk0:asr9k-mgbl-px-5.1.3 .
disk0:asr9k-mgbl-supp-5.1.3 .
disk0:iosxr-mgbl-5.1.3 Node 0/1/CPU0 [LC] [SDR: Owner]
disk0:asr9k-optic-px-5.1.3 Boot Device: mem:
disk0:asr9k-optics-supp-5.1.3 Boot Image: /disk0/asr9k-os-mbi-5.1.3/lc/mbiasr9k-
disk0:asr9k-k9sec-px-5.1.3 lc.vm
disk0:iosxr-security-5.1.3 Active Packages:
disk0:asr9k-k9sec-supp-5.1.3 disk0:asr9k-mpls-px-5.1.3
disk0:asr9k-doc-px-5.1.3 disk0:iosxr-mpls-5.1.3
disk0:asr9K-doc-supp-5.1.3 disk0:asr9k-optic-px-5.1.3
disk0:asr9k-fpd-px-5.1.3 disk0:asr9k-optics-supp-5.1.3
disk0:asr9k-fpd-5.1.3 disk0:asr9k-mini-px-5.1.3
disk0:asr9k-mini-px-5.1.3 disk0:asr9k-scfclient-5.1.3
disk0:asr9k-scfclient-5.1.3 disk0:asr9k-os-mbi-5.1.3
disk0:asr9k-os-mbi-5.1.3 disk0:asr9k-cpp-5.1.3
disk0:asr9k-cpp-5.1.3 disk0:asr9k-ce-5.1.3
disk0:asr9k-ce-5.1.3 disk0:iosxr-ce-5.1.3
disk0:iosxr-ce-5.1.3 disk0:asr9k-diags-supp-5.1.3
disk0:asr9k-diags-supp-5.1.3 disk0:iosxr-diags-5.1.3
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 142
SMU and Service Pack Delivery
• SMU is named by release and bugid
• asr9k-px-5.3.4.CSCvb41169.tar
• asr9k-px-5.1.3.CSCvc42959.tar
IOS-XR Version
Defect ID
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
IOS XR ASR 9000 64 Bit Packaging
eXR ISO , Packages & SMU’s
Bootable Images
asr9k-eigrp-x64-1.0.0.0-r612.x86_64.rpm asr9k-mpls-x64-2.1.0.0-r612.x86_64.rpm
asr9k-isis-x64-1.1.0.0-r612.x86_64.rpm asr9k-mcast-x64-2.0.0.0-r612.x86_64.rpm
asr9k-ospf-x64-1.1.0.0-r612.x86_64.rpm asr9k-optic-x64-1.0.0.0-r612.x86_64.rpm
asr9k-m2m-x64-2.0.0.0-r612.x86_64.rpm asr9k-li-x64-1.1.0.0-r612.x86_64.rpm
asr9k-mgbl-x64-3.0.0.0-r612.x86_64.rpm asr9k-k9sec-x64-3.1.0.0-r612.x86_64.rpm
asr9k-mpls-te-rsvp-x64-1.2.0.0-r612.x86_64.rpm
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 144
Managing SMU: Cisco Software Manager App
Defect info
Download & tar
Managed nodes
and XR versions
Installed
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 145
Cisco Software Manager Server
Work Flow 1 cisco.com
Query Software Software Manager
inventory 3 4
SMU
Pool req
Install 2 Classify
Reply Reply
Manager
•5 Resolve
Dependency
Send Report
•6 Create SMU List
•7 Conformance
XR Router 8
Report
Test, Certify, Deploy
9
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 146
Solves For:
What CSM Does • Time consuming, manual,
laborious, repetitive, error-
prone SW installation
• Complicated patch
• Software Management: dependencies
• Automated and Simplified image (releases and SMUs) retrieval, • High costs
reporting and alerts
• Pushes image to one or many devices Big Wins:
• End to end SW management • Huge time and resource
• Patch recommendation, and conformance reporting savings
• Migration from 32-bit XR to 64-bit XR • Up to 90% time savings on
SW upgrades
• Operations Simplification:
• Auto-updates: you can schedule installation, pre- and post- installation verifications
• Easier access to image and patch details (documentation)
• Multi-platform and multi-OS support
• Inventory Management:
• Visibility into hardware, cards, slots, S/N, optic types
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
CSM Server – Supported Cisco Tool
Download CSM:
How to download https://software.cisco.com/download/release.html?mdfid=282423206&softwareid
=284777134&release=3.5&relind=AVAILABLE&rellifecycle=&reltype=latest
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
IOS XR 64 Bit Package Naming
Typical RPM package name :
asr9k-bgp-x64-1.1.0.0-r6225.x86_64.rpm
Name Convention:
<Name> -<Version> -<Release> .<Architecture> .rpm
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
IOS XR 64 Bit Package Naming
Typical XR SMU name :
asr9k-mcast-x64-2.1.0.3-r6225I.CSCvf43058.x86_64.rpm
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 150
Golden ISO Solution Overview (GISO)
64 Bit IOS XR
• Golden ISO is a customized ISO which customers can build offline out of the mini
ISO by using the Cisco Released Golden ISO build script
• When the System is booted up with the Golden ISO, additional SMU’s & Optional
packages present in the Golden ISO will be auto installed
• The XR config if present in the Golden ISO will be auto applied (ASR 9000 only).
• Golden ISO holds additional files apart from files present in MINI ISO.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
Golden ISO Use Cases
ASR 9000 64 Bit IOS XR
• cXR(Classic XR) to eXR Migration (ASR9K):
o Golden ISO allows customers to migrate their router software from Classic XR to eXR
o customer can build their own Golden ISO with relevant XR configs and boot the system
o Golden ISO will make the migration simpler
o Retains the desired XR configurations and all the applicable SMU/Optional packages
installed
o ASR9K-X64
o NCS1K
o NCS5K
o NCS5500
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 152
ASR9922 cXR to eXR Migration GISO script (Golden ISO)
ASR 9000 64 Bit IOS XR
root@virl:/home/6225# ./gisobuild.py -i /home/dpothier/6225/asr9k-mini-x64-6.2.25.iso -r /home/dpothier/6225/ -l v1 –m execute script on external server (has requirements)
Golden ISO build process starting...
Golden ISO Image Location: /home/6225/asr9k-goldenk9-x64.iso-6.2.25.v1 creates Golden ISO Image: asr9k-goldenk9-x64.iso-6.2.25.v1
Detail logs: /home/6225/Giso_build.log-2019-01-16:18:52:45.421533 creates Migration tar: asr9k-goldenk9-x64-migrate_to_eXR.tar-6.2.25.v1
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 153
New install commands
64 Bit IOS XR (eXR)
• 6.2.25
• show install active summary (the summary keyword was added)
• show install inactive summary
• show install commit summary
• 6.3.3
• install update source harddisk:/sw/633 asr-goldenk9-x-6.3.3-v1.iso replace
noprompt (the “replace” keyword is added)
• install upgrade (the “upgrade” keyword will be deprecated in later releases)
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 154
IOS-XR Install &
Upgrade
cXR install workflow
Short Single
Set OL bit
Maintenance NO command
window Install add activate
install
Less reload control
YES
Install commit
Install add Days earlier
Set OL bit
Install commit
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 156
Turboboot
A “fresh” start!
Rommon1>unset BOOT
Rommon2>confreg 0x102
Rommon3>sync
Rommon4>reset
▪ Previous disk data is wiped
▪ A clean “re-image” as a new
Rommon1>IP_ADDRESS=<a.b.c.d> router
Rommon2>IP_SUBNET_MASK=<mask>
Rommon3>TFTP_SERVER=<a.b.c.d>
Rommon4>DEFAULT_GATEWAY=<a.b.c.d>
▪ Potential recovery mechanism
Rommon5>TFTP_RETRY_COUNT=4
Rommon6>TFTP_TIMEOUT=60
▪ Not an “upgrade” method
Rommon7>TFTP_CHECKSUM=1
Rommon8>priv
Rommon9>diswd
Rommon10>unset BOOT
Rommon11>TURBOBOOT=on,disk0,format
Rommon12>sync
Rommon13>boot tftp://a.b.c.d/path/asr9k-
mini-px.vm-4.2.3
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 157
PIE Installation Concepts
• PIE install used once system is operational w/ XR
• .vm files can be used if booting from rommon is required
• Packages can be added or upgraded
• Install from Exec or Admin Mode
• 3 phase install
• Add – Copy package and unpack
• Activate – Restart processes/nodes with new code
• Commit – Lock activated packages through reset
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 158
Install Add
Copy package to disk
RP/0/RSP0/CPU0:Nevada# install add tftp://7.1.1.1/asr9k-mpls-p.pie-4.3.2 sync
Install operation 3 'install add /tftp://7.1.1.1/asr9k-mpls-p.pie-4.3.2
synchronous' started by user 'ww' on SDR Owner via CLI at 22:21:54 EDT Sun Jul
26 2009.
Warning: This add operation will add the specified package to SDR: Owner only.
Warning: Any further operations on this package will only be allowed from SDR:
Warning: Owner.
Warning: If the package is meant to be added to the entire router, then please
Warning: stop this operation and perform the operation from the admin level.
Continue with the operation? [confirm]
Info: The following package is now available to be activated:
Info:
Info: disk0:asr9k-mpls-4.3.2
Info:
Info: The package can be activated on the following SDR:
Info:
Info: Owner
Info:
Install operation 3 completed successfully at 22:22:14 EDT Sun Jul 26 2009.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 159
Install Activate
Activate (install) packages
RP/0/RSP0/CPU0:Nevada# install activate disk0:asr9k-mpls-4.3.2 sync
Install operation 4 'install activate disk0:asr9k-mpls-4.3.2 synchronous'
started by user 'ww' on SDR Owner via CLI at 22:24:50 EDT Sun Jul 26 2009.
Info: Install Method: Parallel Process Restart
Info: The changes made to software configurations will not be persistent
Info: across system reloads. Use the command '(admin) install commit' to
Info: make changes persistent.
Info: Please verify that the system is consistent following the software
Info: change using the following commands:
Info: show system verify
Info: install verify packages
Install operation 4 completed successfully at 22:25:38 EDT Sun Jul 26 2009.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 160
Install Commit
Commit the active packages
RP/0/RSP0/CPU0:rasr9000-2w-a#admin install commit
Sun Jan 26 16:59:22.742 EST
Install operation 36 '(admin) install commit' started by user 'cisco' via CLI
at 16:59:22 EST Sun Jan 26 2014.
Install operation 36 completed successfully at 16:59:24 EST Sun Jan 26 2014.
RP/0/RSP0/CPU0:rasr9000-2w-a#admin show install committed summary
Sun Jan 26 16:59:44.478 EST
Default Profile:
SDRs:
Owner
Committed Packages:
disk0:asr9k-px-4.2.3.CSCud37351-1.0.0
disk0:asr9k-px-4.2.3.CSCug30234-1.0.0
disk0:asr9k-px-4.2.3.CSCuf32158-1.0.0
disk0:asr9k-px-4.2.3.CSCue21083-1.0.0
disk0:asr9k-9000v-nV-px-4.2.3
disk0:asr9k-optic-px-4.2.3
disk0:asr9k-mini-px-4.2.3
disk0:asr9k-doc-px-4.2.3
disk0:asr9k-k9sec-px-4.2.3
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 161
Install Deactivate
Removing a package from “running”
RP/0/RSP0/CPU0:Nevada# show install active
Node 0/RSP0/CPU0 [RP] [SDR: Owner]
Boot Device: disk0:
Boot Image: /bootflash/disk0/asr9k-os-mbi-4.3.2/mbiasr9k-rp.vm
Active Packages:
disk0:asr9k-mpls-4.3.2
disk0:asr9k-base-4.3.2.CSCsy23972-1.0.0
disk0:comp-asr9k-mini-4.3.2
RP/0/RSP0/CPU0:Nevada# install deactivate disk0:asr9k-mpls-4.3.2 sync
Install operation 6 'install deactivate disk0:asr9k-mpls-4.3.2 synchronous'
started by user 'ww' on SDR Owner via CLI at 22:28:55 EDT Sun Jul 26 2009.
Info: Install Method: Parallel Process Restart
Info: The changes made to software configurations will not be persistent
Info: across system reloads. Use the command '(admin) install commit' to
Info: make changes persistent.
Info: Please verify that the system is consistent following the software
Info: change using the following commands:
Info: show system verify
Info: install verify packages
Install operation 6 completed successfully at 22:29:49 EDT Sun Jul 26 2009.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 162
Install Remove
Deleting packages from disk
RP/0/RSP0/CPU0:Nevada# install remove disk0:asr9k-mpls-4.3.2 sync
Install operation 9 'install remove disk0:asr9k-mpls-4.3.2 synchronous' started
by user 'ww' on SDR Owner via CLI at 22:35:08 EDT Sun Jul 26 2009.
Info: This operation will remove the following package:
Info: disk0:asr9k-mpls-4.3.2
Info: After this install remove the following install rollback point will
Info: no longer be reachable, as the required packages will not be present:
Info: 4
Proceed with removing these packages? [confirm]
Install operation 9 completed successfully at 22:35:12 EDT Sun Jul 26 2009.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 163
Installation Log
Example
RP/0/RSP0/CPU0:rasr9000-2w-b#admin show install log reverse
Thu Jan 9 23:09:25.511 EST
Install operation 42 started by user 'cisco' via CLI at 21:27:00 EST Thu Jan 09 2014.
(admin) install commit
Install operation 42 completed successfully at 21:27:01 EST Thu Jan 09 2014.
--------------------------------------------------------------------------------
Install operation 41 started by user 'cisco' via CLI at 21:11:27 EST Thu Jan 09 2014.
(admin) install rollback to 39
Install operation 41 completed successfully at 21:12:22 EST Thu Jan 09 2014.
--------------------------------------------------------------------------------
Install operation 40 started at 14:11:08 UTC Thu Jan 02 2014.
Reload of router to the committed software.
--------------------------------------------------------------------------------
Install operation 39 started by user 'cisco' via CLI at 17:18:32 EST Thu Dec 19 2013.
(admin) install activate disk0:*4.3.1*
Install operation 39 completed successfully at 17:27:56 EST Thu Dec 19 2013.
--------------------------------------------------------------------------------
Install operation 38 started by user 'cisco' via CLI at 17:17:24 EST Thu Dec 19 2013.
(admin) install activate disk0:*4.3.1* test
Install operation 38 completed successfully at 17:18:06 EST Thu Dec 19 2013.
--------------------------------------------------------------------------------
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 164
Installation Entries
Example
RP/0/RSP0/CPU0:Nevada# show install log 6 detail
Install operation 6 started by user 'ww' on SDR Owner via CLI at 22:28:55 EDT
Sun Jul 26 2009.
install deactivate disk0:asr9k-mpls-4.3.2 synchronous
Install operation 6 completed successfully at 22:29:49 EDT Sun Jul 26 2009.
Install logs:
Install operation 6 'install deactivate disk0:asr9k-mpls-4.3.2 synchronous'
started by user 'ww' on SDR Owner via CLI at 22:28:55 EDT Sun Jul 26 2009.
Info: Install Method: Parallel Process Restart
Info: The changes made to software configurations will not be
Info: persistent across system reloads. Use the command '(admin)
Info: install commit' to make changes persistent.
Info: Please verify that the system is consistent following the
Info: software change using the following commands:
Info: show system verify
Info: install verify packages
Install operation 6 completed successfully at 22:29:49 EDT Sun Jul 26 2009.
Summary:
Sub-operation 1:
Install method: Parallel Process Restart
Summary of changes on node 0/RSP0/CPU0:
Deactivated: asr9k-mpls-4.3.2
6 asr9k-mpls processes affected (0 updated, 0 added, 6 removed, 0 impacted)
Summary of changes on node 0/0/CPU0:
Deactivated: asr9k-mpls-4.3.2
1 asr9k-mpls processes affected (0 updated, 0 added, 1 removed, 0 impacted)
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 165
Cards’ FPD
Verify/upgrade FPD version
RP/0/RSP0/CPU0:rasr9000-2w-b#admin show hw-module fpd location all
.
===================================== ==========================================
Existing Field Programmable Devices
==========================================
HW Current SW Upg/
Location Card Type Version Type Subtype Inst Version Dng?
============ ======================== ======= ==== ======= ==== =========== ====
0/RSP0/CPU0 A9K-RSP440-SE 1.0 lc cbc 0 16.115 No
lc fpga1 0 0.09 No
lc fpga2 0 1.06 No
lc fpga3 0 4.09 No
lc rommon 0 0.62 No No == good. No
-------------------------------------------------------------------------------- change needed
0/RSP0/CPU0 ASR-9006-FAN
.
1.0 lc cbc 2 5.02 No
--------------------------------------------------------------------------------
0/0/CPU0 A9K-24x10GE-SE 1.0 lc cbc 0 19.110 No
lc fpga2 0 1.02 No
lc fpga3 0 1.01 No
lc fpga4 0 1.05 No
lc rommon 0 1.28 No
--------------------------------------------------------------------------------
0/1/CPU0 A9K-MOD80-SE 1.0 lc cbc 0 20.116 No
lc fpga2 0 1.01 No
lc fpga4 0 1.05 No
If LC1 needs
lc rommon 0 1.28 No
.
upgrade
RP/0/RSP0/CPU0:rasr9000-2w-a#admin upgrade hw-module fpd all location 0/1/CPU0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 166
Cards’ FPD
Verify/upgrade FPD version
RP/0/RSP0/CPU0:rasr9000-2w-a#admin show running-config
Auto FPD upgrade
.
fpd auto-upgrade
configuration
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 167
Satellite OS and Firmware
Verify/upgrade satellites
RP/0/RSP0/CPU0:rasr9000-2w-a#admin show install committed summary | include nV
Sat Dec 14 21:28:38.192 EST
disk0:asr9k-9000v-nV-px-4.2.3
RP/0/RSP0/CPU0:rasr9000-2w-a#show nv satellite status satellite 100
Sat Dec 14 20:55:00.733 EST
Satellite 100
-------------
State: Connected (Stable)
Type: asr9000v
Description: r9000v-1y-a
MAC address: 8478.ac01.349c
IPv4 address: 10.100.111.100
Configured Serial Number: CAT1702U20H
Received Serial Number: CAT1702U20H
Remote version: Compatible (not latest version)
ROMMON: 124.0 (Available: 125.0)
FPGA: 1.13 (Latest)
Host has a newer version
IOS: 200.5 (Available: 210.0)
Configured satellite fabric links:
Bundle-Ether3
-------------
State: Satellite Ready
Port range: GigabitEthernet0/0/0-29
Discovered satellite fabric links:
TenGigE0/1/1/3: Satellite Ready; No conflict
TenGigE0/1/0/3: Satellite Ready; No conflict
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 168
Satellite Upgrade
Prepare
RP/0/RSP0/CPU0:rasr9000-2w-a#admin show install committed summary | include nV
Sat Dec 14 21:28:38.192 EST
disk0:asr9k-9000v-nV-px-4.2.3
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 169
Satellite Upgrade
Upgrade
RP/0/RSP0/CPU0:rasr9000-2w-a#install nv satellite 100 activate
Sat Dec 14 21:25:26.000 EST
WARNING: This install operation will reload the requested satellite(s)
Do you wish to continue?[confirm(y/n)]
y
Install operation initiated successfully.
RP/0/RSP0/CPU0:rasr9000-2w-a#LC/0/1/CPU0:Dec 14 21:25:28.992 : ifmgr[201]: %PKT_INFRA-LINK-3-UPDOWN : Interface TenGigE0/1/1/3,
changed state to Down
LC/0/1/CPU0:Dec 14 21:25:28.995 : ifmgr[201]: %PKT_INFRA-LINK-3-UPDOWN : Interface TenGigE0/1/0/3, changed state to Down
RP/0/RSP0/CPU0:Dec 14 21:25:28.999 : ifmgr[247]: %PKT_INFRA-LINK-3-UPDOWN : Interface GigabitEthernet100/0/0/11, changed state to Down
RP/0/RSP0/CPU0:Dec 14 21:25:28.999 : ifmgr[247]: %PKT_INFRA-LINK-3-UPDOWN : Interface GigabitEthernet100/0/0/9, changed state to
Down
LC/0/1/CPU0:Dec 14 21:25:42.929 : pfm_node_lc[291]: %PLATFORM-XFP-2-LOW_RX_POWER_ALARM : Set|envmon_lc[172118]|XFP(0x102a003)|Port_0/03
LC/0/1/CPU0:Dec 14 21:25:42.929 : pfm_node_lc[291]: %PLATFORM-XFP-2-LOW_RX_POWER_ALARM : Set|envmon_lc[172118]|XFP(0x102a017)|Port_1/03
LC/0/1/CPU0:Dec 14 21:27:04.331 : ifmgr[201]: %PKT_INFRA-LINK-3-UPDOWN : Interface TenGigE0/1/0/3, changed state to Up
LC/0/1/CPU0:Dec 14 21:27:04.332 : ifmgr[201]: %PKT_INFRA-LINK-3-UPDOWN : Interface TenGigE0/1/1/3, changed state to Up
LC/0/1/CPU0:Dec 14 21:27:04.334 : ifmgr[201]: %PKT_INFRA-LINK-3-UPDOWN : Interface TenGigE0/1/0/3, changed state to Down
LC/0/1/CPU0:Dec 14 21:27:04.339 : ifmgr[201]: %PKT_INFRA-LINK-3-UPDOWN : Interface TenGigE0/1/1/3, changed state to Down
LC/0/1/CPU0:Dec 14 21:27:05.337 : ifmgr[201]: %PKT_INFRA-LINK-3-UPDOWN : Interface TenGigE0/1/0/3, changed state to Up
LC/0/1/CPU0:Dec 14 21:27:05.338 : ifmgr[201]: %PKT_INFRA-LINK-3-UPDOWN : Interface TenGigE0/1/1/3, changed state to Up
RP/0/RSP0/CPU0:Dec 14 21:27:08.659 : eem_ed_oir[191]: Messge received content : Event 0 NodeId: 0xffffffff
RP/0/RSP0/CPU0:Dec 14 21:27:08.660 : eem_ed_oir[191]: Messge received content : Event 0 NodeId: 0xffffffff
RP/0/RSP0/CPU0:Dec 14 21:27:09.210 : envmon[206]: %PLATFORM-ENVMON-2-SAT_FAN_MFGMEM : Fan MFGMEM failure - cleared on Satellite 100
RP/0/RSP0/CPU0:Dec 14 21:27:09.210 : envmon[206]: %PLATFORM-ENVMON-2-SAT_FAN_MISSING : Fan unit missing - cleared on Satellite 100
RP/0/RSP0/CPU0:Dec 14 21:27:09.210 : eem_ed_oir[191]: Messge received content : Event 0 NodeId: 0xffffffff
RP/0/RSP0/CPU0:Dec 14 21:27:09.210 : envmon[206]: %PLATFORM-ENVMON-2-SAT_BAT_FAL_A : Battery Failure A - cleared on Satellite 100
RP/0/RSP0/CPU0:Dec 14 21:27:09.210 : envmon[206]: %PLATFORM-ENVMON-2-SAT_BAT_FAL_B : Battery Failure B - cleared on Satellite 100
RP/0/RSP0/CPU0:Dec 14 21:27:09.244 : ifmgr[247]: %PKT_INFRA-LINK-3-UPDOWN : Interface GigabitEthernet100/0/0/9, changed state to Up
RP/0/RSP0/CPU0:Dec 14 21:27:09.612 : ifmgr[247]: %PKT_INFRA-LINK-3-UPDOWN : Interface GigabitEthernet100/0/0/11, changed state to Up
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 170
Satellite Upgrade
Verify
RP/0/RSP0/CPU0:rasr9000-2w-a#show nv satellite status satellite 100
Sat Dec 14 21:27:24.660 EST
Satellite 100
-------------
State: Connected (Stable)
Type: asr9000v
Description: r9000v-1y-a Based on host package
MAC address: 8478.ac01.349c asr9k-9000v-nV-px-4.2.3
IPv4 address: 10.100.111.100
Configured Serial Number: CAT1702U20H
Received Serial Number: CAT1702U20H
Remote version: Compatible (latest version)
ROMMON: 125.0 (Latest)
FPGA: 1.13 (Latest)
IOS: 210.0 (Latest)
Configured satellite fabric links:
Bundle-Ether3
-------------
State: Satellite Ready
Port range: GigabitEthernet0/0/0-29
Discovered satellite fabric links:
TenGigE0/1/0/3: Satellite Ready; No conflict
TenGigE0/1/1/3: Satellite Ready; No conflict
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 171
Package Installation Process Summary
• PIE install used once system is operational
• Packages can be added or upgraded
• Versions of all packages must be consistent
• Install from Exec or Admin Mode
• 3 phase install
• Add – Copy package and unpack
• Activate – Start new code
• Commit – Lock down installed code
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 172
System Reloading Operation Difference
XR 64 Bit cXR
FPD upgrading requires Module/Chassis Reload. VM level reloading does not make new FPD effective
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 173
eXR install workflow Set OL bit
RPM
More reload control
Install activate RPM
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 174
XR 64 Bit Operational Differences
Same XR Control Plane: XR Feature Configurations Stay Unchanged
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 175
IOS-XR Boot Process with iPXE
DHCP SERVER
IP address
iPXE Next-server
boot filename=http://<http-srv>/image.iso
N
1 or
Y filename=http://<http-srv>/boot.ipxe
iPXE
2
HTTP/TFTP SERVER
DHCP image.iso
HTTP/TFTP Reset System or
Success ?
N
boot.ipxe
Y
XR Install
XR Boot
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 176
ASR 9000 IOS XR-64 Bit Boot Menu
• admin hw-module location all reload
• Ctrl-C to drop into Boot Menu
Booting IOS-XR 64 bit Boot previously installed image - Press Ctrl-c to stop
Please select the operating system and the boot device:
1) IOS-XR (32 bit Classic XR)
2) IOS-XR 64 bit Boot previously installed image
3) IOS-XR 64 bit Mgmt Network boot using DHCP server
4) IOS-XR 64 bit Mgmt Network boot using local settings (iPXE)
(Press 'p' for more option)
Selection [1/2/3/4]: p
Please select the operating system and the boot device:
1) IOS-XR (32 bit Classic XR)
2) IOS-XR 64 bit Boot previously installed image
3) IOS-XR 64 bit Mgmt Network boot using DHCP server
4) IOS-XR 64 bit Mgmt Network boot using local settings (iPXE)
5) IOS-XR 64 bit Internal network boot from RSP/RP
6) IOS-XR 64 bit Local boot using embedded USB media
7) IOS-XR 64 bit Local boot using front panel USB media
Selection [1/2/3/4/5/6/7]:
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 177
ASR 9000 XR 64 Bit iPXE Prompt
• Select option 3 from boot menu
• Right after iPXE 1.0.0+, Ctrl-B to drop into iPXE prompt
Please select the operating system and the boot device:
1) IOS-XR (32 bit Classic XR)
2) IOS-XR 64 bit Boot previously installed image
3) IOS-XR 64 bit Mgmt Network boot using DHCP server
4) IOS-XR 64 bit Mgmt Network boot using local settings (iPXE)
(Press 'p' for more option)
Selection [1/2/3/4]: 3
Selected IOS-XR 64 bit Mgmt Network boot using DHCP server, Continue ? Y/N: y
Serial ATA Port 4 : SMART iSATA SHSLM32GEBCITHD02
Serial ATA Port 5 : SMART iSATA SHSLM32GEBCITHD02
Selected external PXE
CISCO iPXE initialising devices...ok
iPXE 1.0.0+ (b6461) -- Open Source Network Boot Firmware -- http://ipxe.org
Features: DNS HTTP TFTP EFI ISO9660 Menu
IPXE embed script.......
IPXE preference ...0
Press Ctrl-B for the iPXE command line...
iPXE>
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 178
iPXE CLI Operation Example
• Booting Image Manually
Only Supported Method for Password Recovery
iPXE> set net0/ip:ipv4 172.30.0.101
iPXE> set net0/netmask 255.255.255.0
iPXE> set net0/gateway 172.30.0.1
iPXE> ifopen net0
iPXE> route
net0: 172.30.0.101/255.255.255.0 gw 172.30.0.1
net0: fe80::d66d:50ff:fe18:1a50/64
net0: fd:30::d66d:50ff:fe18:1a50/64 gw fe80::fa72:eaff:fe8b:ce80
net1: fe80::d66d:50ff:fe18:1a51/64 (inaccessible)
net2: fe80::d66d:50ff:fe18:1a52/64 (inaccessible)
net3: fe80::d66d:50ff:fe18:1a53/64 (inaccessible)
iPXE> ping -c 2 172.30.0.22
64 bytes from 172.30.0.22: seq=1
64 bytes from 172.30.0.22: seq=2
iPXE> boot http://172.30.0.22/asr9k/6.4.2/asr9k-mini-x64-6.4.2.iso
http://172.30.0.22/asr9k/6.4.2/asr9k-mini-x64-6.4.2.iso... ok
Memory required for image[asr9k-mini-x64-6.4.2.iso]: 1353314304, available: 1841299456
<SNIP>
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 179
IOS XR 32-Bit to IOS XR 64-Bit Migration Steps
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 180
IOS XR 32-Bit to IOS XR 64-Bit Migration Steps
(Cont.)
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 181
IOS XR 64-Bit Migration Script
• Migrate to Cisco IOS XR 64-Bit Software by using the script
migrate_to_eXR, available in /pkg/bin/.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 182
Configuration:
Numbering
Scheme
Inventory and Addressing
Exec and admin modes
▪ XR interfaces use 4-5 layer naming RP/0/RSP1/CPU0:viking-1#show platform
Node Type State Config State
▪ Rack (0 for single chassis) ----------------------------------------------------------------0/RSP0/CPU0
A9K-RSP-4G(Standby) IOS XR RUN PWR,NSHUT,MON
▪ /Slot (0+ for LC, RSP0, RSP1) 0/RSP1/CPU0 A9K-RSP-4G(Active) IOS XR RUN PWR,NSHUT,MON
▪ /Bay (0, 0+ on MOD and SIP) 0/0/CPU0 A9K-40GE-E IOS XR RUN PWR,NSHUT,MON
0/1/CPU0 A9K-8T/4-B IOS XR RUN PWR,NSHUT,MON
▪ /Port (0+)
▪ .Subinterface/EFP (optional) RP/0/RSP1/CPU0:viking-1#admin show platform
Wed Jul 22 09:23:32.482 EST
0/FT0/SP Node Type State Config State
----------------------------------------------------------------
0/RSP0/CPU0 A9K-RSP-4G(Standby) IOS XR RUN PWR,NSHUT,MON
0/FT1/SP 0/RSP0/CPU0 0/RSP1/CPU0 A9K-RSP-4G(Active) IOS XR RUN PWR,NSHUT,MON
0/FT0/SP FAN TRAY READY
0/FT1/SP FAN TRAY READY
Fans Fans 0/0/CPU0 A9K-40GE-E IOS XR RUN PWR,NSHUT,MON
0/1/CPU0 A9K-8T/4-B IOS XR RUN PWR,NSHUT,MON
0/PM0/SP A9K-3KW-AC READY PWR,NSHUT,MON
RSP0
Line Line 0/PM1/SP A9K-3KW-AC READY PWR,NSHUT,MON
Fabric
Cards Fabric
Cards
interface ten[Rack/Slot/Bay/Port.Sub]
Fabric
Line Line
Fabric
Cards Cards
RSP1
0/PM1/SP
Power Power
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 184
Interface/Component Numbering Scheme
TenGigE0/1/0/0/9 10G breakout 0-9
100G port 0-7
module or bay 0-1
Slot 0-19
Rack
RP/0/RP0/CPU0:asr9k#show platform
Node Type State Config State
-----------------------------------------------------------------------------
<snip>
0/1/CPU0 A9K-24x10GE-SE IOS XR RUN PWR,NSHUT,MON
TenGigE0/1/0/0
. port numbering always begins at 0 for
up to any LineCard, MPA, or SPA
TenGigE0/1/0/23
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 185
Rack/Slot/Module/Port
RP/0/RSP0/CPU0:asr9001(admin)#show platform
Node Type State Config State
---------------------------------------------------------------------------------------------------
0/RSP0/CPU0 ASR9001-RP(Active) IOS XR RUN PWR,NSHUT,MON
0/FT0/SP FAN TRAY READY
0/0/CPU0 ASR9001-LC IOS XR RUN PWR,NSHUT,MON
0/0/0 A9K-MPA-4X10GE OK PWR,NSHUT,MON
0/0/1 A9K-MPA-4X10GE OK PWR,NSHUT,MON
0/PM0/SP A9K-750W-AC READY PWR,NSHUT,MON
RP/0/RSP0/CPU0:asr9001-nV-Edge(admin)#show platform
Node Type State Config State
---------------------------------------------------------------------------------------------------
0/RSP0/CPU0 ASR9001-RP(Active) IOS XR RUN PWR,NSHUT,MON
0/FT0/SP FAN TRAY READY
0/0/CPU0 ASR9001-LC IOS XR RUN PWR,NSHUT,MON
0/0/0 A9K-MPA-20X1GE OK PWR,NSHUT,MON
0/0/1 A9K-MPA-4X10GE OK PWR,NSHUT,MON
0/PM0/SP A9K-750W-DC READY PWR,NSHUT,MON
1/RSP0/CPU0 ASR9001-RP(Active) IOS XR RUN PWR,NSHUT,MON
1/FT0/SP FAN TRAY READY
1/0/CPU0 ASR9001-LC IOS XR RUN PWR,NSHUT,MON
1/0/0 A9K-MPA-20X1GE OK PWR,NSHUT,MON
1/0/1 A9K-MPA-2X10GE OK PWR,NSHUT,MON
1/PM0/SP A9K-750W-DC READY PWR,NSHUT,MON
A cluster node
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 186
ASR9K CPAK - Mode-Change CLI
• Configuration happens at exec-config level
• Example Config:
• hw-module location 0/0/cpu0 port 0 breakout 2xFortyGigE
• hw-module location 0/0/cpu0 port 1 breakout 10xTenGigE
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 187
ASR9K CPAK - 5 Tuple Port Numbering
• 10G interface: Interface Tengig0/5/0/1/0-9 (qty=10 TenGig ports)
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 188
ASR9K CPAK - 5 Tuple Port Numbering - Example 1
Node, port numbering - with slice A9K-8x100GE-SE
RP/0/RP0/CPU0:ASR9K#show run | i module
Building configuration...
hw-module location 0/1/CPU0 port 7 breakout 10xTenGigE
• 10G interfaces uses 5th octet for breakout-10GE-port numbering
TenGigE<rack_num>/<slot_id>/<module/Bay>/<physical-port_num>/<breakout-port-num>
slice 100GE port 10GE port
0 0 0-9
1 0-9
1 2 0-9
TenGigE0/1/0/7/0 3 0-9
TenGigE0/1/0/7/1 2 4 0-9
0 1 0 7 0 3 6 0-9
7 0-9
0 1 0 7 1
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 189
ASR9K CPAK - 5 Tuple Port Numbering - Example 2
Interface Order
hw-module location 0/1/CPU0 port 7 breakout 10xTenGigE
• 10G interfaces uses 5th octet for breakout-10GE-port numbering
TenGigE<rack_num>/<slot_id>/<module/Bay>/<physical-port_num>/<breakout-port-num>
A9K-8x100GE-SE
HundredGigE0/1/0/0 10.1.50.1 Down Down
HundredGigE0/1/0/1 unassigned Down Down
HundredGigE0/1/0/2 unassigned Shutdown Down
HundredGigE0/1/0/3 unassigned Shutdown Down
HundredGigE0/1/0/4 unassigned Shutdown Down
HundredGigE0/1/0/5 unassigned Up Up
HundredGigE0/1/0/6 unassigned Shutdown Down
TenGigE0/1/0/7/0 10.1.10.1 Up Up
TenGigE0/1/0/7/1 10.1.11.1 Up Up
<snip>
TenGigE0/1/0/7/8 10.1.12.1 Up Up
TenGigE0/1/0/7/9 10.1.14.1 Up Up
1) Baseline this is an 8x100GE LC ports 0-7
2) We have broken out 100GE port7 into a 10x10GE breakout, so we no longer have a 100GE port 7
3) We now have 10x10GE ports from TenGigE0/1/0/7/0 - TenGigE0/1/0/7/9
4) We still have 7x100GE ports left, HundredGigE0/1/0/0 - HundredGigE0/1/0/6
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 190
Zero Touch
Provisioning
ZTP Tools & Process: DHCP & HTTP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 192
ZTP: Outcomes and Process
• Upgrade: Download and install packages
• Script: Download and run a shell script
• Configure: Download and commit a config file
• You need to:
• Test
• Verify: Error checking – build in process
• Validate: Validate the node functionality [control and forwarding] -
automate
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 193
HTTP Server: XR Config file
cisco@mamikhai-ubuntu:~$ more /var/www/html/ztp/pe125-config-initial.txt
!! IOS XR Configuration version = 6.2.1
!
hostname PE125 File start:
group ISIS-P2P !! IOS XR == XR config
router isis 'ISIS'
interface 'GigabitEthernet0/0/0/0\..+'
point-to-point
!
!
end-group
clock timezone EST America/New_York
domain name cisco.com
.
interface Loopback0
ipv4 address 10.101.125.1 255.255.255.255
ipv6 address 2001:db8:125::1/128
!
interface GigabitEthernet0/0/0/0
mtu 4470
!
interface GigabitEthernet0/0/0/0.300 l2transport
encapsulation dot1q 300
!
interface GigabitEthernet0/0/0/0.1225
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 194
HTTP Server: XR Script
cisco@mamikhai-ubuntu:~$ more /var/www/html/ztp/pe125-script.sh
#!/bin/bash
/bin/touch $config_log
if [ -f $config_file ]; then
/bin/rm -f $config_file
else
/bin/touch $config_file
fi
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 195
HTTP Server: XR Script - continued
xrapply_with_reason 'Initial ZTP config' $config_file
cisco@mamikhai-ubuntu:~$ ll /var/www/html/ztp/
total 40
drwxr-xr-x 2 root root 4096 Oct 22 08:52 ./ Served by HTTP server
drwxr-xr-x 3 root root 4096 Aug 7 11:26 ../
-rw-r--r-- 1 root root 513 Oct 18 19:46 pe125-config-initial.txt
-rw-r--r-- 1 root root 8503 Oct 18 08:14 pe125-config.txt
.
-rw-r--r-- 1 root root 1090 Oct 22 08:52 pe125-script.sh
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 196
DHCP Server: Initial Parameters & Pointer
cisco@mamikhai-ubuntu:~$ more /etc/dhcp/dhcpd.conf
.
# option definitions common to all supported networks...
option domain-name "cisco.com";
option domain-name-servers 171.70.168.183, 64.102.6.247;
default-lease-time 600;
max-lease-time 7200;
host PE125 {
hardware ethernet 00:50:56:85:da:18;
fixed-address 192.168.30.125;
option routers 192.168.30.1;
filename "http://192.168.30.101/ztp/pe125-script.sh";
}
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 197
ZTP Node Ready for NETCONF
<?xml version="1.0" encoding="UTF-8"?><data <netconf-yang xmlns="http://cisco.com/ns/yang/Cisco-
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" IOS-XR-man-netconf-cfg">
xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0"> <agent>
. <ssh>
<interface-configuration> <enable/>
<active>act</active> </ssh>
<interface-name>MgmtEth0/RP0/CPU0/0</interface- </agent>
name> </netconf-yang>
<ipv4-network xmlns="http://cisco.com/ns/yang/Cisco- .
IOS-XR-ipv4-io-cfg"> <aaa xmlns="http://tail-f.com/ns/aaa/1.1">
<addresses> <authentication>
<primary> <users>
<address>192.168.30.125</address> <user>
<netmask>255.255.255.0</netmask> <name>cisco</name>
</primary> <uid>9000</uid>
</addresses> <gid>100</gid>
</ipv4-network> <password>$1$glU0$OEyQD/4ePFuNrZ2d0xtQo0</password>
</interface-configuration> <ssh_keydir>/var/confd/homes/cisco/.ssh</ssh_keydir>
. <homedir>/var/confd/homes/cisco</homedir>
<ssh xmlns="http://cisco.com/ns/yang/Cisco-IOS-XR- </user>
crypto-ssh-cfg"> </users>
<server> <groups>
<v2/> <group>
<netconf-vrf-table> <name>aaa-r</name>
<vrf> <gid>100</gid>
<vrf-name>default</vrf-name> <users>%%__system_user__%%</users>
<enable/> </group>
</vrf> <group>
</netconf-vrf-table> <name>admin-r</name>
</server> <gid>100</gid>
</ssh> <users>%%__system_user__%%</users>
.
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 198
Configuration:
NetConf-YANG
Configure NetConf over SSH
Pre-requisites: Manageability Package and SSH Service
RP/0/RSP1/CPU0:rasr9000-2w-a#admin show RP/0/RSP1/CPU0:rasr9000-2w-a#crypto key
install active summary generate rsa
Fri Dec 4 00:44:26.004 EST Fri Dec 4 00:44:47.039 EST
Default Profile: The name for the keys will be: the_default
SDRs: Choose the size of the key modulus in the
Owner range of 512 to 4096 for your General
Active Packages: Purpose Keypair. Choosing a key modulus
disk0:asr9k-services-infra-5.3.1 greater than 512 may take a few minutes.
disk0:asr9k-bng-px-5.3.1
disk0:asr9k-video-px-5.3.1 How many bits in the modulus [1024]:
disk0:asr9k-mgbl-px-5.3.1 Generating RSA keys ...
disk0:asr9k-mcast-px-5.3.1 Done w/ crypto generate keypair
disk0:asr9k-k9sec-px-5.3.1 [OK]
disk0:asr9k-services-px-5.3.1
disk0:asr9k-optic-px-5.3.1 RP/0/RSP1/CPU0:rasr9000-2w-a#configure
disk0:asr9k-mpls-px-5.3.1 Fri Dec 4 00:45:02.974 EST
disk0:asr9k-doc-px-5.3.1 RP/0/RSP1/CPU0:rasr9000-2w-a(config)#ssh
disk0:asr9k-fpd-px-5.3.1 server v2
disk0:asr9k-9000v-nV-px-5.3.1 RP/0/RSP1/CPU0:rasr9000-2w-a(config)#commit
disk0:asr9k-li-px-5.3.1 Fri Dec 4 00:45:10.994 EST
disk0:asr9k-mini-px-5.3.1 RP/0/RSP1/CPU0:rasr9000-2w-a(config)#
RP/0/RSP1/CPU0:rasr9000-2w-a#
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 200
Configure NetConf over SSH
NETCONF – YANG – SSH Port
RP/0/RSP1/CPU0:rasr9000-2w-a#show running- RP/0/0/CPU0:PE178#ssh 10.101.137.1 username cisco
config | begin netconf source-interface loopback 0 command netconf format
.
Fri Dec 4 02:45:23.593 EST Password:
Building configuration...
netconf agent tty .
! <?xml version="1.0" encoding="UTF-8"?>
<hello
netconf-yang agent xmlns="urn:ietf:params:xml:ns:netconf:base:1.0”>
ssh <capabilities>
! <capability>
ssh server v2 urn:ietf:params:netconf:base:1.0
ssh server netconf port 830 </capability>
<capability>
.
urn:ietf:params:netconf:capability:candidate:1.0
</capability>
<capability>
urn:ietf:params:netconf:capability:notification:1.0
</capability>
</capabilities>
<session-id>
285212672
</session-id>
</hello>
]]>]]>
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 201
NETCONF Example: <get-config> Operation
<?xml version="1.0" encoding="UTF-8"?> <?xml version="1.0" encoding="UTF-8"?>
<rpc-reply message-id="101"
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
xmlns="urn:ietf:params:xml:ns:netconf:base:1 <data>
<Configuration>
.0"> <InterfaceConfigurationTable MajorVersion="5"
<get-config> MinorVersion="4">
<source> <InterfaceConfiguration>
<Naming>
<running/> <Active>
</source> act
<filter> </Active>
<InterfaceName>
<Configuration> Loopback0
<InterfaceConfigurationTable> </InterfaceName>
</Naming>
<InterfaceConfiguration> <InterfaceVirtual>
<Naming> true
<Active>act</Active> </InterfaceVirtual>
<IPV4Network MajorVersion="6"
<InterfaceName MinorVersion="4">
Match="Loopback.*"/> <Addresses>
</Naming> <Primary>
<Address>
</InterfaceConfiguration> 10.101.137.1
</InterfaceConfigurationTable> </Address>
<Netmask>
</Configuration> 255.255.255.255
</filter> </Netmask>
</get-config> </Primary>
</Addresses>
</rpc> </IPV4Network>
]]>]]> <IPV6Network MajorVersion="2"
MinorVersion="3">
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 202
NETCONF-YANG
Sessions
RP/0/0/CPU0:PE178#show netconf-yang clients
Fri Dec 4 12:51:32.840 EST
Netconf clients
client session ID| NC version| client connect time| last OP time| last OP type| <lock>|
20890| 1.1| 0d 0h 6m 12s| 12:45:19| get| No|
Summary statistics
# requests| total time| min time per request| max time per request| avg time per request|
other 0| 0h 0m 0s 0ms| 0h 0m 0s 0ms| 0h 0m 0s 0ms| 0h 0m 0s 0ms|
close-session 0| 0h 0m 0s 0ms| 0h 0m 0s 0ms| 0h 0m 0s 0ms| 0h 0m 0s 0ms|
kill-session 0| 0h 0m 0s 0ms| 0h 0m 0s 0ms| 0h 0m 0s 0ms| 0h 0m 0s 0ms|
get-schema 57| 0h 0m 2s 489ms| 0h 0m 0s 0ms| 0h 0m 0s 319ms| 0h 0m 0s 8ms|
get 6| 0h 0m 0s 669ms| 0h 0m 0s 9ms| 0h 0m 0s 299ms| 0h 0m 0s 111ms|
get-config 0| 0h 0m 0s 0ms| 0h 0m 0s 0ms| 0h 0m 0s 0ms| 0h 0m 0s 0ms|
edit-config 0| 0h 0m 0s 0ms| 0h 0m 0s 0ms| 0h 0m 0s 0ms| 0h 0m 0s 0ms|
commit 0| 0h 0m 0s 0ms| 0h 0m 0s 0ms| 0h 0m 0s 0ms| 0h 0m 0s 0ms|
cancel-commit 0| 0h 0m 0s 0ms| 0h 0m 0s 0ms| 0h 0m 0s 0ms| 0h 0m 0s 0ms|
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 203
XR XML Schema: Config & Operational
RP/0/0/CPU0:PE178#show xml schema xml-schema[config]:> oper .
Thu Sep 3 11:06:50.353 EDT xml-schema[oper]:> ls [container] ErrorDisable
Username:cisco [container] AAA [container] ES_ACL
Password: [container] AIB [container] EventManager
Enter 'help' or '?' for help [container] ARP_GMP [container] LR
xml-schema[config]:> ls [container] ARP [container] HSRP
[container] AAA [container] BGP [container] HTTPC
[container] AIB [container] [container] HTTP
[container] ARP BundlesAdjacency [container]
[container] BMP [container] Bundles nVSatelliteTable
[container] BGP [container] [container]
[container] BulkStatistics BundleInformation GenericInterfaceListTable
[container] LACP [container] LACPBundles [container]
[container] CallHome [container] GlobalInterfaceConfiguration
[container] CDP LACPBundleMembers [container]
[container] CEM [container] LACPData InterfaceConfigurationTable
[container] NETCONF_YANG [container] CDP [container] NSR
[container] Clock [container] CEM [container] Onep
[container] Crypto [container] CHDLC_MA [container] RCC
[container] [container] Cinetd [container] SLA
AddressPoolService [container] CLNS [container] Statistics
[container] DHCPv6 [container] [container] Syslog
[container] HardwareModule CryptoCertificateAuthority [container] SyslogService
[container] Exception [container] CryptoEngine [container] LISP
[container] EIGRP [container] IKE [container] IPAddressPool
[container] PolicyManager [container] [container] BFD
[container] ERP IPSecStaticSessionInfo [container] IPDomain
[container] .
IPSecDynamicSessionInfo
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 204
Open DayLight: NETCONF Mounting Nodes
Setting up network nodes to be controlled by the controller
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 205
Configuration:
Command Line [CLI]
IOS XR 64 Bit CLI Access
RP XR VM, RP Admin VM, RP Host IOS XR System
Admin
RP/0/RSP0/CPU0:CORE-TOP#run 1
1
RP
[xr-vm_node0_RSP0_CPU0:~]$ 3
[xr-vm_node0_RSP0_CPU0:~]$exit 2
RP/0/RSP0/CPU0:CORE-TOP#
1
RP/0/RSP0/CPU0:CORE-TOP#admin Linux 2 Linux 4
root connected from 192.0.16.4 using ssh on sysadmin-vm:0_RSP0
3
sysadmin-vm:0_RSP0# run Host OS 5 Linux
[sysadmin-vm:0_RSP0:~]$
[sysadmin-vm:0_RSP0:~]$chvrf 0 bash
4 IOS XR System
[sysadmin-vm:0_RSP0:~]$ssh my_host Admin
Line card
[host:~]$ 5
Note Exit from any prompt: Note “chvrf 0 bash” enables ssh to hostnames:
a) hit ‘Ctrl-d’ • ssh my_host Linux 6 Linux 7
b) type ‘exit’ • ssh lc<n>_xr
• ssh lc<n>_admin Host OS 8 Linux
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 207
IOS XR 64 Bit CLI Access
LC XR VM, LC Admin VM, LC Host IOS XR System
RP/0/RSP0/CPU0:CORE-TOP#
Admin
1 1
RP
RP/0/RSP0/CPU0:CORE-TOP#admin 3
aleks connected from 192.0.16.4 using ssh on sysadmin-vm:0_RSP0
3
sysadmin-vm:0_RSP0# run
[sysadmin-vm:0_RSP0:~]$chvrf 0 bash
4 Linux 2 Linux 4
[sysadmin-vm:0_RSP0:~]$ssh lc5_xr
Last login: Sun Nov 10 17:02:15 2019 from 192.0.16.1 Host OS 5 Linux
[xr-vm_node0_5_CPU0 6
[xr-vm_node0_5_CPU0:~]$exit
IOS XR System
Connection to lc5_xr closed.
4
Admin
Line card
[sysadmin-vm:0_RSP0:~]$ssh lc5_admin
Last login: Sun Nov 10 17:02:25 2019 from 192.0.16.1
[sysadmin-vm:0_5:~]$ 7
[sysadmin-vm:0_5:~]$ ssh my_host
Last login: Sun Nov 10 17:02:32 2019 from 10.0.2.15 Linux 6 Linux 7
[host:~]$
8
Host OS 8 Linux
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 208
IOS XR 64 Bit CLI Access Example
RAM available to IOS XR on 32-bit vs 64-bit
32-bit RP/0/RSP1/CPU0:ariad#sh platform | i 8x100GE
Node Type State Config State
0/3/CPU0 A9K-8X100GE-SE IOS XR RUN PWR,NSHUT,MON
RP/0/RSP1/CPU0:ariad#sh memory summary location 0/3/CPU0
node: node0_3_CPU0 Both LCs are 8x100G
------------------------------------------------------------------
Physical Memory: 24576M total
Tomahawk LC
Application Memory : 24253M (18554M available) • TR/SE have the same size
Image: 82M (bootram: 82M) RAM available to LC CPU
Reserved: 224M, IOMem: 0, flashfsys: 0 • TR/SE differ in RAM
Total shared window: 431M available to NP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 209
XR Configuration Key Concepts
• Two Stage Commit
• Config History Database
• Rollback
• Atomic vs. Best Effort
• Multiple Config Sessions
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 210
Commit
Two stage hostname Leif
line default
exec-timeout 1440 0
Active Configuration !
Before Commit taskgroup ops
task read boot
task write boot
task execute bgp
!
router static
hostname Leif
line default
exec-timeout 1440 0
Enter Proposed Changes Active Configuration !
After Commit Interface GigabitEthernet0/3/0/0
ipv4 address 9.9.9.9/24
!
interface gig 0/3/0/0 taskgroup ops
ipv4 address 9.9.9.9/24 task read boot
task write boot
router ospf 100 Commit task execute bgp
area 0 !
interface gig 0/3/0/0 Changes take effect router ospf 100
area 1 area 0
interface ten 0/2/0/0.1 interface GigabitEthernet0/3/0/0
area 1
interface TenGigE0/2/0/0.1
Target Configuration !
router static
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 211
Commit: Verification
Syntax by line, then logic at commit hostname Leif
line default
exec-timeout 1440 0
Active Configuration !
taskgroup ops
Before Commit
task read boot
task write boot
task execute bgp
!
router static
hostname Leif
line default
exec-timeout 1440 0
Syntax Check Active Configuration !
after each line After Commit Interface GigabitEthernet0/3/0/0
ipv4 address 9.9.9.9/24
!
interface gig 0/3/0/0 taskgroup ops
ipv4 address 9.9.9.9/24 task read boot
task write boot
task execute bgp
router ospf 100 Semantic Check !
area 0 during commit
interface gig 0/3/0/0 router ospf 100
area 1 area 0
interface ten 0/2/0/0.1 interface GigabitEthernet0/3/0/0
area 1
interface TenGigE0/2/0/0.1
Target Configuration !
router static
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 212
Commit Behavior: Atomic
Commit all or nothing [default behavior]
hostname odin
Active Configuration line default
exec-timeout 1440 0
Before Commit !
taskgroup ops
task read boot
task write boot
task execute bgp
!
router static
address-family ipv4 unicast
Syntax Check 0.0.0.0/0 7.1.9.1
Active Configuration
after each line 7.7.7.77/32 7.1.9.1
After Commit
PASSES
hostname odin
No Change line default
exec-timeout 1440 0
!
Interface GigabitEthernet0/3/0/0 taskgroup ops
ipv4 address 9.9.9.9/24 Semantic Check task read boot
taskgroup bgp during commit task write boot
task read bgp task execute bgp
task write bgp
FAILS !
BGP cannot be router static
taskgroup name address-family ipv4 unicast
0.0.0.0/0 7.1.9.1
Target Configuration 7.7.7.77/32 7.1.9.1
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 213
Commit Behavior: Best Effort
Commit valid sections
hostname odin
Active Configuration line default
exec-timeout 1440 0
Before Commit !
taskgroup ops
task read boot
task write boot
task execute bgp
!
router static
address-family ipv4 unicast
Syntax Check Active Configuration 0.0.0.0/0 7.1.9.1
after each line After Commit 7.7.7.77/32 7.1.9.1
PASSES
Partial Commit hostname Olav
line default
exec-timeout 1440 0
Interface GigabitEthernet0/3/0/0 !
Interface GigabitEthernet0/3/0/0
ipv4 address 9.9.9.9/24 Semantic Check ipv4 address 9.9.9.9/24
taskgroup bgp during commit !
task read bgp
task write bgp
FAILS taskgroup ops
task read boot
BGP cannot be task write boot
taskgroup name task execute bgp
!
Target Configuration
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 214
Concurrent Config Sessions
Concurrent and exclusive
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 215
Atomic Configuration Replace – NEW Behavior
Replace/remove/add interface config lines witout removing interface
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 217
Configuration Consistency
If the system detects inconsistency: A downgrade example
RP/0/RSP0/CPU0:Jan 2 14:11:35.876 : cfgmgr-rp[161]: %MGBL-CONFIGCLI-3-BATCH_CONFIG_FAIL : 3
config(s) failed during startup. To view failed config(s) use the command - "show configuration
failed startup"
RP/0/RSP0/CPU0:rasr9000-2w-b#configure
Thu Jan 9 20:51:57.470 EST
This SDR's running configuration is inconsistent with persistent configuration.
No configuration commits for this SDR will be allowed until a 'clear configuration
inconsistency' command is performed.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 218
Configuration Consistency
If the system detects inconsistency: A downgrade example
RP/0/RSP0/CPU0:rasr9000-2w-b#show configuration failed startup
Thu Jan 9 21:00:33.389 EST
!!14:11:35 UTC Thu Jan 02 2014
!! SYNTAX/AUTHORIZATION ERRORS: This configuration failed due to
!! one or more of the following reasons:
!! - the entered commands do not exist,
!! - the entered commands have errors in their syntax,
!! - the software packages containing the commands are not active,
!! - the current user is not a member of a task-group that has
!! permissions to use the commands.
router bgp 65001
l2vpn
xconnect group PW-10
p2p PW-10
neighbor ipv4 192.168.10.2 pw-id 10
pw-class PW-GRE
RP/0/RSP0/CPU0:rasr9000-2w-b#clear configuration inconsistency
Thu Jan 9 20:54:46.435 EST
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 219
Agenda
✓ System Architecture: System anatomy & health
✓ Operating System & Configuration: IOS-XR & configuration models
➢ Control, Management, Security: Processing of control & exceptions
➢ Transit Packet/Frame Journey: Life of L3/L2 unicast/multicast
➢ MPLS Operation: Processing, forwarding & L3/L2 service operation
➢ Troubleshooting: Diagnostics, counters, drops, and packet capture
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 220
3 Control,
Management, &
Security
For Us,
Exceptions, &
Resource
Protection
Traffic: Transit, For us, and Exceptions
Differentiate on ingress NP
Line Card (LC) RP
▪ Transit CPU
LC-CPU
– Look up, re-write,
forward
sRP
▪ For us F CPU
– Destined to RP, or A
link local scope B
– Punt to RP or ingress ucode
PIFIB R Egress LC
(TCAM, dynamic)
LC CPU I
Ingress C
▪ Exception NP Exceptions, & some For-
us traffic: L2, BFD, ARP
– MTU failure, TTL For-us traffic processed by
failure, etc. Should ucode LPTS: L3 control traffic,
management
have been transit
Transit traffic
– Punt to LC CPU
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 223
For Us Frame Path
From ingress NP to RP CPU or LC CPU
Control /
“for-us”
packets
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 224
For Us Frame Path
The internal FIB [IFIB]
RP/0/RSP0/CPU0:rasr9000-2w-b#show lpts ifib brief
Wed Dec 28 11:58:43.726 EST
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 225
For Us Frame Path
From ingress NP to RP CPU or LC CPU
Interrupt switching
process
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 226
For Us Frame Path
Processes to watch on RP CPU
▪ Example for BGP CPU utilization for one minute: 26%; five minutes: 25%; fifteen minutes: 22%
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 227
For Us Frame Path
Processes to watch on LC CPU
CPU
Wed Nov 28 01:28:52.281 UTC
CPU utilization for one minute: 46%; five minutes: 48%; fifteen
– netio for internal minutes: 39%
IOS)
45085 22% 23% 22% spp
180316 23% 23% 23% netio
– spp for software RP/0/RSP0/CPU0:rasr9k-1y#show lpts pifib hardware police location 0/0/CPU0
switched (similar to
Wed Nov 28 01:23:10.907 UTC
-------------------------------------------------------------
interrupt switching in
Node 0/0/CPU0:
-------------------------------------------------------------
IOS)
Burst = 100ms for all flow types
-------------------------------------------------------------
FlowType Policer Type Cur. Rate Def. Rate Accepted Dropped
---------------------- ------- ------- ---------- ---------- -------------------- -----------------
fragments
.
UDP-default 163 Local 1000000 3500 38336274 2376859
.
------------------------
– LPTS relaxed for statistics:
Packets accepted by deleted entries: 19477
simulation Packets dropped by deleted entries: 0
Run out of statistics counter errors: 0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 228
For Us Frame Path
Traffic rate from/to each CPU
RP/0/RSP0/CPU0:rasr9k-1y#show netio rates RP/0/RSP0/CPU0:rasr9k-1y#show netio rates
location 0/RSP0/CPU0 location 0/0/CPU0
Thu Jan 3 06:56:28.745 UTC Thu Jan 3 06:56:20.329 UTC
Netio packet rate for node 0/RSP0/CPU0 Netio packet rate for node 0/0/CPU0
----------------------------------- -----------------------------------
Current rate (updated 0 seconds ago): Current rate (updated 0 seconds ago):
Input: 82811 pkts/s Input: 14759 pkts/s
Output: 100 pkts/s Output: 0 pkts/s
Driver Output: 100 pkts/s Driver Output: 14760 pkts/s
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 229
Control Plane Protection
LPTS flow type policers
RP/0/RSP0/CPU0:rasr9k-1y#show lpts pifib hardware police location 0/0/CPU0
Wed Dec 28 06:07:36.931 EST
-------------------------------------------------------------
Node 0/0/CPU0:
-------------------------------------------------------------
Burst = 100ms for all flow types
-------------------------------------------------------------
FlowType Policer Type Cur. Rate Def. Rate Accepted Dropped TOS Value
---------------------- ------- ------- ---------- ---------- ------------ ------------ ----------
unconfigured-default 100 Static 2500 2500 0 0 01234567
Fragment 101 Local 0 2500 0 0 01234567
OSPF-mc-known 102 Static 2000 2000 0 0 01234567
OSPF-mc-default 103 Local 0 1500 53 26 01234567
OSPF-uc-known 104 Static 2000 2000 0 0 01234567
OSPF-uc-default 105 Local 0 1000 0 0 01234567
ISIS-known 143 Static 2000 2000 20890 0 01234567
ISIS-default 144 Local 0 1500 0 0 01234567
.
BGP-known 106 Static 2500 2500 4070 0 01234567
BGP-cfg-peer 107 Static 2000 2000 17 0 01234567
BGP-default 108 Local 0 1500 335787 15570288947 01234567
PIM-mcast-default 109 Local 0 2000 0 0 01234567
PIM-mcast-known 176 Static 2000 2000 0 0 01234567
PIM-ucast 110 Static 1500 1500 0 0 01234567
IGMP 111 Static 3000 3000 0 0 01234567
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 230
Control Plane Protection
LPTS flow type policers
FlowType Policer Type Cur. Rate Def. Rate Accepted Dropped TOS Value
---------------------- ------- ------- ---------- ---------- ------------ ------------ ----------
ICMP-local 112 Static 1500 1500 20044 0 01234567
ICMP-app 152 Local 100 1500 0 0 01234567
ICMP-control 140 Static 1000 1000 0 0 01234567
ICMP-default 153 Local 100 1500 0 0 01234567
ICMP-app-default 152 Local 100 1500 0 0 01234567
LDP-TCP-known 113 Static 2500 2500 0 0 01234567
LDP-TCP-cfg-peer 114 Static 2000 2000 0 0 01234567
LDP-TCP-default 115 Local 0 1500 0 0 01234567
LDP-UDP 116 Static 2000 2000 0 0 01234567
All-routers 117 Local 0 1000 0 0 01234567
.
RSVP-UDP 118 Static 2000 2000 0 0 01234567
RSVP-default 154 Local 0 500 0 0 01234567
RSVP-known 177 Static 7000 7000 0 0 01234567
IKE 119 Static 100 100 0 0 01234567
IPSEC-known 120 Static 400 400 0 0 01234567
IPSEC-default 121 Local 0 100 0 0 01234567
MSDP-known 122 Static 300 300 0 0 01234567
.
MIPv6 88 Static 5000 5000 0 0 01234567
DHCPv4 92 Static 4000 4000 0 0 01234567
DHCPv6 93 Static 4000 4000 0 0 01234567
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 231
Control Plane Protection
LPTS flow types: BGP example
------------------------
statistics:
Packets accepted by deleted entries: 19477
Packets dropped by deleted entries: 0
Run out of statistics counter errors: 0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 232
Control Plane Protection
Customize LPTS flow rates
RP/0/RSP0/CPU0:rasr9k-1y(config)#lpts pifib hardware police location 0/0/CPU0
RP/0/RSP0/CPU0:rasr9k-(config-pifib-policer-per-node)# flow isis default rate 0
RP/0/RSP0/CPU0:rasr9k-(config-pifib-policer-per-node)# flow bgp configured rate 500
RP/0/RSP0/CPU0:rasr9k-(config-pifib-policer-per-node)# flow bgp default rate 0
RP/0/RSP0/CPU0:rasr9k-(config-pifib-policer-per-node)# flow pim multicast default rate 0
RP/0/RSP0/CPU0:rasr9k-(config-pifib-policer-per-node)# flow icmp application rate 100
RP/0/RSP0/CPU0:rasr9k-(config-pifib-policer-per-node)# flow icmp default rate 100
RP/0/RSP0/CPU0:rasr9k-(config-pifib-policer-per-node)# flow ldp tcp default rate 0
RP/0/RSP0/CPU0:rasr9k-(config-pifib-policer-per-node)# flow all-routers rate 0
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 233
Control Plane Protection
LPTS flow policers
RP/0/RSP0/CPU0:rasr9k-1y#show lpts pifib hardware police location 0/0/CPU0
Sun Dec 2 06:32:04.344 UTC
-------------------------------------------------------------
Node 0/0/CPU0:
-------------------------------------------------------------
Burst = 100ms for all flow types
-------------------------------------------------------------
FlowType Policer Type Cur. Rate Def. Rate Accepted Dropped
---------------------- ------- ------- ---------- ---------- -------------------- --------------------
unconfigured-default 100 Static 2500 2500 0 0
Fragment 101 Local 0 2500 0 0
OSPF-mc-known 102 Static 2000 2000 0 0
OSPF-mc-default 103 Local 0 1500 54 27
OSPF-uc-known 104 Static 2000 2000 0 0
OSPF-uc-default 105 Local 0 1000 0 0
ISIS-known 143 Static 2000 2000 21078 0
ISIS-default 144 Local 0 1500 0 0
TCP-known 156 Static 2500 2500 0 0
TCP-listen 157 Static 2500 2500 0 0
TCP-cfg-peer 158 Static 2000 2000 0 0
TCP-default 164 Local 0 2000 95977990 1995220219679
Mcast-known 159 Static 2500 2500 0 0
RADIUS 174 Local 0 2000 0 0
TACACS 175 Static 2000 2000 0 0
NTP-default 126 Local 0 200 0 0
NTP-known 180 Local 0 200 0 0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 234
Control Plane Protection
LPTS PIFIB
• LPTS is the group of processes to transport for-us packets
• Destination is either RP CPU’s or ingress LC CPU
• 5 queues of different priorities in Typhoon NP
• LPTS policers
• Configured LC flow rate applied to LC, if not then configured global flow
rate applied, if not then a default rate applied
• Enforced by each NP
• Flow entries created and installed based on: configuration and neighbor
flow state [e.g. BGP TCP]
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 235
For Us Packet Forwarding Entries
LPTS flow entries
RP/0/RSP0/CPU0:ASR9006-2w-a.PE2#show lpts pifib hardware entry statistics location 0/0/CPU0
.
Offset L3 VRD id L4 Intf Dest Pkts/Drops laddr,Port raddr,Port
------ ---- ------------ ------ --------------- ----------- ---------------- ---------------------
8 IPV4 * any any Local 0/0 any,any any,any
9 CLNS * - BE1 LM[3] 0/0 - -
10 CLNS * - Te0/0/0/1 LM[3] 59571/0 - -
11 CLNS * - Te0/0/0/4.100 LM[3] 0/0 - -
12 CLNS * - any LU(30) 8/0 - -
13 IPV4 * ICMP any Local 0/0 any,any any,ECHO
14 IPV4 default RSVP Te0/0/0/1 Local 15120/0 any,any any,any
15 IPV4 default TCP any LM[3] 16991/0 any,65264 10.10.1.1,179
16 IPV4 default TCP any LU(30) 19377/0 any,42370 10.10.1.1,646
.
------------------------
statistics:
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 236
For Us Packet Forwarding Entries
LPTS flow entries
RP/0/RSP0/CPU0:rasr9k-1y#show
lpts pifib .
----------------------------------------------------
hardware entry location 0/0/CPU0
Sun Dec 2 00:46:50.573 UTC Show flow policers in VRF ID
Destination IP
: 0x60000000
: 2001:db8:1:a06::
Node: 0/0/CPU0:
LC TCAM. Source IP : 2001:db8:1:c06::
Is Fragment : 0
----------------------------------------
Interface : any
M - Fabric Multicast;
M/L/T/F :
L - Listener Tag; T - Min TTL;
1/IPv6_STACK/0/BGP-known
F - Flow Type;
DestNode : 48
DestNode - Destination Node;
DestAddr : 48
DestAddr - Destination Fabric queue;
SID : 7
SID - Stream ID;
Po - Policer; Ct - Stats Counter; BGP-known L4 Protocol
TCP flag byte
: TCP
: any
Session already
Lp - Lookup priority; Sp - Storage
Source port : Port:60698
Priority;
Destination Port : 179
Ar - Average rate limit; Bu - Burst;
HAr - Hardware Average rate limit; HBu established. Flow Ct : 0x5f0690
parameters in
Accepted/Dropped : 3189/0
- Hardware Burst;
Lp/Sp : 1/255
Cir - Committed Information rate in
HAL hardware policer. # of TCAM entries : 1
HPo/HAr/HBu/Cir :
Rsp - Relative sorting position;
15794309/2500pps/1250ms/2500pps
Rtp - Relative TCAM position;
State : Entry in TCAM
na - Not Applicable or Not Available
Rsp/Rtp : 5/15
. ----------------------------------------------------
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 237
For Us Packet Forwarding Entries
LPTS flow entries
---------------------------------------------------- ----------------------------------------------------
VRF ID : 0x60000000 VRF ID : 0x60000000
BGP-known
Destination IP : any Destination IP : 2001:db8:1:a06::
Source IP : 192.1.1.2 Source IP : 2001:db8:1:c06::
Is Fragment
Interface
: 0
: any
Active session Is Fragment
Interface
: 0
: any
M/L/T/F :
0/IPv4_STACK/255/BGP-known
with a configured M/L/T/F :
0/IPv6_LISTENER/0/BGP-cfg-peer
DestNode : 48 peer. DestNode : 48
DestAddr : 48 DestAddr : 48
SID : 7 SID : 8
L4 Protocol : TCP L4 Protocol : TCP
TCP flag byte : any TCP flag byte : any
BGP-cfg-peer
Source port : Port:179 Source port : Port:any
Destination Port : 41243 Destination Port : 179
Ct : 0x5f0670
Accepted/Dropped : 0/0 Open to receiving Ct : 0x5f0340
Accepted/Dropped : 0/0
Lp/Sp : 1/255
# of TCAM entries : 1
peer attempts to Lp/Sp : 1/255
# of TCAM entries : 1
HPo/HAr/HBu/Cir : establish. HPo/HAr/HBu/Cir :
15794309/2500pps/1250ms/2500pps 15794310/2000pps/1000ms/2000pps
State : Entry in TCAM State : Entry in TCAM
Rsp/Rtp : 6/16 Rsp/Rtp : 7/17
---------------------------------------------------- ----------------------------------------------------
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 238
For Us Packet Forwarding Entries
LPTS flow entries
---------------------------------------------------- ----------------------------------------------------
VRF ID : any VRF ID : any
Destination IP : any Destination IP : any
Source IP : any BGP-default Source IP : any
Is Fragment
Interface
: 0
: any Any TCP from Is Fragment
Interface
: 0
: any
M/L/T/F
default
: 0/BGP4_FM/0/BGP-
port 179 not M/L/T/F
default
: 0/BGP4_FM/0/BGP-
BGP-default
Source port : Port:179 Source port : Port:any
Destination Port : any Destination Port : 179
Ct : 0x5f01b0
Accepted/Dropped : 300890/13952472426 Any TCP to port Ct : 0x5f01a0
Accepted/Dropped : 0/0
Lp/Sp : 1/0
# of TCAM entries : 1
179 not matching Lp/Sp : 1/0
# of TCAM entries : 1
HPo/HAr/HBu/Cir : previous entries. HPo/HAr/HBu/Cir :
15794311/0pps/750ms/1pps 15794311/0pps/750ms/1pps
State : Entry in TCAM State : Entry in TCAM
Rsp/Rtp : 13/23 Rsp/Rtp : 15/25
---------------------------------------------------- ----------------------------------------------------
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 239
For Us Packet Forwarding Entries
LPTS flow entries
---------------------------------------------------- ----------------------------------------------------
VRF ID : any VRF ID : any
TCP-default
Destination IP : any Destination IP : any
Source IP : any Source IP : any
Is Fragment
Interface
: 0
: any
Any IPv4 TCP not Is Fragment
Interface
: 0
: any
M/L/T/F
default
: 0/TCP4_FM/0/TCP- matched by M/L/T/F
default
: 0/RAWIP4_FM/0/Raw-
Raw-default
Source port : Port:any Destination Port : any
Destination Port : any Ct : 0x5f01f0
Ct
Accepted/Dropped :
: 0x5f0170
Any IPv4 not Accepted/Dropped : 10272/18857
Lp/Sp : 1/0
95947801/1817465391676
Lp/Sp : 1/0
matched by # of TCAM entries : 1
HPo/HAr/HBu/Cir :
# of TCAM entries : 1 previous entries. 15794370/0pps/1250ms/1pps
HPo/HAr/HBu/Cir : State : Entry in TCAM
15794367/0pps/1000ms/1pps Rsp/Rtp : 28/38
State : Entry in TCAM ----------------------------------------------------
Rsp/Rtp : 24/34
----------------------------------------------------
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 240
Control Plane Protection
LPTS: PIFIB ACL-Based Policers
RP/0/RSP0/CPU0:rasr9000-2w-b#show running-config RP/0/RSP0/CPU0:rasr9000-2w-b#show running-config
ipv4 access-list lpts pifib hardware police
Thu Apr 3 18:21:35.034 EDT Thu Apr 3 18:25:22.831 EDT
ipv4 access-list PE lpts pifib hardware police
10 remark PE LOOPBACKS acl PE rate 11000
20 permit ipv4 10.101.0.1 0.0.255.0 any flow bgp known rate 6000
40 deny ipv4 any any flow bgp configured rate 1000
! flow bgp default rate 0
ipv4 access-list CORE acl CORE rate 33000 “per-ACL” PPS
10 permit ipv4 10.100.0.0/16 any acl OFFENDERS rate 0
rate
20 deny ipv4 any any !
!
ipv4 access-list OFFENDERS
10 permit ipv4 host 172.19.19.1 any
20 permit ipv4 host 172.19.19.15 any
30 permit ipv4 172.19.19.224/29 any
40 deny ipv4 any any
!
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 241
Control Plane Protection
LPTS: PIFIB ACL-Based Policers
RP/0/RSP0/CPU0:rasr9000-2w-b#show lpts pifib hardware entry brief location 0/1/CPU0
Thu Apr 3 18:28:57.713 EDT
Node: 0/0/CPU0:
----------------------------------------
L3 - L3 Protocol;L4 - Layer4 Protocol; Intf - Interface;
Dest - Destination Node; V - Virtual;
na - Not Applicable or Not Available;
LU - Local chassis fabric unicast;
LM - Local chassis fabric multicast;
RU - Multi chassis fabric unicast;
RM - Multi chassis fabric multicast;
def - default
Offset L3 VRF id L4 Intf Dest laddr,Port raddr,Port acl name
------ ---- ------------ ------ --------------- --------- ---------- ---------------------------
.
18 IPV4 default RSVP Gi0/1/0/3.400 Local any,any any,any
19 IPV4 default TCP any LU(30) any,179 10.100.104.1,28603 CORE
20 IPV4 default TCP any LU(30) any,40607 10.100.102.1,179 CORE
21 IPV4 default TCP any LM[3] any,38362 10.100.108.1,646 CORE
22 IPV4 default UDP any LM[3] any,646 192.168.10.2,any
23 IPV4 default UDP any LM[3] any,646 10.100.108.1,any CORE
24 IPV4 default TCP any LU(30) any,179 10.100.102.1,any CORE
25 IPV4 default TCP any LU(30) any,179 10.100.104.1,any CORE
26 IPV4 default TCP any LU(30) any,23 any,any
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 242
Control Plane Protection
LPTS: PIFIB ACL-Based Policers
RP/0/RSP0/CPU0:rasr9000-2w-b#show
lpts pifib hardware entry VRF ID : 0x60000000
type ipv4 start-index 12 num-entries 7 location 0/1/CPU0 Destination IP : any
Thu Apr 3 18:40:54.467 EDT
. Source IP : 10.100.108.1
VRF ID : 0x60000000 Is Fragment : 0
Destination IP : any Interface : any
Source IP : 10.100.104.1 M/L/T/F : 1/IPv4_LISTENER/0/LDP-UDP
Is Fragment : 0 DestNode : FGID 3
Interface : any DestAddr : 3
M/L/T/F : 0/IPv4_STACK/0/BGP-known SID : 7
DestNode : 48 L4 Protocol : UDP
DestAddr : 48 Source port : Port:any
SID : 7 Destination Port : 646
L4 Protocol : TCP Ct : 0x612060
TCP flag byte : any Accepted/Dropped : 16214/0
Source port : Port:28603 Lp/Sp : 1/255
Destination Port : 179 # of TCAM entries : 1
Ct : 0x612050 HPo/HAr/HBu/Cir/acl:
Accepted/Dropped : 5058/0 14876914/33000pps/33000ms/33000pps/CORE
Lp/Sp : 1/255 State : Entry in TCAM
# of TCAM entries : 1 Rsp/Rtp : 16/30
HPo/HAr/HBu/Cir/acl: --------------------------------------------------
14876914/33000pps/33000ms/33000pps/CORE --
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 243
Control Plane Protection
LPTS Excessive Flow Trap
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 244
Control Plane Protection
LPTS Excessive Flow Trap: Configuration
RP/0/RSP0/CPU0:rasr9000-2w-b#show running-config lpts punt excessive-flow-trap
Tue Mar 11 11:47:47.820 EDT
lpts punt excessive-flow-trap
penalty-rate arp 50
penalty-rate icmp 50
penalty-rate igmp 100
penalty-rate ip 100
penalty-timeout arp 5 • Policing per Src MAC on main interfaces
penalty-timeout icmp 5
penalty-timeout igmp 2 • Policing per Src MAC on BNG sub-interfaces
penalty-timeout ip 4 • Policing per sub-int on non-BNG
non-subscriber-interfaces mac
! • Change with “non-subscriber-interfaces mac”
▪ Policing for-us from offending source instead of dropping for flow type from all peers
▪ Penalizing “bad actor” on major protocols: IP, IGMP, ICMP, ARP, DHCP, PPP, PPPoE,
L2TP. Potentially impacting several protocols from offending peer
▪ Not enabled by default
▪ Check if default penalty rates and timeouts are acceptable in your case
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 245
Control Plane Protection
LPTS Excessive Flow Trap: Default & Configured Penalties
RP/0/RSP0/CPU0:rasr9000-2w-b#show lpts punt excessive-flow-trap information
.
Police Penalty
Rate (pps) Timeout (mins)
Protocol Default Config Default Config Punt Reasons
-------- -------------- -------------- ----------------
ARP 10 50 15 5 ARP
Reverse ARP
Dynamic ARP Inspection (DAI)
ICMP 10 50 15 5 ICMP
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 246
Control Plane Protection
LPTS Excessive Flow Example: A VRRP Flooding
LC/0/0/CPU0:Mar 11 12:52:09.059 : flowtrap[187]: %OS-FLOWTRAP-4-BAD_ACTOR_INTF_DETECTED : Excessive VRRP
flow detected on interface TenGigE0/0/0/5.511. The interface will be penalty-policed at 10 pps for 15
minutes.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 247
Control Plane Protection
LPTS Excessive Flow Example: A VRRP Flooding
RP/0/RSP0/CPU0:rasr9000-2w-b#show vrrp
Tue Mar 11 13:07:23.623 EDT
IPv4 Virtual Routers:
A indicates IP address owner
| P indicates configured to preempt
| |
Interface vrID Prio A P State Master addr VRouter addr
Te0/0/0/5.500 100 100 P Master local 172.24.1.1
Te0/0/0/5.501 101 90 P Backup 172.24.1.2 172.24.1.1
Te0/0/0/5.502 102 100 P Master local 172.24.1.1
Te0/0/0/5.503 103 90 P Backup 172.24.1.2 172.24.1.1
Te0/0/0/5.504 104 100 P Master local 172.24.1.1
Te0/0/0/5.505 105 90 P Backup 172.24.1.2 172.24.1.1
Te0/0/0/5.506 106 100 P Master local 172.24.1.1
Te0/0/0/5.507 107 90 P Backup 172.24.1.2 172.24.1.1
Te0/0/0/5.508 108 100 P Master local 172.24.1.1
Te0/0/0/5.509 109 90 P Backup 172.24.1.2 172.24.1.1
Te0/0/0/5.510 110 100 P Master local 172.24.1.1
Te0/0/0/5.511 111 90 P Master local 172.24.1.1
Te0/0/0/5.512 112 100 P Master local 172.24.1.1
Te0/0/0/5.513 113 90 P Backup 172.24.1.2 172.24.1.1
Te0/0/0/5.514 114 100 P Master local 172.24.1.1
Te0/0/0/5.515 115 90 P Backup 172.24.1.2 172.24.1.1
Te0/0/0/5.516 116 100 P Master local 172.24.1.1
Te0/0/0/5.517 117 90 P Backup 172.24.1.2 172.24.1.1
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 248
Control Plane Protection
LPTS exception punt
• Handles transit exceptions, some protocols, and snooping
• Exceptions are transit that needs special processing [examples: MTU failure, TTL exhaustion]
• Some protocols handled by LC CPU [BFD, ARP, CDP]
• IGMP snooping
• Punted to LC CPU
• Exception is IGMP snooping, punted to RSP CPU’s
• Policers
• Configured LC rate applied to LC, if not then a default rate applied
• No global rate configuration option. But a pre-configuration per LC option
• Enforced by each NP’s microcode
• More policers are added in newer releases
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 249
Control Plane Protection
Exception punt policers
RP/0/RSP0/CPU0:rasr9k-1y#show lpts pifib hardware static-police location 0/0/CPU0
Sun Dec 2 06:42:23.474 UTC
-------------------------------------------------------------
Node 0/0/CPU0:
-------------------------------------------------------------
Burst = 100ms for all flow types
-------------------------------------------------------------
Punt Reason SID Flow Rate Burst Rate Accepted Dropped Destination
----------------------- --------------- --------- --------- ----------- ---------- -----------
PUNT_INVALID NETIO_LOW 100 20 0 0 Local
.
PUNT_ARP ARP 1000 200 1888820 0 Local
.
PUNT_IGMP_SNOOP NETIO_MED 4000 2000 0 0 0x0030 (0/RSP0/CPU0)
PUNT_MLD_SNOOP NETIO_MED 4000 2000 0 0 0x0030 (0/RSP0/CPU0)
.
PUNT_IPv4_OPTIONS NETIO_LOW 5000 1000 0 0 Local
.
PUNT_FOR_ICMP NETIO_LOW 250 200 0 0 Local
PUNT_TTL_EXCEEDED NETIO_LOW 2000 400 0 0 Local
PUNT_FRAG_NEEDED NETIO_LOW 1000 400 0 0 Local
PUNT_PPPOE_FRAG_NEEDED NETIO_LOW 1000 400 0 0 Local
PUNT_IPV4_BFD BFD 12800 3500 0 0 Local
.
PUNT_IPV6_LINK_LOCAL NETIO_HI 2000 2000 0 0 Local
PUNT_IPV6_SRC_LINK_LOCAL NETIO_HI 2000 2000 0 0 Local
PUNT_IPV6_HOP_BY_HOP NETIO_LOW 5000 1000 2533 0 Local
PUNT_IPV6_TTL_ERROR NETIO_LOW 2000 400 0 0 Local
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 250
Control Plane Protection
Customize punt policer rates
RP/0/RSP0/CPU0:rasr9k-1y(config)#lpts punt police location 0/0/CPU0
RP/0/RSP0/CPU0:rasr9k-1(config-punt-policer-per-node)# protocol cdp rate 50
RP/0/RSP0/CPU0:rasr9k-1(config-punt-policer-per-node)# protocol arp rate 5000
RP/0/RSP0/CPU0:rasr9k-1(config-punt-policer-per-node)# protocol ipv4 options rate 100
RP/0/RSP0/CPU0:rasr9k-1(config-punt-policer-per-node)# exception icmp rate 200
RP/0/RSP0/CPU0:rasr9k-1(config-punt-policer-per-node)# exception ipv4 ttl-error rate 500
.
RP/0/RSP0/CPU0:rasr9k-1y#show running-config lpts punt police location 0/0/CPU0
Sun Dec 2 07:05:30.358 UTC
lpts punt police location 0/0/CPU0
exception invalid rate 400
protocol cdp rate 50
protocol arp rate 5000
protocol ipv4 options rate 100
exception icmp rate 200
exception ipv4 ttl-error rate 500
exception ipv4 fragment rate 10000
exception adjacency rate 300
exception acl-deny rate 50
exception ipv6 ttl-error rate 500
exception ipv6 fragment rate 10000
exception mpls fragment rate 10000
exception mpls ttl-error rate 500
!
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 251
Control Plane Protection
Customize punt policer rates – pre-configure
RP/0/RSP0/CPU0:rasr9k-1y(config)#lpts punt police location preconfigure 0/4/CPU0
RP/0/RSP0/CPU0:rasr9k-1(config-punt-policer-per-node)# protocol cdp rate 50
RP/0/RSP0/CPU0:rasr9k-1(config-punt-policer-per-node)# protocol arp rate 5000
RP/0/RSP0/CPU0:rasr9k-1(config-punt-policer-per-node)# protocol ipv4 options rate 100
RP/0/RSP0/CPU0:rasr9k-1(config-punt-policer-per-node)# exception icmp rate 200
RP/0/RSP0/CPU0:rasr9k-1(config-punt-policer-per-node)# exception ipv4 ttl-error rate 500
.
RP/0/RSP0/CPU0:rasr9k-1y#show running-config lpts punt police location 0/4/CPU0
Sun Dec 2 07:05:30.358 UTC
lpts punt police location 0/4/CPU0
exception invalid rate 400
protocol cdp rate 50
protocol arp rate 5000
protocol ipv4 options rate 100
exception icmp rate 200
exception ipv4 ttl-error rate 500
exception ipv4 fragment rate 10000
exception adjacency rate 300
exception acl-deny rate 50
exception ipv6 ttl-error rate 500
exception ipv6 fragment rate 10000
exception mpls fragment rate 10000
!
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 252
Control Plane Protection
Monitoring Hints
▪ A TCL script to periodically check and log excessive drops:
https://supportforums.cisco.com/sites/default/files/legacy/1/5/2/116251-IOS-
XR_LPTS_Alerting.tar.gz
– lpts-threshold-alerting.tcl[65755]: LPTS threshold (80%) exceeded for flow type
Raw-default on 0/2/0, 102.513333333% of 250 pps in last 60 seconds
▪ To clear punt/exception Accepted/Dropped counters:
– #clear controller np counters all location …
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 253
Management
Management
Management Plane Protocols
▪ FTP
▪ NETCONF SSH
▪ NetFlow
▪ NTP
▪ RADIUS
▪ SCP
▪ SFTP
▪ SNMP
▪ SSH
▪ Syslog
▪ TACACS+
▪ Telnet
▪ Telemetry protocols
▪ TFTP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 255
Management Traffic
Management interfaces: Out-of-band, in-band, and “global”
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 257
Management Traffic
Out-of-Band: Virtual address, interfaces, and protocols
RP/0/RSP0/CPU0:rasr9k-1y#show running-config RP/0/RSP0/CPU0:rasr9k-1y#show mgmt-plane
control-plane management-plane out-of-band Wed Dec 5 00:46:26.162 UTC
Wed Dec 5 00:45:07.132 UTC
control-plane Management Plane Protection
out-of-band
vrf MGMT .
interface MgmtEth0/RSP0/CPU0/0
allow SSH peer outband interfaces
address ipv4 172.16.0.0/16 ----------------------
address ipv6 2001:db8:1:ace::/64 interface - MgmtEth0/RSP0/CPU0/0
! ssh configured -
allow NETCONF peer peer v4 allowed - 172.16.0.0/16
address ipv4 172.16.0.0/16 peer v6 allowed - 2001:db8:1:ace::/64
address ipv6 2001:db8:1:ace::/64 netconf configured -
! peer v4 allowed - 172.16.0.0/16
. peer v6 allowed - 2001:db8:1:ace::/64
interface MgmtEth0/RSP1/CPU0/0 .
allow SSH peer
address ipv4 172.16.0.0/16
address ipv6 2001:db8:1:ace::/64
!
allow NETCONF peer
address ipv4 172.16.0.0/16
address ipv6 2001:db8:1:ace::/64
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 258
Management Traffic
In-band: If OOB is not available
RP/0/RSP0/CPU0:rasr9k-1y#show running-config RP/0/RSP0/CPU0:rasr9k-1y#show mgmt-plane
control-plane management-plane inband Wed Dec 5 00:46:26.162 UTC
Tue Dec 11 23:05:11.597 UTC
control-plane Management Plane Protection
management-plane
inband inband interfaces
interface TenGigE0/0/0/2 ----------------------
allow SSH peer interface - TenGigE0_0_0_2/
address ipv4 192.168.1.0/24 ssh configured -
address ipv6 2001:db8:1:f192::/64 peer v4 allowed - 192.168.1.0/24
! peer v6 allowed - 2001:db8:1:f192::/64
!
! outband interfaces
! ----------------------
! interface - MgmtEth0/RSP0/CPU0/0
ssh configured -
peer v4 allowed - 172.16.0.0/16
peer v6 allowed - 2001:db8:1:ace::/64
netconf configured -
peer v4 allowed - 172.16.0.0/16
peer v6 allowed - 2001:db8:1:ace::/64
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 259
Management Protection
Authentication, authorization, and accounting
tacacs source-interface Loopback1 vrf MGMT RP/0/RSP0/CPU0:rasr9k-1y(config)#do show aaa
tacacs-server host 172.16.1.98 port 49 taskgroup
key 7 13061E010803 Wed Dec 5 01:40:50.022 UTC
! Task group 'operation'
taskgroup operation Inherits from task group 'operator'
task read bgp
task read isis Task IDs included directly by this group:
task write ospf Task: bgp : READ
inherit taskgroup operator Task: isis : READ
! Task: ospf : READ WRITE
taskgroup provisioning
inherit taskgroup netadmin Task group 'operation' has the following combined
description PROVISIONING GROUP set
! of task IDs (including all inherited groups):
usergroup PROVISIONING Task: basic-services : READ WRITE
taskgroup netadmin EXECUTE DEBUG
taskgroup provisioning Task: bgp : READ
!
Task: cdp : READ
aaa authentication login default local Task: diag : READ
aaa accounting exec default start-stop group Task: ext-access : READ
tacacs+ none EXECUTE
aaa authorization exec default group tacacs+ Task: isis : READ
local none Task: logging : READ
aaa authorization commands default group tacacs+ Task: ospf : READ WRITE
none Task group 'provisioning'
aaa authentication login default group tacacs+ Inherits from task group 'netadmin’
local .
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 260
More Control
Plane Security
What’s at stake?
Security is CIA
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 262
Control Plane Protection
Some Essential & Easy Protections
Limit TCP syn wait time !
tcp synwait-time 10 ! Default is 30 sec!
Accept only up to 200 connections per sec
tcp accept-rate 200 ! Default is 500
Max no. of for-us packets in assembler
ipv6 assembler max-packets 5 ! Default is 1000 packets
Discard timer for for-us frags in assembler
ipv6 assembler timeout 5
Max no. of for-us packets in assembler
Global
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 263
Control Plane Protection
Some Essential & Easy Protections
!
Disable proxy ARP interface GigabitEthernet0/0/1/0
no proxy-arp ! Default
Disable IPv4 redirects
no ipv4 redirects ! Default
Interface
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 264
Control Plane Protection
Routing & MPLS Protocol Security
key chain ISIS router ospf OSPF router bgp 6539
key 1 vrf MGMT nsr
accept-lifetime 00:00:00 january 01 2012 router-id 172.24.100.100 bgp router-id 192.168.1.240
23:59:59 december 31 2014 area 0 .
key-string password 153B382537 authentication message-digest keychain !
send-lifetime 00:00:00 january 01 2012 OSPF-MGMT neighbor 192.1.1.2
23:59:59 december 31 2014 interface Loopback1 remote-as 64000
cryptographic-algorithm HMAC-MD5 ! password encrypted 1511021F0725
! interface MgmtEth0/RSP0/CPU0/0 ttl-security
router isis ISIS ! address-family ipv4 unicast
is-type level-2-only interface MgmtEth0/RSP1/CPU0/0 route-policy CUSTOMER-A in
net 49.6539.1291.6800.1240.00 ! maximum-prefix 200 70
nsf ietf ! remove-private-AS
lsp-password keychain ISIS ! !
address-family ipv4 unicast ! !
metric-style wide
!
interface TenGigE0/0/0/2
circuit-type level-2-only rsvp
hello-padding disable interface TenGigE0/0/0/2
hello-password keychain ISIS !
address-family ipv4 unicast authentication
metric 20 key-source key-chain RSVP-KEY
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 265
Control Plane Protection
VPLS Control Security: MAC LIMIT
▪ MAC learning limit per RP/0/RSP0/CPU0:rasr9k-1y#show running-config l2vpn
Fri Dec 7 23:23:15.872 UTC
bridge domain & per AC l2vpn
– BD limit = OR > aggregate bridge group BRIDGES
for AC’s bridge-domain DOMAIN-A
mac
– Default is 4K, but no action limit
maximum 2000
▪ “No-flood” to prevent action no-flood
learning & flooding notification both
!
– Traffic from known MAC secure
sources continues to be action none
forwarded/flooded. Unicast logging
From unknown (new) is !
!
dropped .
!
– Protection to both Control
interface GigabitEthernet0/0/1/10.100
and Data planes
mac
limit
▪ Notification both: Syslog maximum 1000
and SNMP action no-flood
notification both
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 266
Control Plane Protection
VPLS Control Security: MAC LIMIT
RP/0/RSP0/CPU0:Dec 9 05:34:45.987 : l2vpn_mgr[1126]: %L2-L2VPN-6-MAC_LIMIT_AC_SET :
Notification: Limit Number of MAC addresses in AC 'Gi0/0/1/19.101' has reached the configured MAC limit maximum,
MAC learning and unicast flooding disabled
exceeded and
RP/0/RSP0/CPU0:rasr9k-1y#show l2vpn bridge-domain interface GigabitEthernet 0/0/1/19.101
action being taken detail
Sun Dec 9 06:10:10.934 UTC
Legend: pp = Partially Programmed.
Bridge group: BRIDGES, bridge-domain: DOMAIN-A, id: 0, state: up, ShgId: 0, MSTi: 0
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 267
Securing the Data
Plane
Data Plane Protection
Reverse Path Forwarding Verification: uRPF Loose
and multi-homed
ipv6 verify unicast source reachable-via any
!
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 270
Data Plane Protection
VPLS Storm Control: Flooding is Costly
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 272
Data Plane Protection
VPLS Storm Control
▪ For Data Centers: RP/0/RSP0/CPU0:rasr9k-1y#show l2vpn bridge-domain interface GigabitEthernet
0/0/1/19.101 detail
broadcast and Mon Dec 10 07:15:42.544 UTC
Legend: pp = Partially Programmed.
unknown unicast rate is Bridge group: BRIDGES, bridge-domain: DOMAIN-A, id: 0, state: up, ShgId: 0, MSTi: 0
influenced by ARP and .
List of ACs:
MAC aging on hosts AC: GigabitEthernet0/0/1/19.101, state is up
and network devices .
MAC aging time: 300 s, Type: inactivity
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 273
Data Plane Protection
VPLS ARP Inspection
▪ Perform ARP/RARP RP/0/RSP0/CPU0:rasr9k-1y#show running-config l2vpn
Tue Dec 11 03:50:31.612 UTC
checks: l2vpn
bridge group BRIDGES
– All: Sender_MAC == bridge-domain DOMAIN-A
Source_MAC .
dynamic-arp-inspection
– Replies: Target_MAC logging
== Dest_MAC address-validation
src-mac
– ARP request source dst-mac
IPv4 is unicast !
ipv4
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 274
Data Plane Protection
VPLS ARP Inspection
▪ Violations are logged RP/0/RSP0/CPU0:rasr9k-1y#show l2vpn forwarding interface GigabitEthernet 0/0/1/10.100 detail
location 0/0/CPU0
and dropped Tue Dec 11 06:29:08.357 UTC
Local interface: GigabitEthernet0/0/1/10.100, Xconnect id: 0x40001, Status: up
.
Flooding:
Broadcast & Multicast: enabled
Unknown unicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 1000, Action: limit, no flood, Notification: syslog, trap
MAC limit reached: no
MAC Secure: enabled, Logging: disabled, Action: restrict
DHCPv4 snooping: profile not known on this node, disabled
Dynamic ARP Inspection: enabled, Logging: enabled
Dynamic ARP Inspection Address Validation:
IPv4 verification: enabled
Source MAC verification: enabled
Destination MAC verification: enabled
IP Source Guard: disabled, Logging: disabled
IGMP snooping profile: profile not known on this node
AC: limit
!
.
– Log secure
action none
– Drop frame !
interface GigabitEthernet0/0/1/0.200
mac
▪ A bridge domain limit
maximum 1000
level options is to action no-flood
notification both
shut down !
secure
“offending” AC action restrict
logging
!
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 276
Data Plane Protection
VPLS MAC Security
RP/0/RSP0/CPU0:rasr9k-1y#show l2vpn forwarding bridge-domain mac-address location 0/0/CPU0
Fri Dec 14 02:48:57.535 UTC
To Resynchronize MAC table from the Network Processors, use the command...
l2vpn resynchronize forwarding mac-address-table location <r/s/i>
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 277
Data Plane Protection
Other Protections to Consider
▪ Routing:
– Perimeter ACL [Also protects control and management planes]
– Policing and admission control
– No default route
– Routing to Null0
– BGP source/destination RTBH, and sinkholing
– CSC label security
▪ Ethernet services:
– DHCP snooping
– IP source guard
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 278
Agenda
✓ System Architecture: System anatomy & health
✓ Operating System & Configuration: IOS-XR & configuration models
✓ Control, Management, Security: Processing of control & exceptions
➢ Transit Packet/Frame Journey: Life of L3/L2 unicast/multicast
➢ MPLS Operation: Processing, forwarding & L3/L2 service operation
➢ Troubleshooting: Diagnostics, counters, drops, and packet capture
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 279
4 Transit
Packet/Frame Journey
Traffic: Transit, For us, and Exceptions
Differentiate on ingress NP
Line Card (LC) RP
▪ Transit CPU
– Look up, re-write, LC-CPU
forward
sRP
▪ For us F CPU
– Destined to RP, or A
link local scope B
– Punt to RP or ingress ucode
PIFIB R Egress LC
LC CPU
(TCAM, dynamic)
I
C
▪ Exception
Ingress
NP Exceptions, & some For-
us traffic: L2, BFD, ARP
– MTU failure, TTL
failure, etc. Should
For-us traffic processed by
ucode LPTS: L3 control traffic,
have been transit management
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 281
L3 Unicast
Packet
Forwarding
Unicast Transit Frame Path
Physical > NP > FIA > Fabric > [FIA > NP] > Physical
optics
optics
SFP
Lightspeed optics
optics
SFP
Tomahawk FIA optics
optics
optics
Lightspeed optics
optics
optics
Lightspeed optics
optics
SFP optics
optics
Tomahawk FIA Lightspeed optics
optics
SFP
Lightspeed optics
optics
optics
optics
SFP optics
Lightspeed optics
optics
SFP
Tomahawk FIA Switch optics
Fabric
A9K-8X100GE A99-32X100GE
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 283
Unicast Transit Frame Path
Forwarding
• All frames take same path stages
• Ingress physical => ingress NP => FIA => fabric => FIA => egress NP => egress
physical
• Super-framing in fabric, and per super-frame load sharing
• Two stage forwarding
• Ingress NP: to which egress port, ingress encap (if tunneling) and ingress features
• Egress NP: Adjacency, encap, and egress features
• VOQ, and back-pressure signaling
• Each FIA has a VQI per each egress port of 10 Gbps or higher
• 3 priorities (VoQ) per VQI (imposed by ingress QoS)
• Back pressure is signaled backwards from egress NP to ingress FIA for buffering
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 284
Unicast Two Stage Forwarding
By ingress NP and egress NP
First stage: lookup on ingress NPU → Second stage: lookup on egress NPU →
Egress NPU (or SFP: switch fabric port) Egress port and rewrite information
Switch Fabric
SFP
ASIC
Switch optics
Lightspeed optics
optics
Fabric optics
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 285
The NP FIB
From RP control plane to data plane NP
BGP OSPF
LDP RSVP-TE
Static
ISIS EIGRP
ARP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 286
The NP FIB
RIB info: example
BGP OSPF
LDP RSVP-TE
Static
ISIS EIGRP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 287
The NP FIB
Line card adjacency
BGP OSPF
LDP RSVP-TE
Static
ISIS EIGRP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 288
The NP FIB
Line card adjacency
BGP OSPF
LDP RSVP-TE
Static
ISIS EIGRP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 289
The NP FIB
FIB entry in NP: example
RP/0/RSP0/CPU0:asr#show cef ipv6 2001:db8:1:c06:: hardware ingress
loc 0/0/CPU0 BGP OSPF
LDP RSVP-TE
. Static
via fe80::12f3:11ff:fe2e:553c/128, GigabitEthernet0/0/0/19, 5 ISIS EIGRP
dependencies, weight 0, class 0 [flags 0x0]
.
next hop fe80::12f3:11ff:fe2e:553c/128
. LSD RIB RSP CPU
TX H/W Result for NP:0 (index: 0x684c (BE)):
.
uidb_index : 0x1600 (LE)
l3_mtu : 4470
adj_stats_index : 0x100661
dest_mac : 0x10f3.112e.553c
.
RX H/W Result on NP:0
ARP[Adj ptr:0x18 (BE)]:
.
rx_drop: 0 SW FIB FIB Adjacency
FLAGS AIB
gre_adj: 0 pwhe_adj: 0 LC NPU
gre_ipv6_transp: 0
sfp/vqi : 0x5c LC CPU AIB: Adjacency Information Base
egress np port : 0x1d00 RIB: Routing Information Base
if_handle : 0x4000580 FIB: Forwarding Information Base
LSD: Label Switch Database
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 290
L3 Unicast Packet Journey
Mapping the port to NP and FIA
NP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 291
L3 Unicast Packet Journey
The egress interface identifier NP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 292
L3 Unicast Packet Journey
Ingress NP FIB
RP/0/RSP0/CPU0:rasr9k-1y#show cef ipv4 192.6.1.2 RX H/W Result on NP:1 [Adj ptr:0x3a (BE)]:
hardware ingress location 0/0/CPU0
Fri Feb 22 17:40:35.887 UTC Raw Data0: 0x91000000 00000136 0c001340 00000000
192.6.1.0/24, version 364, attached, connected, adj_resolve_control_byte0
internal 0xc0000c1 (ptr 0x8856b534) [1], 0x0 match: 1
(0x873dde50), 0x0 (0x0) valid: 1
Updated Feb 22 16:09:42.862 iptunl_adj: 0
remote adjacency to TenGigE0/4/0/20.6 remote_rack: 0
Prefix Len 24, traffic index 0, precedence
routine (0), priority 0 adj_resolve_control_byte1
via TenGigE0/4/0/20.6, 2 dependencies, weight adj_down: 0
0, class 0 [flags 0x8] mgscp_en: 0
path-idx 0 [0x8a60a7bc 0x0] rx_lag_hash_en: 0
remote adjacency rx_lag_adj: 0
LEAF - HAL pd context :
sub-type : IPV4, ecd_marked:0, adj_resolve_control_byte2
has_collapsed_ldi:0, collapse_bwalk_required:0, rx_lag_adj: 0
ecdv2_marked:0 rx_adj_null0: 0
Leaf H/W Result: rp_destined: 0
rx_punt: 0
Physical Result: 0x11dd0600 (LE) rx_drop: 0
sfp/vqi : 0x136
Raw Data0: 0x91ad1000 00000001 360c0013 if_handle : 0xc001340
40000000 .
Raw Data1: 0x00000000 00000136 00180000
00000000
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 293
L3 Unicast Packet Journey
Egress NP FIB
RP/0/RSP0/CPU0:rasr9k-1y#show cef ipv4 192.6.1.2 TX H/W Result for NP:6 (index: 0x38a (BE)):
hardware egress location 0/4/CPU0 Raw Data0: 0x91080000 1d000000 dc050000 400b5f00
Fri Feb 22 17:55:28.494 UTC Raw Data1: 0x0000c006 01020000 00000000 00000000
192.6.1.2/32, version 0, internal 0x4080001 (ptr adj_resolve_control_byte0
0x8efc2704) [1], 0x0 (0x8e0f2210), 0x0 (0x0) reserved: 0
Updated Feb 22 16:13:35.351 egr_uidb_internal: 1
local adjacency 192.6.1.2 match: 1
Prefix Len 32, traffic index 0, Adjacency- valid: 1
prefix, precedence routine (0), priority 0 iptunl_adj: 0
via 192.6.1.2, TenGigE0/4/0/20.6, 3 adj_resolve_control_byte1
dependencies, weight 0, class 0 [flags 0x0] tx_adj_null0: 0
path-idx 0 [0x91a2cef8 0x0] tx_punt: 0 tx_drop: 0
next hop 192.6.1.2 default_action: 1
local adjacency spare: 0
LEAF - HAL pd context : adj_resolve_control_byte2
sub-type : IPV4, ecd_marked:0, spare: 0
has_collapsed_ldi:0, collapse_bwalk_required:0, spare_cb: 0
ecdv2_marked:0 flags
Leaf H/W Result: gre_adj : 0
uidb_index : 0x1d00 (LE)
Physical Result: 0x11e80300 (LE) reserve_pad_word: 0
l3_mtu : 1500
Raw Data0: 0x91ad1000 8a030001 360c0013 reserve_pad_1 : 0
40400000 adj_stats_index : 0x400b5f00
. dest_mac : 0x0000.c006.0102
ether reserved : 0000000000000000
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 294
L3 Unicast Packet Journey
GRE encap case
RP/0/RSP0/CPU0:rasr9k-1y#show cef vrf DEF ipv4 TX H/W Result for NP:6 (index: 0x28a (BE)):
172.25.25.2 hardware ingress location 0/4/CPU0 .
Sat Feb 23 14:35:00.017 UTC adj_resolve_control_byte0
172.25.25.0/24, version 1, attached, connected, reserved: 0
internal 0xc0000c1 (ptr 0x8e154de4) [1], 0x0 egr_uidb_internal: 1
(0x8e0ec7c0), 0x0 (0x0) match: 1
Updated Feb 21 16:28:04.573 valid: 1
local adjacency point2point iptunl_adj: 1
Prefix Len 24, traffic index 0, precedence .
routine (0), priority 0 flags
via tunnel-ip25, 3 dependencies, weight 0, gre_adj : 1
class 0 [flags 0x8] uidb_index : 0x1b00 (LE)
path-idx 0 [0x90fdd3b4 0x0] reserve_pad_word: 0
local adjacency l3_mtu : 1476
LEAF - HAL pd context : reserve_pad_1 : 0
sub-type : IPV4, ecd_marked:0, adj_stats_index : 0x18005f00
has_collapsed_ldi:0, collapse_bwalk_required:0, GRE Adj
ecdv2_marked:0 ip_src : 172.20.20.1 ip_dst : 172.20.20.2
Leaf H/W Result: tos : 0 ttl : 0xff
df : 1 tos_reflect : 1
Physical Result: 0x11be0200 (LE) rsvd flag bits: 0 encap_checksum: 0x40a3
vrf_id : 0 reserved : 0
Raw Data0: 0x11a50000 c9020000 00000000 00000000
.
Raw Data1: 0x00000000 00000000 00180000 0000a2ff
leaf_resolve_control_byte0
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 295
L3 Unicast Packet Journey
GRE encap case: GRE adjacency
RP/0/RSP0/CPU0:rasr9k-1y#show cef vrf DEF TX H/W Result for NP:6 (index: 0x28a (BE)):
adjacency tunnel-ip 25 hardware ingress location .
0/4/CPU0 adj_resolve_control_byte0
Sat Feb 23 14:44:52.239 UTC reserved: 0 egr_uidb_internal:
1
Display protocol is ipv4 match: 1 valid:
Interface Address 1
Type Refcount iptunl_adj: 1
.
ti25 Prefix: 0.0.0.0/32 flags
local 3 gre_adj : 1
Adjacency: PT:0x8aa0c0c8 0.0.0.0/32
Interface: ti25 uidb_index : 0x1b00 (LE)
GRE header: reserve_pad_word: 0
l3_mtu : 1476
0000004500400000a2fb2fff011414ac021414ac00080000 reserve_pad_1 : 0
GRE tunnel adjacency adj_stats_index : 0x18005f00
GRE tunnel info: 0x91b3b050 (0x1 3),
tos-propagate is set GRE Adj
Interface Type: 0x25, Base Flags: ip_src : 172.20.20.1 ip_dst : 172.20.20.2
0x2001 (0x90fdd3b4) tos : 0 ttl : 0xff
Nhinfo PT: 0x90fdd3b4, Idb PT: df : 1 tos_reflect : 1
0x8d8f8898, If Handle: 0x8000120 rsvd flag bits : 0 encap_checksum :
Dependent adj type: remote 0x40a3
vrf_id : 0 reserved: 0
(0x90fdd460)
Dependent adj intf: ti25
Ancestor If Handle: 0x0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 296
L3 Unicast Packet Journey
IP to MPLS-TE case
RP/0/RSP0/CPU0:rasr9k-1y#show cef ipv4 172.29.2.1 RX H/W Result for 1st NP:0 (index: 0x38 (BE)):
hardware ingress location 0/4/CPU0
Sat Feb 23 15:22:57.224 UTC Raw Data0: 0x91000000 0000005c 00000640
172.29.2.0/24, version 259, internal 0x4004001 00000000
(ptr 0x8efba154) [1], 0x0 (0x8e0ece00), 0x440 adj_resolve_control_byte0
(0x90dca470) match: 1
Updated Feb 22 11:03:15.593 valid: 1
Prefix Len 24, traffic index 0, precedence iptunl_adj: 0
routine (0), priority 3 remote_rack: 0
via 192.168.20.242, tunnel-te200, 5
dependencies, weight 0, class 0 [flags 0x0] adj_resolve_control_byte1
adj_down: 0
TE-NH H/W Result for 1st NP:0 (index: 0x3 (BE)): mgscp_en: 0
. rx_lag_hash_en: 0
tunnel_over_tunnel: 0 rx_lag_adj: 0
spare: 0
. adj_resolve_control_byte2
TE_local_label: rx_lag_adj: 0
label: 16012 rx_adj_null0: 0
exp: 0 rp_destined: 0
eos: 1 rx_punt: 0
TE_tunnel_label: rx_drop: 0
label: 0 sfp/vqi : 0x5c
exp: 0 if_handle : 0x640
eos: 1
te_nh_stats_ptr: 0x880a5f .
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 297
L3 Multicast Packet
Replication
Multicast Transit Frame Path
Replication stages: per LC, per FIA, per NP, per interface
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 299
Multicast Transit Frame Path
Lookups and replications
• Two MFIB lookups
• Ingress NP tags frame with FGID and MGID, and ingress feature processing
• FGID [Fabric Group ID]: to which LC’s
• MGID [Multicast Group ID]: Entry index to egress NP’s
• Ingress replication
• Only in case of routing mcast packets out of a bridge domain via BVI.
• Original frame is forwarded at L2, at least one copy at L3 (depends on number of egress BVIs and xconnect distribution)
• Egress replication
• 1st replication is at central switch fabric. Replicates to 1 copy per egress line card [FGID]
• 2nd replication at each egress LC switch fabric. Replicates to 1 copy per egress FIA [MGID]
• 3rd replication at each egress FIA. Replicates to 1 copy per egress NP [MGID]
• 4th replication at each egress NP. Replicates to 1 copy for each egress interface [MFIB]
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 300
Multicast Fabric Group ID
FGID = destination card
Slot Slot Mask Slot Slot Mask
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 301
L3 Multicast Packet Journey
Reading the mRIB
RP/0/RSP0/CPU0:rasr9k-1y#show mrib route 232.1.1.1 172.30.1.1 detail
Tue Feb 26 17:15:05.039 UTC
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 302
L3 Multicast Packet Journey
Reading the NP mFIB NP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 303
L3 Multicast Packet Journey NP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 304
L3 Multicast Packet Journey
Reading the hardware counters
RP/0/RSP0/CPU0:rasr9000-2w-a#show mfib vrf TRAFFIC hardware route statistics 232.1.1.100
192.5.1.100 location 0/1/CPU0
Thu Jan 9 22:09:04.997 EST
LC Type: Typhoon A9K-MOD80-SE
--------------------------------------------------------------------------
Legend:
N: NP ID R: Received
F: Forwarded P: Punted to CPU
ID: Ingress Drop ED: Egress Drop
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 305
L2 Frame Forwarding
& Flooding
L2 Frame Journey
L2 frame forwarding/flooding
RP/0/RSP0/CPU0:rasr9k-1y#show l2vpn forwarding Bridge Domain: 0 NP 0
bridge-domain BRIDGES:DOMAIN-A hardware ingress Flags: Virtual Table, Multicast Flooding, Learn
detail location 0/4/CPU0 Enable, No Learn, Learn Drop
Sun Feb 24 13:53:34.530 UTC Num Members: 0, Learn Key: 0x00, Half Age: 5
Bridge-domain name: BRIDGES:DOMAIN-A, id: 0, fgid shg0: 0x0001, fgid shg1: 0x0041, fgid
state: up shg2: 0x0041
MAC learning: enabled PBB Core BD: 0, ISID: 0
MAC port down flush: enabled Bridge Domain: 0 NP 1
Flooding: Flags: Virtual Table, Multicast Flooding, Learn
Broadcast & Multicast: enabled Enable, No Learn, Learn Drop
Unknown unicast: enabled Num Members: 0, Learn Key: 0x00, Half Age: 5
MAC aging time: 300 s, Type: inactivity fgid shg0: 0x0001, fgid shg1: 0x0041, fgid
MAC limit: 2000, Action: limit, no flood, shg2: 0x0041
Notification: syslog, trap PBB Core BD: 0, ISID: 0
MAC limit reached: no .
MAC Secure: enabled, Logging: enabled, Action: none Bridge Domain: 0 NP 6
DHCPv4 snooping: profile not known on this node Flags: Virtual Table, Multicast Flooding, Learn
Dynamic ARP Inspection: enabled, Logging: enabled
Dynamic ARP Inspection Address Validation:
Enable, No Learn, Learn Drop
IPv4 verification: enabled Num Members: 1, Learn Key: 0x00, Half Age: 5
Source MAC verification: enabled fgid shg0: 0x0001, fgid shg1: 0x0041, fgid
Destination MAC verification: enabled shg2: 0x0041
IP Source Guard: disabled, Logging: disabled PBB Core BD: 0, ISID: 0
IGMP snooping: disabled, flooding: enabled Bridge Port 0
Bridge MTU: 1500 bytes XID: 0x09b00001, Active
Number of bridge ports: 4 virtual
Number of MAC addresses: 2002 XID: 0x09b00001, Active
. .
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 307
L2 Frame Journey
L2 frame forwarding/flooding
! CONTINUED NP6
TenGigE0/4/0/20.101, state: oper up Ingress uIDB:
Number of MAC: 0 Flags: DAI, DAI Notification, Dest MAC validation,
Statistics: IP Addr Validation,
packets: received 36731752, sent 14772099 L2PT, L2, Source MAC validation, Status, Ext
bytes: received 2203905120, sent 886325940 Required, VLAN Ops,
Storm control drop counters: VPLS
packets: broadcast 0, multicast 0, unknown Stats Ptr: 0x000000, uIDB index: 0x001c, Wire Exp
unicast 2961034169 Tag: 1
bytes: broadcast 0, multicast 0, unknown unicast BVI Bridge Domain: 0, BVI Source XID: 0x00000000
177662050140 VLAN1: 0, VLAN1 etype: 0x0000, VLAN2: 0, VLAN2
Dynamic arp inspection drop counters: etype: 0x0000
packets: 0, bytes: 0 L2 ACL Format: 0, L2 ACL ID: 0, IPV4 ACL ID: 0,
IP source guard drop counters: IPV6 ACL ID: 0
packets: 0, bytes: 0
QOS ID: 0, QOS Format ID: 0
Platform Bridge Port context:
Ingress State: Bound Local Switch dest XID: 0x09b00001
Flags: DAI, DAI-ipv4, DAI-src-MAC, DAI-dst-MAC, DAI-log, UIDB IF Handle: 0x0c000042, Source Port: 0, Num
MAC-SEC, MAC-SEC-log, VLANs: 0
MAC-learn-disabled Xconnect ID: 0x09b00001, NP: 6
MAC Security Actions: Drop, No Notify Type: AC
Platform AC context: Flags: Learn enable, Type 5, Learn limit no learn,
Ingress AC: VPLS, State: Bound Learn limit drop,
Flags: Learn Limit - No Learn, Learn Limit - Drop, Storm
Broadcast storm control, Multicast storm
Control BCast,
Storm Control MCast, Storm Control UCast, Port control, Unknown unicast storm control,
Level MAC Limit VPLS
XID: 0x09b00001, SHG: None uIDB Index: 0x001c
Ingress uIDB: 0x001c, Egress uIDB: 0x001c, NP: 6, Bridge Domain ID: 0, Stats Pointer: 0xf78122
Port Learn Key: 0 Storm Control enabled for: Broadcast, Multicast,
. Unknown Unicast, Pointer: 0x00001801
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 308
L2 MAC
MAC learning and synchronization
RP/0/RSP0/CPU0:rasr9k-1y#show l2vpn forwarding bridge-domain BRIDGES:DOMAIN-A mac-address
hardware ingress location 0/4/CPU0
Fri Feb 22 18:50:08.433 UTC
To Resynchronize MAC table from the Network Processors, use the command...
l2vpn resynchronize forwarding mac-address-table location <r/s/i>
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 309
ASR 9000 Satellite
to/from Host
ASR 9000v “Satellite”
Traffic flow
MAC-DA MAC-SA VLANs (OPT) Payload
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 311
ASR 9000v “Satellite”
Queueing: Satellite to host Normal MQC QoS at
“nv” Ethernet ingress
ASR 9000v
▪ Implicit classification
▪ P1 and P2 are strict priority
▪ User data priority:normal 100:1 bandwidth
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 312
ASR 9000v “Satellite”
Queueing: Host to satellite Priority propagation
“nv” Ethernet …
…
“nv” Ethernet
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 313
Under the Hood: Inside
NP, FIA, and Fabric
Frame Path: Stats & Drops
Reading the physical counters NP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 315
NP Feature Processing
Order of processing by ingress and egress NP’s
Ingress NP
I/F Security ACL QOS
classification classification
Fwd lookup *IFIB lookup
classification
Egress NP
Security ACL QOS Security ACL
classification classification L2 rewrite Fwd lookup
action
QoS+ policer
action
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 316
Inside NP
Processing pipelines
TM
Parse Search Resolve Modify Queueing
Scheduling
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 317
Inside NP TM
499 RSV_ING_L2_SMAC_MISS 60 0
502 RSV_ING_L2_LEARN 60 0
541 RSV_REFRESH_FROM_NOTIFY_CNT 62 0
584 RSV_L2BC_BVI 2 0
604 RESOLVE_REMOTE_RACK_PREP_CNT 5539915 8
.
708 LRN_PERIODIC_AGING_DELETE_ENTRY 60 0
.
848 PUNT_ADJ 2 0
852 PUNT_ACL_DENY 161 0
900 PUNT_STATISTICS 5083356 7
902 PUNT_DIAGS_RSP_ACT 11419 0
904 PUNT_DIAGS_RSP_STBY 11427 0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 318
NP Counters and Rates TM
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 319
NP Counters and Rates TM
.
370
373
PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_3
DBG_RSV_EP_L_RSV_ING_L3_IFIB
106211474043
3707021673
883922
0 NP catching up
830 PUNT_NO_MATCH 4746 0
831 PUNT_NO_MATCH_EXCD 464963896 0
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 320
NP Counters and Rates TM
Node: 0/0/CPU0:
----------------------------------------------------------------
RP/0/RSP0/CPU0:rasr9000-2w-b#
RP/0/RSP0/CPU0:rasr9000-2w-b#
RP/0/RSP0/CPU0:rasr9000-2w-b#show controllers NP tm counters np1 location 0/0/CPU0
Tue Dec 10 14:40:49.816 EST
Node: 0/0/CPU0:
----------------------------------------------------------------
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 321
FIA Counters 3x10GE
SFP +
3x 10G
NP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 322
Agenda
✓ System Architecture: System anatomy & health
✓ Operating System & Configuration: IOS-XR & configuration models
✓ Control, Management, Security: Processing of control & exceptions
✓ Transit Packet/Frame Journey: Life of L3/L2 unicast/multicast
➢ MPLS Operation: Processing, forwarding & L3/L2 service operation
➢ Troubleshooting: Diagnostics, counters, drops, and packet capture
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 323
5 MPLS
Operation
MPLS in the Data
Plane
Main MPLS Label Usage:
• Forwarding Label • Service Label
• The destination for this label is … • How to handle this payload [IP,
[FEC]. Usually, a host address of L3VPN VRF, L2VPN, PW, CEoP,
label edge router (LER) control]
• A path to a label destination is a • Significant to edge nodes. The
label switched path (LSP) forwarding nodes along the path
• Intermediate nodes may not know
may not know what it means
much about payload or the basis
for its forwarding
• Ultimate destination may not need
the label [PHP] --- Penultimate
hop popping
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 326
Forwarding
➢ Without label
RP/0/RSP0/CPU0:rasr9000-2w-a#show cef ipv4 10.101.188.1
.
remote adjacency to GigabitEthernet0/1/0/1
Prefix Len 32, traffic index 0, precedence routine (0), priority 1
via 10.100.11.1, GigabitEthernet0/1/0/1, 4 dependencies, weight 0, class 0 [flags
0x0]
path-idx 0 [0x721f30e0 0x0] IP nexthop
next hop 10.100.11.1
remote adjacency
➢ With label
RP/0/RSP0/CPU0:rasr9000-2w-a#show cef ipv4 10.101.188.1
.
remote adjacency to GigabitEthernet0/1/0/1
Prefix Len 32, traffic index 0, precedence routine (0), priority 1
via 10.100.11.1, GigabitEthernet0/1/0/1, 20 dependencies, weight 0, class 0 [flags
0x0]
path-idx 0 [0x723990b4 0x0]
next hop 10.100.11.1 MPLS in MPLS out
remote adjacency
local label 111012 labels imposed {101000}
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 327
Label Operations
RP/0/0/CPU0:P101#show cef ipv4 10.101.188.1/32
.
Prefix Len 32, traffic index 0, precedence n/a, priority 1
via 10.100.108.1, tunnel-te181, 3 dependencies, weight 0, class 0 [flags 0x0]
path-idx 0 [0xacc9d674 0x0]
next hop 10.100.108.1
local adjacency
local label 101000 labels imposed {108000} Label Push
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 328
Aggregate Label
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 329
Aggregate Label vs. Non-Aggregate
RP/0/RSP0/CPU0:rasr9000-2w-a#show mpls forwarding vrf CUST-A detail
Mon Jun 17 21:31:10.474 EDT
Local Outgoing Prefix Outgoing Next Hop Bytes
Label Label or ID Interface Switched
------ ----------- ------------------ ------------ --------------- ------------
111015 Aggregate CUST-A: Per-VRF Aggr[V] \
CUST-A 8240
Updated Jun 17 20:03:20.046
Path Flags: 0x10 [ ] Pop & lookup
MAC/Encaps: 0/0, MTU: 0
Label Stack (Top -> Bottom): { }
Packets Switched: 65
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 330
Aggregate Label: Example
RP/0/RSP0/CPU0:rasr9000-2w-a#show route vrf CUST-A ipv4 connected
Mon Jun 17 21:34:49.647 EDT
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 331
Non-Aggregate Label: Example
RP/0/RSP0/CPU0:rasr9000-2w-a#show route vrf CUST-A ipv4 static
Mon Jun 17 21:34:57.549 EDT
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 332
Forwarding Labels
MPLS Datapath Forwarding Characteristics
• Data-plane level operations:
• Push (one or more labels)
• Service label: 1
• L2VPN FAT label: 1
• LDP: 1
• RSVP: 1
• FRR: on ASR9k max +1 (if more, TI-LFA creates a backup tunnel)
• SRTE: on ASR9k max 10
• Pop (one or more)
• Swap
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 334
LDP: Label Distribution Protocol
• Binds and advertises • Multicast hellos for • Hop by hop. No
labels for all IGP prefixes neighbor discovery. TCP guarantee for end to end
[Cisco default] 646 for session. LSP.
Label Imposition (Push) Label Swap Label Swap Label Disposition (Pop)
31 31 55 55 0 0
To 10.1.1.1 10.1.1.1/32
Use 31 P Use 55 P Use 0
CE PE PE CE
Use 55
Use 31
Use 90
CE Use 77 Use 60 CE
PE P P PE
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 335
LDP: Control Plane: Neighbor Sessions
RP/0/0/CPU0:P101#show mpls ldp neighbor
Thu Jun 6 10:41:01.283 EDT
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 336
LDP: Control Plane: Label Binding
RP/0/0/CPU0:P101#show mpls ldp bindings 10.101.125.1/32, rev 118
. Local binding: label: 101040
10.101.111.1/32, rev 161 Remote bindings: (2 peers)
Local binding: label: 101005 Peer Label
Remote bindings: (1 peers) ----------------- --------
Peer Label 10.100.108.1:0 108032
----------------- -------- 10.101.111.1:0 111008
10.100.108.1:0 108009 10.101.135.1/32, rev 119
10.101.112.1/32, rev 116 Local binding: label: 101042
Local binding: label: 101041 Remote bindings: (2 peers)
Remote bindings: (2 peers) Peer Label
Peer Label ----------------- --------
----------------- -------- 10.100.108.1:0 108033
10.100.108.1:0 108038 10.101.111.1:0 111009
10.101.111.1:0 111006 10.101.137.1/32, rev 120
10.101.124.1/32, rev 117 Local binding: label: 101043
Local binding: label: 101039 Use the one Remote bindings: (2 peers)
Remote bindings: (2 peers) matching IGP Peer Label
Peer Label ----------------- --------
----------------- -------- route, if any 10.100.108.1:0 108034
10.100.108.1:0 108031 10.101.111.1:0 111010
10.101.111.1:0 111007 .
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 337
LDP: Forwarding: FIB and LFIB
RP/0/RSP0/CPU0:rasr9000-2w-b#show cef ipv4 10.101.111.1/32 IPv4 in
Wed Mar 19 12:25:01.496 EDT
10.101.111.1/32, version 272, internal 0x4004001 0x0 (ptr 0x7238643c) [1], 0x0 (0x71635290),
0x450 (0x71e26460)
Updated Mar 19 12:23:44.913
remote adjacency to GigabitEthernet0/1/0/1
Prefix Len 32, traffic index 0, precedence n/a, priority 3
via 10.100.188.8, GigabitEthernet0/1/0/1, 20 dependencies, weight 0, class 0 [flags 0x0]
path-idx 0 NHID 0x0 [0x719ea954 0x0]
next hop 10.100.188.8
remote adjacency
local label 188017 labels imposed {108002}
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 338
LDP: Forwarding: In the Forwarding Plane
RP/0/RSP0/CPU0:rasr9000-2w-b#show cef ipv4 RP/0/RSP0/CPU0:rasr9000-2w-b#show mpls forwarding labels
10.101.111.1/32 hardware ingress location 0/1/CPU0 188017 hardware ingress location 0/1/CPU0
. Wed Mar 19 13:01:00.202 EDT
local adjacency 10.100.188.8 Local Outgoing Prefix Outgoing Next Hop Bytes
Prefix Len 32, traffic index 0, precedence n/a, Label Label or ID Interface Switched
priority 3 ------ ------ --------------- ------------ ------------
via 10.100.188.8, GigabitEthernet0/1/0/1, 21 188017 108002 10.101.111.1/32 Gi0/1/0/1 10.100.188.8 N/A
dependencies, weight 0, class 0 [flags 0x0] .
path-idx 0 NHID 0x5 [0x8b15d134 0x0] NR-LDI H/W Result for path 0 [index: 0x34c7 (BE),
next hop 10.100.188.8 common to all NPs]:
local adjacency .
local label 188017 labels imposed {108002} output_label: 108002
.
label_msb: 0x1a5e
NR-LDI H/W Result for path 0 [index: 0x34c7 (BE),
label_lsb: 0x2
common to all NPs]:
. exp: 0x0
output_label: 108002 eos: 0x1
label_msb: 0x1a5e label_lsb: 0x2 .
exp: 0x0 eos: 0x1 RX H/W Result for 1st NP:0 (index: 0x3b (BE)):
.
.
RX H/W Result for 1st NP:0 (index: 0x3b (BE)): if_handle : 0x3e0
.
if_handle : 0x3e0 .
. TX H/W Result for NP:0 (index: 0x33d3 (BE)):
TX H/W Result for NP:0 (index: 0x33d3 (BE)): .
.
uidb_index : 0x900 (LE) uidb_index : 0x900 (LE)
l3_mtu : 1386 l3_mtu : 1386
adj_stats_index : 0x381f61 adj_stats_index : 0x381f61
dest_mac : 0x000c.29f4.90c6 dest_mac : 0x000c.29f4.90c6
. ether reserved : 0000000000000000
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 339
Segment Routing Path Control & TiLFA
R1
MPLS packet header as an ordered list of segments
❖ The rest of the network nodes executes the
encoded instructions
16001
16006 R8
16007
• SR-TE Policy Path Control
R2 16003 16008 ❖ Policy label stack with Node-SID, or Adj-SID
24001
❖ Each Policy assigned unique Binding-SID
16002
❖ ECMP paths load-balance by IGP Nature
16004 16005
• Topology Independent LFA
❖ Automated 1:N path protection
Primary LSP ❖ Local reroute comparable to MPLS TE Link /
Node, but no RSVP or LDP
Backup Segment ❖ IGP algorithm, support microloop avoidance
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 340
Segment Routing: Control Plane: LFIB
RP/0/0/CPU0:P103#show mpls forwarding
Sat Jan 7 17:54:03.427 UTC
Local Outgoing Prefix Outgoing Next Hop Bytes
Label Label or ID Interface Switched
------ ----------- ------------------ ------------ --------------- ------------
15101 Pop SRLB (idx 101) Gi0/0/0/0 100.1.1.2 0
15102 Pop SRLB (idx 102) Gi0/0/0/1 100.1.1.6 0
16002 Pop SR Pfx (idx 2) Gi0/0/0/0 100.1.1.2 0
16002 SR Pfx (idx 2) Gi0/0/0/1 100.1.1.6 0 (!)
16003 Pop SR Pfx (idx 3) Gi0/0/0/1 100.1.1.6 0
16003 SR Pfx (idx 3) Gi0/0/0/0 100.1.1.2 0 (!)
16004 16004 SR Pfx (idx 4) Gi0/0/0/0 100.1.1.2 0
16004 SR Pfx (idx 4) Gi0/0/0/1 100.1.1.6 0 (!)
16005 16005 SR Pfx (idx 5) Gi0/0/0/1 100.1.1.6 0
16005 SR Pfx (idx 5) Gi0/0/0/0 100.1.1.2 0 (!)
16006 16006 SR Pfx (idx 6) Gi0/0/0/0 100.1.1.2 0
16006 SR Pfx (idx 6) Gi0/0/0/1 100.1.1.6 0
24000 Pop SR Adj (idx 0) Gi0/0/0/1 100.1.1.6 0 backup path
24001 Pop SR Adj (idx 0) Gi0/0/0/1 100.1.1.6 0
SR Prefix or
Adjacency labels
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 341
Segment Routing: Forwarding: FIB and LFIB
RP/0/0/CPU0:P103#show cef ipv4 1.1.1.5/32 IPv4 in
Sat Jan 7 18:02:21.983 UTC
1.1.1.5/32, version 66, labeled SR, internal 0x1000001 0x81 (ptr 0xa14164b8) [1], 0x0 (0xa13f88c8), 0xa28 (0xa19ce148)
Updated Jan 7 17:28:03.074
local adjacency 100.1.1.6
Prefix Len 32, traffic index 0, precedence n/a, priority 1
via 100.1.1.2/32, GigabitEthernet0/0/0/0, 11 dependencies, weight 0, class 0, backup (Local-LFA) [flags 0x300]
path-idx 0 NHID 0x0 [0xa18b8588 0x0]
next hop 100.1.1.2/32
local adjacency
local label 16005 labels imposed {16005}
via 100.1.1.6/32, GigabitEthernet0/0/0/1, 11 dependencies, weight 0, class 0, protected [flags 0x400]
path-idx 1 bkup-idx 0 NHID 0x0 [0xa1998690 0x0]
next hop 100.1.1.6/32
local label 16005 labels imposed {16005}
MPLS in
RP/0/0/CPU0: P103#show mpls forwarding labels 16005 detail
Local Outgoing Prefix Outgoing Next Hop Bytes
Label Label or ID Interface Switched
------ ----------- ------------------ ------------ --------------- ------------
16005 16005 SR Pfx (idx 5) Gi0/0/0/1 100.1.1.6 0
Updated: Jan 7 17:25:26.824
Path Flags: 0x400 [ BKUP-IDX:0 (0xa1998690) ]
Version: 66, Priority: 1
Label Stack (Top -> Bottom): { 16005 }
NHID: 0x0, Encap-ID: N/A, Path idx: 1, Backup path idx: 0, Weight: 0
MAC/Encaps: 14/18, MTU: 1500
Outgoing Interface: GigabitEthernet0/0/0/1 (ifhandle 0x00000040)
Packets Switched: 0
16005 SR Pfx (idx 5) Gi0/0/0/0 100.1.1.2 0 (!)
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 342
Segment Routing: Forwarding: In the Forwarding Plane
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 343
Use Case: L2VPN Preferred-path SRTE Policy
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 344
L2VPN Prefer-Path SRTE Forwarding
R1# show segment-routing traffic-eng policy name R1# show l2vpn forwarding detail location 0/2/cpu0
srte_c_2_ep_1.1.1.4 Local interface: Bundle-Ether2.2, Xconnect id: 0x1, Status: up
Color: 2, End-point: 1.1.1.4 Segment 1
Name: srte_c_2_ep_1.1.1.4 AC, Bundle-Ether2.2, Ethernet VLAN mode, status: Bound
Status: Statistics:
Admin: up Operational: up for 02:48:30 (since Apr 1 packets: received 0, sent 0
12:22:57.663) bytes: received 0, sent 0
Candidate-paths: Segment 2
Preference: 200 (configuration) (active) MPLS, Tunnel interface: srte_c_2_ep_1.1.1.4, status: Bound,
Name: POLICY1 Active
Requested BSID: 999 Pseudowire label: 24007
PCC info: Control word disabled
Symbolic name: cfg_ POLICY1_discr_200 Backup PW
PLSP-ID: 4 MPLS, Destination address: 1.1.1.5, pw-id: 1, status: Bound
Explicit: segment-list SIDLIST1 (valid) Pseudowire label: 24008
Weight: 1, Metric Type: TE Statistics:
16002 [Prefix-SID, 1.1.1.2] packets: received 0, sent 0
24004 [Adjacency-SID, 10.23.0.1 - 10.23.0.2] bytes: received 0, sent 0
16004 [Prefix-SID, 1.1.1.4]
Preference: 100 (configuration)
Requested BSID: 999
PCC info:
Symbolic name: cfg_POLICY1_discr_100
PLSP-ID: 6
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 345
Use Case: L3VPN Dynamic SRTE Policy
• Egress PE5 populates a vrf prefix 11.11.1.0/24 requires extcommunity-set opaque color2
2
low latency service end-set
!
route-policy bgp_col
=> PE5 tags with extcommunity “color2” if destination in (11.11.1.0/24) then
set extcommunity color color2
endif
• Ingress PE2 initiates on-demand policy by color template end-policy
!
=> PE2 finds a path to PE5 with optimized metric latency router bgp 1
neighbor 1.1.1.2
remote-as 1
address-family vpnv4 unicast
router bgp 1
route-policy bgp_col out
neighbor 1.1.1.5
address-family vpnv4 unicast
vrf RED
rd 2:2
address-family ipv4 unicast T:30 BGP:
!
segment-routing
3 4 5 11.11.1.0/24, via 10
traffic-eng
on-demand color 2
dynamic
measure link delay to compute path latency metric 1 2 6 10
# show isis database R1 verbose | inc Delay type latency
Link Average Delay: 7 us !
Link Min/Max Delay: 7/7 us performance-measurement Vrf 7 8 T:15 9 Vrf
interface GigabitEthernet0/1/1/0
delay-measurement RED RED
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 346
L3VPN Work-flow and SRTE Steering
R1# show segment-routing traffic-eng policy color 2
Color: 2, End-point: 1.1.1.5 ➌ BGP: 11.11.1.0/24 via
RR
➋ BGP: 11.11.1.0/24 via
Name: srte_c_2_ep_1.1.1.5
PE5 VPN-LABEL: 24016 PE5 VPN-LABEL: 24016
Status:
Admin: up Operational: up for 00:39:14 (since Mar 31) Low-Delay (color 2) Low-Delay (color2)
Candidate-paths:
Preference: 200 (BGP ODN) (active) ➊ BGP: 11.11.1.0/24
Requested BSID: dynamic ➍ PE2 check prefix I:50
via CE10
PCC info:
Symbolic name: bgp_c_2_ep_1.1.1.5_discr_200
from PE5 with Low- 3 4 5
PLSP-ID: 2 latency (color 2) 11.11.1.0/24
Dynamic (valid)
➎ Initiate SRTE policy
Metric Type: LATENCY, Path Accumulated Metric: 10
16005 [Prefix-SID, 1.1.1.5] use template color 2
1 2 6 10
Preference: 100 (BGP ODN)
Requested BSID: dynamic ➏ Policy → SID-list D:15
PCC info: Vrf Vrf
Symbolic name: bgp_c_2_ep_1.1.1.5_discr_100
<16005> BSID 24031
RED
7 8 9 RED
PLSP-ID: 1
Dynamic
Metric Type: NONE, Path Accumulated Metric: 0 R1# show bgp vrf RED 11.11.1.0/24
Attributes: Paths: (1 available, best #1)
Binding SID: 24031 Local
Forward Class: 0 2.2.2.2 C:2 (bsid:24031) (metric 10) from 2.2.2.2 (2.2.2.2)
Steering BGP disabled: no Received Label 24016
IPv6 caps enable: yes …
#show cef vrf RED 11.11.1.0/24 Extended community: Color:2 RT:2:2
Prefix Len 24, traffic index 0, precedence n/a, priority 3 SR policy color 2, up, registered, bsid 24031, if-handle 0x02000fe0
via local-label 24031, 3 dependencies, recursive Source AFI: VPNv4 Unicast, Source VRF: RED, Source Route Distinguisher: 2:2
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 347
L3VPN Dynamic SRTE Forwarding
R1# show bgp vpnv4 unicast vrf RED 11.11.1.0/24 R1# show cef vrf RED 11.11.1.0/24 detail
BGP routing table entry for 11.11.1.0/24, Route Distinguisher: 1:1 11.11.1.0/24, version 11, internal 0x5000001 0x0 (ptr 0xa1251fa8) [1], 0x0 (0x0),
Versions: 0x208 (0xa175739c)
Process bRIB/RIB SendTblVer Updated May 31 11:30:35.697
Speaker 23 23 Prefix Len 24, traffic index 0, precedence n/a, priority 3
Local Label: 24016 gateway array (0xa1170a0c) reference count 1, flags 0x2038, source rib (7), 0
Last Modified: May 31 11:17:21.253 for 00:00:12 backups
Paths: (2 available, best #1) [1 type 1 flags 0x48441 (0xa1773898) ext 0x0 (0x0)]
Advertised to peers (in unique update groups): LW-LDI[type=0, refc=0, ptr=0x0, sh-ldi=0x0]
3.3.3.3 gateway array update type-time 1 May 31 11:30:35.697
Path #1: Received by speaker 0 LDI Update time May 31 11:30:35.697
Advertised to peers (in unique update groups): via local-label 24031, 3 dependencies, recursive [flags 0x6000]
3.3.3.3 path-idx 0 NHID 0x0 [0xa17cdbb0 0x0]
Local recursion-via-label
0.0.0.0 from 0.0.0.0 (1.1.1.1) next hop VRF - 'default', table - 0xe0000000
Origin incomplete, metric 0, localpref 100, weight 32768, valid, redistributed, best, next hop via 24031/0/21
group-best, import-candidate next hop srte_c_2_ep labels imposed {ImplNull 24016}
Received Path ID 0, Local Path ID 1, version 14
Extended community: RT:1:1
Path #2: Received by speaker 0 Load distribution: 0 (refcount 1)
Not advertised to any peer
Local Hash OK Interface Address
3.3.3.3 C:2 (bsid:24031) (metric 20) from 3.3.3.3 (3.3.3.3) 0 Y Unknown 24031/0
Received Label 24016
Origin incomplete, metric 0, localpref 100, valid, internal, import-candidate, imported
Received Path ID 0, Local Path ID 0, version 0
Extended community: Color:2 RT:1:1
SR policy color 2, up, registered, bsid 24031, if-handle 0x00000250
Source AFI: VPNv4 Unicast, Source VRF: RED, Source Route Distinguisher: 1:1
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 348
How RSVP-TE Works
Head end • Link information Distribution*
• ISIS-TE
IP/MPLS • OSPF-TE
• Path Calculation (CSPF)*
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 349
TE: RSVP
RP/0/0/CPU0:P104#show rsvp neighbors
Mon Jun 10 08:38:07.069 EDT
Global Neighbor: 10.100.102.1
Interface Neighbor Interface
-------------------- ------------
10.100.124.2 GigabitEthernet0/0/0/0.124
Global Neighbor: 10.100.103.1
Interface Neighbor Interface
-------------------- ------------
10.100.134.3 GigabitEthernet0/0/0/0.134
Global Neighbor: 10.100.105.1
Interface Neighbor Interface
-------------------- ------------
10.100.145.5 GigabitEthernet0/0/0/0.145
Global Neighbor: 10.100.106.1
Interface Neighbor Interface
-------------------- ------------
10.100.146.6 GigabitEthernet0/0/0/0.146
Global Neighbor: 10.101.124.1
Interface Neighbor Interface
-------------------- ------------
10.100.42.24 GigabitEthernet0/0/0/0.1424
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 350
TE: RSVP
RP/0/0/CPU0:P104#show rsvp interface
Mon Jun 10 08:38:12.129 EDT
*: RDM: Default I/F B/W % : 75% [default] (max resv/bc0), 0% [default] (bc1)
FRR backup
tunnels (no BW)
at headend
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 351
TE: Links
RP/0/0/CPU0:P104#show mpls traffic-eng link-management summary
Mon Jun 10 11:47:53.059 EDT
System Information::
Links Count : 5 (Maximum Links Supported 500)
Flooding System : enabled
IGP Areas Count : 1
IGP Areas
----------
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 352
TE: Topology View [At Headend]
RP/0/0/CPU0:PE135#show mpls traffic-eng topology summary
Mon Jun 10 11:50:35.198 EDT
My_System_id: 0101.0113.5001.00 (IS-IS ISIS level-2)
My_BC_Model_Type: RDM
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 353
TE: The Label Exchange
R8 R9
R3
R4
R2 Pop
R5
R1 Label 32
Label 49
Label 17 R6 R7
Label 22
Label 17 R6 R7
Label 22
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 355
TE: Control Plane View
RP/0/0/CPU0:P104#show mpls traffic-eng tunnels tabular
Mon Jun 10 14:48:32.737 EDT
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 356
TE: Control Plane View
RP/0/0/CPU0:P104#show mpls traffic-eng tunnels brief
Mon Jun 10 15:03:38.965 EDT
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 357
TE: Control Plane View: Tunnel Headend
RP/0/RSP0/CPU0:rasr9000-2w-a#show mpls traffic-eng tunnels 11106 detail
Tue Jun 11 00:04:29.172 EDT
path option 10, type dynamic (Basis for Setup, path weight 22230)
G-PID: 0x0800 (derived from egress interface properties)
Bandwidth Requested: 1000000 kbps CT0
Creation Time: Fri May 31 16:37:30 2013 (1w3d ago)
Config Parameters:
Bandwidth: 1000000 kbps (CT0) Priority: 3 3 Affinity: 0x0/0xffff
Metric Type: TE (default)
.
Current LSP Info:
Instance: 2, Signaling Area: IS-IS ISIS level-2
Uptime: 1w3d (since Fri May 31 16:37:30 EDT 2013)
Outgoing Interface: GigabitEthernet0/1/0/1, Outgoing Label: 101048
Router-IDs: local 10.101.111.1
downstream 10.100.101.1
Soft Preemption: None
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 358
TE: Control Plane View: Tunnel Midpoint
RP/0/0/CPU0:P104#show mpls traffic-eng tunnels 10152
Mon Jun 10 15:01:13.715 EDT
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 359
TE: Forwarding: Headend Forwarding Methods
• Auto-route announce [IGP]
• Forwarding adjacency [IGP]
• Policy-based (& class-based) routing
• Static routes
• Pseudo-wire tunnel selection
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 360
TE: Forwarding: Headend
RP/0/0/CPU0:PE135#show mpls forwarding tunnels
Tue Jun 11 07:44:26.151 EDT
Tunnel Outgoing Outgoing Next Hop Bytes
Name Label Interface Switched
-------- ----------- ------------ --------------- ------------
tt13501 103049 Gi0/0/0/0.1335 10.100.35.3 0
tt13502 103051 Gi0/0/0/0.1335 10.100.35.3 0
tt13503 103048 Gi0/0/0/0.1335 10.100.35.3 105560
tt13504 103047 Gi0/0/0/0.1335 10.100.35.3 2600
tt13505 103037 Gi0/0/0/0.1335 10.100.35.3 0
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 361
TE: Hardware Forwarding: Headend
RP/0/RSP0/CPU0:rasr9000-2w-b#show cef ipv4 10.101.137.1/32 hardware ingress location 0/1/CPU0
Tue Jun 11 02:36:41.139 EDT
10.101.137.1/32, version 183, internal 0x4000001 (ptr 0x885cd0d8) [1], 0x0 (0x87741040), 0x0
(0x0)
Updated Jun 11 02:19:01.772
Prefix Len 32, traffic index 0, precedence routine (0), priority 1
via 10.101.137.1, tunnel-te18804, 3 dependencies, weight 0, class 0 [flags 0x0]
path-idx 0 [0x8a77f2d8 0x0]
next hop 10.101.137.1
local adjacency
LEAF - HAL pd context :
sub-type : IPV4, ecd_marked:0, has_collapsed_ldi:0, collapse_bwalk_required:0, ecdv2_marked:0
Leaf H/W Result:
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 362
TE: Hardware Forwarding: Headend – Cont.
TE-NH H/W Result for 1st NP:0 (index: 0x5 (BE)):
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 363
TE: Hardware Forwarding: Headend – Cont.
RX H/W Result for 1st NP:0 (index: 0x16 (BE)):
adj_resolve_control_byte1
adj_down: 0 mgscp_en: 0
rx_lag_hash_en: 0
rx_lag_adj: 0
adj_resolve_control_byte2
rx_lag_adj: 0 rx_adj_null0: 0
rp_destined: 0 rx_punt: 0
rx_drop: 0
sfp/vqi : 0x88
if_handle : 0x6000200
.
RP/0/RSP0/CPU0:rasr9000-2w-b#show controllers pm location 0/1/CPU0 | begin 6000200
Tue Jun 11 05:19:29.503 EDT
Ifname(2): GigabitEthernet0_1_0_1, ifh: 0x6000200 :
. Egress interface
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 364
TE: Forwarding: Midpoint
RP/0/0/CPU0:P104#show mpls forwarding
Tue Jun 11 07:04:03.137 EDT
Local Outgoing Prefix Outgoing Next Hop Bytes
Label Label or ID Interface Switched
------ ----------- ------------------ ------------ --------------- ------------
104003 Exp-Null-v4 10254 Gi0/0/0/0.1424 10.100.42.24 0
104004 Exp-Null-v4 10357 Gi0/0/0/0.1424 10.100.42.24 0
104005 Exp-Null-v4 12450 Gi0/0/0/0.134 10.100.134.3 0
104010 106032 10352 Gi0/0/0/0.146 10.100.146.6 0
.
104028 Exp-Null-v4 10750 Gi0/0/0/0.134 10.100.134.3 0
104042 106003 181 Gi0/0/0/0.146 10.100.146.6 10747212
104044 106004 12410 Gi0/0/0/0.146 10.100.146.6 0
104046 Exp-Null-v4 10260 Gi0/0/0/0.145 10.100.145.5 0
104047 105058 10257 Gi0/0/0/0.145 10.100.145.5 0
104048 105007 10259 Gi0/0/0/0.145 10.100.145.5 0
104049 106017 11210 Gi0/0/0/0.146 10.100.146.6 0
104050 Exp-Null-v4 10153 Gi0/0/0/0.145 10.100.145.5 684820
104052 105059 10150 Gi0/0/0/0.145 10.100.145.5 1108
104054 105016 10152 Gi0/0/0/0.145 10.100.145.5 1392
104059 Exp-Null-v4 10196 Gi0/0/0/0.1424 10.100.42.24 0
104061 102021 18801 Gi0/0/0/0.124 10.100.124.2 0
104062 102044 811 Gi0/0/0/0.124 10.100.124.2 1057172746
.
Tunnel ID
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 365
TE: Hardware Forwarding: Midpoint
RP/0/0/CPU0:P104#show mpls forwarding labels 104062 hardware ingress location 0/0/CPU0
Tue Jun 11 11:31:38.647 EDT
Local Outgoing Prefix Outgoing Next Hop Bytes
Label Label or ID Interface Switched
------ ----------- ------------------ ------------ --------------- ------------
104062 102044 811 Gi0/0/0/0.124 10.100.124.2 N/A
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 366
Labels in Labels: LDP in TE
RP/0/RSP0/CPU0:rasr9000-2w-a#traceroute 10.101.178.1 source 10.101.111.1
Tue Jun 11 20:49:15.907 EDT
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 367
Labels in Labels: LDP in TE with NNHOP FRR
RP/0/RSP0/CPU0:rasr9000-2w-a#traceroute 10.101.178.1 source 10.101.111.1
.
1 10.100.11.1 [MPLS: Labels 101055/0 Exp 0] 3 msec 3 msec 3 msec
2 10.100.113.3 [MPLS: Labels 103097/0 Exp 0] 3 msec 3 msec 2 msec
3 10.100.134.4 [MPLS: Labels 104010/107068/0 Exp 0] 3 msec 2 msec 3 msec
4 10.100.146.6 [MPLS: Labels 106032/107068/0 Exp 0] 4 msec 4 msec 2 msec
5 10.100.167.7 [MPLS: Labels 0/107068/0 Exp 0] 3 msec 3 msec 3 msec
6 10.100.78.78 3 msec * 2 msec LDP in TE tunnel and
FRR active
= 3 labels
P104 P106
106032 107068
104010 107068
107068
105060 107068
PE111 101055 P101 103097 P103 P105 P107 PE178
PLR MP
(Point of Local Repair) (Merge Point)
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 368
Labels in Labels: LDP in TE at Headend
RP/0/RSP0/CPU0:PE111#show cef ipv4 10.101.178.1/32 hardware egress location 0/1/CPU0
Tue Jun 11 21:41:12.866 EDT
10.101.178.1/32, version 285, internal 0x4004001 (ptr 0x8854bcf8) [1], 0x0 (0x876e74a0), 0x450
(0x89cb6110)
Updated Jun 11 21:12:35.330
Prefix Len 32, traffic index 0, precedence routine (0), priority 1
via 10.101.178.1, tunnel-te11111, 3 dependencies, weight 0, class 0 [flags 0x0]
path-idx 0 [0x8a7a27d8 0x0]
next hop 10.101.178.1
local adjacency
local label 111011 labels imposed {0} LDP label
.
TE-NH H/W Result for 1st NP:0 (index: 0x34 (BE)):
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 369
Labels in Labels: TE NNHOP PLR
RP/0/0/CPU0:P103#show mpls forwarding labels 103097 hardware ingress detail
Tue Jun 11 12:51:07.075 EDT
Local Outgoing Prefix Outgoing Next Hop Bytes
Label Label or ID Interface Switched
------ ----------- ------------------ ------------ --------------- ------------
103097 105060 11111 Gi0/0/0/0.135 10.100.135.5 N/A
Updated Jun 11 12:17:41.262
Path Flags: 0x400 [ BKUP-IDX:1 (0xacde6f2c) ]
Version: 1598, Priority: 2
MAC/Encaps: 18/22, MTU: 4456
FRR Ready
Label Stack (Top -> Bottom): { 105052 }
Packets Switched: 0
.
RP/0/0/CPU0:P103#show mpls forwarding labels 103097 hardware ingress detail
Tue Jun 11 12:51:31.414 EDT
Local Outgoing Prefix Outgoing Next Hop Bytes FRR Active
Label Label or ID Interface Switched
------ ----------- ------------------ ------------ --------------- ------------
103097 107068 11111 tt10352 10.100.135.5 N/A
Updated Jun 11 12:51:26.135
Version: 1675, Priority: 2
MAC/Encaps: 18/26, MTU: 4456 FRR backup tunnel
Label Stack (Top -> Bottom): { 104010 107068 }
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 370
Labels in Labels: More Forwarding Labels
• Flow Label
• Flow Aware Transport Pseudo-Wire [FAT PW] for VPWS and VPLS
• http://www.cisco.com/en/US/partner/docs/routers/asr9000/software/asr9k_r4.3/lxv
pn/configuration/guide/lesc43p2mps.html#wp1339194
• Used for forwarding hashing, but it is at bottom of stack.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 371
Service Labels
The Service Exchange
• Discovery: Manual or BGP • Signaling: LDP or BGP
Native Service MPLS tunnel Native Service
2. Service Discovery
PE1 PE2
1. Setup Local
Service
Properties
MPLS / IP
3. Service Signaling
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 373
Service Attachment Points
EoMPLS PW
(H-)VPLS
Bridging
EoMPLS PW
Flexible VLAN
tag classification IRB
Flexible VLAN
tag rewrite X EoMPLS PW
Flexible IRB
Bridging
Ethertype (.1Q, X Integrated Routing and Bridging
QinQ, .1ad)
L2 or L3 sub- Flexible service mapping and multiplexing. Support all standard based
interfaces services concurrently on the same port:
(802.1a/qinq/.1ad)
2 Regular L3, L2 interface/sub-interface
Integrated L2 and L3 – IRB/BVI
Mixed L2 and L3 sub-interfaces on the same port
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 374
LDP Signaling: PW Example
RP/0/RSP0/CPU0:rasr9000-2w-a#show l2vpn xconnect detail
.
PW: neighbor 10.101.188.1, PW ID 1, state is up ( established )
PW class ONE, XC ID 0xc0000001
Encapsulation MPLS, protocol LDP
Source address 10.101.111.1
PW type Ethernet, control word enabled, interworking none
PW backup disable delay 0 sec
Sequencing not set
Load Balance Hashing: pw-label
Flow Label flags configured (Tx=1,Rx=1), negotiated (Tx=1,Rx=1)
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 375
Forwarding: AC to PW
RP/0/RSP0/CPU0:rasr9000-2w-a#show l2vpn forwarding interface g0/1/0/3.1 hardware ingress detail
location 0/1/CPU0
Mon Jun 17 23:18:54.890 EDT
Local interface: GigabitEthernet0/1/0/3.1, Xconnect id: 0xc40001, Status: up
Segment 1
AC, GigabitEthernet0/1/0/3.1, status: Bound
Statistics:
packets: received 2809, sent 2810
bytes: received 330634, sent 386882
packets dropped: PLU 0, tail 0
bytes dropped: PLU 0, tail 0
Segment 2
MPLS, Destination address: 10.101.188.1, pw-id: 1, status: Bound
Pseudowire label: 188014 Control word enabled
Load-Balance-Type: pw-label
Flow Label flag: Tx=1
Statistics:
packets: received 2810, sent 2809
bytes: received 386882, sent 330634
packets dropped: PLU 0, tail 0, out of order 0
bytes dropped: PLU 0, tail 0, out of order 0
Platform AC context:
Ingress AC: AToM, State: Bound
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 376
Forwarding: AC to PW – Cont.
RP/0/RSP0/CPU0:rasr9000-2w-a#show l2vpn forwarding interface g0/1/0/3.1 hardware ingress detail
location 0/1/CPU0
.
Platform AC context:
Ingress AC: AToM, State: Bound
Flags: Remote is PW
.
Platform PW context:
Ingress PW: AToM, State: Bound
XID: 0xc0008000, bridge: 0, MAC limit: 0, l2vpn ldi index: 0x0002, vc label: 188014,
nr_ldi_hash: 0x68, r_ldi_hash: 0xb3, lag_hash: 0xf4, SHG: None
Flags: Control Word, Flow Label imposition
NP0
Xconnect ID: 0xc0008000, NP: 0
Type: Pseudowire (with control word)
Flags: Learn enable, Type 5, Local replication, Flow Label imposition
VC label hash, nR-LDI Hash: 0x68, R-LDI Hash: 0xb6, LAG Hash: 0xf4,
VC output label: 0x2de6e (188014), LDI: 0x0002, stats ptr: 0x00000000
Split Horizon Group: None
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 377
Forwarding: PW to AC
RP/0/RSP0/CPU0:rasr9000-2w-a#show mpls forwarding labels 111014 hardware ingress detail location
0/1/CPU0
Mon Jun 17 23:58:30.490 EDT
Local Outgoing Prefix Outgoing Next Hop Bytes
Label Label or ID Interface Switched
------ ----------- ------------------ ------------ --------------- ------------
111014 Pop PW(10.101.188.1:1) Gi0/1/0/3.1 point2point N/A
Updated Jun 15 01:29:06.149
Path Flags: 0x8 [ ]
PW Flow Label: Enabled
MAC/Encaps: 0/0, MTU: 0
Label Stack (Top -> Bottom): { }
Packets Switched: 0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 378
BGP Signaling: L3 IPv4 VPN
RP/0/RSP0/CPU0:rasr9000-2w-a#show bgp vpnv4 unicast labels
Tue Jun 18 01:25:27.965 EDT
BGP router identifier 10.101.111.1, local AS number 65001
BGP generic scan interval 60 secs
BGP table state: Active
Table ID: 0x0 RD version: 348768
BGP main routing table version 40
BGP scan interval 60 secs
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 379
Forwarding: IPv4 to VPNv4
RP/0/RSP0/CPU0:rasr9000-2w-a#show cef vrf CUST-A ipv4 172.20.211.0/24 hardware ingress location
0/1/CPU0
Tue Jun 18 01:45:27.771 EDT
172.20.211.0/24, version 50, internal 0x14004001 (ptr 0x87935564) [1], 0x0 (0x0), 0x410
(0x89c84170)
Updated Jun 18 01:25:21.070
Prefix Len 24, traffic index 0, precedence routine (0), priority 3
via 10.101.188.1, 5 dependencies, recursive [flags 0x6010]
path-idx 0 [0x89d4cb84 0x0] LDP label
next hop VRF - 'default', table - 0xe0000000
next hop 10.101.188.1 via 111007/0/21
next hop 10.100.101.1/32 tt1111 labels imposed {101000 188016}
LEAF - HAL pd context :
sub-type : IPV4, ecd_marked:0, has_collapsed_ldi:0, collapse_bwalk_required:0, ecdv2_marked:0
Leaf H/W Result:
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 380
Forwarding: VPNv4 to IPv4
RP/0/RSP0/CPU0:rasr9000-2w-a#show mpls forwarding labels 111016 detail hardware ingress location
0/1/CPU0
Tue Jun 18 02:08:02.870 EDT Advertised local
Local Outgoing Prefix Outgoing Next Hop Bytes label
Label Label or ID Interface Switched
------ ----------- ------------------ ------------ --------------- ------------
111016 Unlabelled 172.20.210.0/24[V] Gi0/1/0/3.200 172.20.200.2 N/A
Updated Jun 17 21:23:42.087
Version: 47, Priority: 3
MAC/Encaps: 18/18, MTU: 1500
Label Stack (Top -> Bottom): { Unlabelled }
Packets Switched: 0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 381
Forwarding: VPNv4 Aggregate to IPv4
RP/0/RSP0/CPU0:rasr9000-2w-a#show mpls forwarding labels 111015 detail hardware ingress location
0/1/CPU0
Tue Jun 18 02:06:14.191 EDT
Local Outgoing Prefix Outgoing Next Hop Bytes
Label Label or ID Interface Switched
------ ----------- ------------------ ------------ --------------- ------------
111015 Aggregate CUST-A: Per-VRF Aggr[V] \
CUST-A N/A
Updated Jun 17 20:03:19.525
Path Flags: 0x10 [ ]
Advertised
MAC/Encaps: 0/0, MTU: 0 local label
Label Stack (Top -> Bottom): { }
Packets Switched: 0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 382
Forwarding: Load Sharing To Core Bundle
RP/0/RSP0/CPU0:rasr9000-2w-b#show cef vrf TRAFFIC ipv4 10.10.6.6 hardware ingress location 0/0/CPU0
Tue Dec 10 10:14:29.843 EST
10.10.6.0/24, version 41, internal 0x14004001 (ptr 0x8dd2b964) [1], 0x0 (0x0), 0x410 (0x90d929b0)
Updated Dec 5 08:06:31.568
Prefix Len 24, traffic index 0, precedence routine (0), priority 3
via 10.101.111.1, 7 dependencies, recursive [flags 0x6010]
path-idx 0 [0x90e5ab08 0x0]
next hop VRF - 'default', table - 0xe0000000
next hop 10.101.111.1 via 188002/0/21
next hop 0.0.0.0/32 tt180 labels imposed {ImplNull 111018}
LEAF - HAL pd context :
sub-type : IPV4, ecd_marked:0, has_collapsed_ldi:0, collapse_bwalk_required:0, ecdv2_marked:0
Leaf H/W Result:
Other fields:
leaf_ptr: 0xc4bc05(LE) bgp_next_hop: 0xa656f01
urpf_ptr: 0
NextHopPrefix:label:eos=188002:0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 383
Forwarding: Load Sharing To Core Bundle
RP/0/RSP0/CPU0:rasr9000-2w-b#show cef ipv4 10.101.111.1 hardware ingress detail location 0/0/CPU0 |
include if_handle
Tue Dec 10 11:02:58.582 EST
if_handle : 0x2d320
Bundle-Ether1
Status: Up
Local links <active/standby/configured>: 5 / 0 / 5
Local bandwidth <effective/available>: 50000000 (50000000) kbps
MAC address (source): 10f3.110b.161b (Chassis pool)
.
Port Device State Port ID B/W, kbps
-------------------- --------------- ----------- -------------- ----------
Te0/0/0/5 Local Active 0x8000, 0x0001 10000000 Link is Active
Te0/1/1/0 Local Active 0x8000, 0x0003 10000000 Link is Active
Te0/1/1/1 Local Active 0x8000, 0x0004 10000000 Link is Active
Te0/1/1/2 Local Active 0x8000, 0x0002 10000000 Link is Active
Te0/1/1/3 Local Active 0x8000, 0x0005 10000000 Link is Active
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 384
Forwarding: Load Sharing To Core Bundle
RP/0/RSP0/CPU0:rasr9000-2w-b#bundle-hash Bundle-Ether 1 location 0/0/CPU0
Tue Dec 10 11:17:15.224 EST
Calculate Bundle-Hash for L2 or L3 or sub-int based: 2/3/4 [3]:
Enter traffic type (1.IPv4-inbound, 2.MPLS-inbound, 3:IPv6-inbound): [1]:
Single SA/DA pair or range: S/R [S]:
Enter source IPv4 address [255.255.255.255]: 10.10.3.3
Enter destination IPv4 address [255.255.255.255]: 10.10.6.6
Compute destination address set for all members? [y/n]: n
Enter L4 protocol ID. (Enter 0 to skip L4 data) [0]:
Invalid protocol. L4 data skipped.
Link hashed [hash_val:3] to is TenGigE0/1/1/3 ICL () LON 4 ifh 0x6000680
Another? [y]: n
RP/0/RSP0/CPU0:rasr9000-2w-b#
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 385
Forwarding: Load Sharing To Multiple CE’s
RP/0/RSP0/CPU0:rasr9000-2w-b#show cef vrf TRAFFIC ipv4 10.10.3.3 hardware ingress location 0/1/CPU0
Tue Dec 10 12:13:20.504 EST
10.10.3.0/24, version 33, internal 0x4000001 (ptr 0x877d8564) [1], 0x0 (0x0), 0x0 (0x0)
Updated Dec 5 08:06:32.256
Prefix Len 24, traffic index 0, precedence routine (0), priority 3
via 192.2.1.2, 3 dependencies, recursive [flags 0x0]
path-idx 0 [0x877d8964 0x0]
next hop 192.2.1.2 via 192.2.1.2/32
via 192.3.1.2, 3 dependencies, recursive [flags 0x0]
path-idx 1 [0x877d8f64 0x0]
next hop 192.3.1.2 via 192.3.1.2/32
via 192.4.1.2, 3 dependencies, recursive [flags 0x0]
path-idx 2 [0x877d87e4 0x0]
next hop 192.4.1.2 via 192.4.1.2/32
.
NextHopPrefix:192.2.1.2/32
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 386
Forwarding: Load Sharing To Multiple CE’s
RP/0/RSP0/CPU0:rasr9000-2w-b#show cef vrf TRAFFIC ipv4 exact-route 10.10.6.6 10.10.3.3 hardware
ingress location 0/0/CPU0
Tue Dec 10 12:17:36.699 EST
10.10.3.0/24, version 33, internal 0x4000001 (ptr 0x8dd31064) [1], 0x0 (0x0), 0x0 (0x0)
Updated Dec 5 08:06:31.504
local adjacency 192.2.1.2
Prefix Len 24, traffic index 0, precedence routine (0), priority 3
via TenGigE0/0/0/0
via 192.2.1.2, 3 dependencies, recursive [flags 0x0]
path-idx 0 [0x8dd29564 0x0]
next hop 192.2.1.2 via 192.2.1.2/32
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 387
Use Case: EVPN Bridge-domain VPLS
On both PE1 and PE2:
Type 4 – ES route, DF election
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 388
EVPN single-active Ethernet Segment
RP/0/0/CPU0:PE1# show evpn ethernet-segment detail
Ethernet Segment Id Interface Nexthops
------------------------ ---------------------------------- --------------------
0036.3700.0000.0000.1100 Gi0/0/0/0 1.1.1.1
2.2.2.2
ES to BGP Gates : Ready
ES to L2FIB Gates : Ready
Main port :
Interface name : GigabitEthernet0/0/0/0
Interface MAC : fa16.3e3d.fe16
IfHandle : 0x00000020
State : Up
Redundancy : Not Defined
ESI type : 0 EVPN default Single-Active
Value : 36.3700.0000.0000.1100
ES Import RT : 3637.0000.0000 (from ESI) per Service (AApS)
Source MAC : 0000.0000.0000 (N/A)
Topology :
Operational : MH, Single-active
Configured : Single-active (AApS) (default)
Service Carving : Auto-selection
Peering Details :
1.1.1.1 [MOD:P:00]
2.2.2.2 [MOD:P:00] EVPN MH elected
Service Carving Results:
Forwarders : 1 forwarder
Permanent : 0
Elected : 1
Not Elected : 0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 389
EVPN Ethernet Segment Advertisement
RP/0/0/CPU0:PE1# show evpn evi vpn-id 100 detail
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 390
BGP L2VPN EVPN Flooding
RP/0/0/CPU0:PE1# show bgp l2vpn evpn
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 392
EVPN Data Plane Local Forwarding:
RP/0/0/CPU0:PE1# show evpn evi vpn-id 100 mac detail
VPN-ID Encap MAC address IP address Nexthop Label
---------- ------ -------------- --------------------------------- -------------------------------- ------
100 MPLS 1022.2211.2211 :: 4.4.4.4 24007
Ethernet Tag : 0
Multi-paths Resolved : True EVPN install MAC 1022.2211.2211
Multi-paths Internal label : 24010
from 4.4.4.4 with label 24010
RP/0/0/CPU0:PE1#sh mpls forwarding labels 24010
Local Outgoing Prefix Outgoing Next Hop Bytes
Label Label or ID Interface Switched
------ ----------- ------------------ ------------ --------------- ------------
24010 24007 EVPN:100 4.4.4.4 0
RP/0/0/CPU0:PE1#show l2vpn forwarding bridge-domain 100:100 hardware ingress detail loc 0/0/CPU0
Bridge-domain name: 100:100, id: 0, state: up
MAC learning: enabled
Software MAC learning: disabled Lots of information:
MAC port down flush: enabled All EFP’s, all VPLS’s,
Flooding:
Broadcast & Multicast: enabled all MAC’s!
Unknown unicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
MAC limit reached: no, threshold: 75%
MAC Secure: disabled, Logging: disabled
DHCPv4 snooping: profile not known on this node
Dynamic ARP Inspection: disabled, Logging: disabled
…
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 393
EVPN Data Plane Remote Forwarding:
RP/0/0/CPU0:PE1# show evpn evi vpn-id 100 mac detail
VPN-ID Encap MAC address IP address Nexthop Label
---------- ------ -------------- --------------------------------- -------------------------------- ------
100 MPLS 1022.1122.1122 :: 1.1.1.1 24008
Ethernet Tag : 0
Multi-paths Resolved : True EVPN install MAC 1022.1122.1122
Multi-paths Internal label : 24009 from 1.1.1.1 with label 24009
RP/0/0/CPU0:PE1#sh mpls forwarding labels 24009
Local Outgoing Prefix Outgoing Next Hop Bytes
Label Label or ID Interface Switched
------ ----------- ------------------ ------------ --------------- ------------ EVPN MH backup
24009 24008 EVPN:100 1.1.1.1 0
24008 EVPN:100 2.2.2.2 0 (!)
RP/0/0/CPU0:PE4#show l2vpn forwarding bridge-domain 100:100 hardware ingress detail location 0/0/CPU0
Bridge-domain name: 100:100, id: 0, state: up
MAC learning: enabled
Software MAC learning: disabled
MAC port down flush: enabled
Flooding:
Broadcast & Multicast: enabled
Unknown unicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
MAC limit reached: no, threshold: 75%
MAC Secure: disabled, Logging: disabled
DHCPv4 snooping: profile not known on this node
…
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 394
BGP Signaling: VPLS Bridge
RP/0/RSP0/CPU0:rasr9000-2w-a#show bgp l2vpn vpls
Tue Jun 18 18:59:28.339 EDT
BGP router identifier 10.101.111.1, local AS number 65001
BGP generic scan interval 60 secs
BGP table state: Active
Table ID: 0x0 RD version: 412008
BGP main routing table version 35
BGP scan interval 60 secs
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 395
Forwarding: VPLS Bridge: EFP to VFI
RP/0/RSP0/CPU0:rasr9000-2w-a#show l2vpn forwarding bridge-domain BRIDGES:BR-A hardware ingress
detail location 0/1/CPU0
Tue Jun 18 21:18:34.152 EDT
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 396
Forwarding: VPLS Bridge: EFP to VFI
RP/0/RSP0/CPU0:rasr9000-2w-a#show l2vpn forwarding bridge-domain BRIDGES:BR-A mac-address
hardware ingress detail location 0/1/CPU0
Tue Jun 18 21:10:27.472 EDT
To Resynchronize MAC table from the Network Processors, use the command...
l2vpn resynchronize forwarding mac-address-table location <r/s/i>
Dest MAC PW
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 397
Forwarding: VPLS Bridge: EFP to VFI
RP/0/RSP0/CPU0:rasr9000-2w-a#show l2vpn forwarding neighbor 10.101.188.1 300 hardware egress
detail location 0/1/CPU0
Tue Jun 18 21:21:47.126 EDT
Xconnect id: 0xc0000007, Status: up
Segment 1
MPLS, Destination address: 10.101.188.1, pw-id: 300, status: Bound
Pseudowire label: 188061 Control word disabled
Statistics:
packets: received 376162, sent 376005
bytes: received 51910302, sent 44368536 PW label
packets dropped: PLU 0, tail 0, out of order 0
bytes dropped: PLU 0, tail 0, out of order 0
Segment 2
Bridge id: 0, Split horizon group id: 1
Storm control: disabled
MAC learning: enabled
MAC port down flush: enabled
Flooding:
Broadcast & Multicast: enabled
Unknown unicast: enabled
MAC aging time: 300 s, Type: inactivity
MAC limit: 4000, Action: none, Notification: syslog
MAC limit reached: no
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 398
Forwarding: VPLS Bridge: VFI to EFP
RP/0/RSP0/CPU0:rasr9000-2w-b#show mpls forwarding
Tue Jun 18 06:37:43.199 EDT
Local Outgoing Prefix Outgoing Next Hop Bytes
Label Label or ID Interface Switched
------ ----------- ------------------ ------------ --------------- ------------
188000 Pop 10.101.112.1/32 tt18800 10.101.112.1 0
188001 Pop 10.101.124.1/32 tt18801 10.101.124.1 0
188002 Pop 10.101.125.1/32 tt18802 10.101.125.1 300
188003 Pop 10.101.135.1/32 tt18803 10.101.135.1 0
188004 Pop 10.101.137.1/32 tt18804 10.101.137.1 300
188005 Pop 10.101.178.1/32 tt18805 10.101.178.1 0
188013 108009 10.101.111.1/32 tt8881 10.100.108.1 219343578
188014 Pop PW(10.101.111.1:1) Gi0/1/0/3.1 point2point 319362
188015 Aggregate CUST-A: Per-VRF Aggr[V] \
CUST-A 49800
188016 Unlabelled 172.20.211.0/24[V] Gi0/1/0/3.200 172.20.201.2 0
188061 Pop PW(10.101.111.1:300) \
BD=0 point2point 100172000
188075 Pop PW(10.101.125.1:300) \
BD=0 point2point 0 Pop label
188097 Pop PW(10.101.137.1:300) \
BD=0 point2point 0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 399
Forwarding: VPLS Bridge: VFI to EFP
RP/0/RSP0/CPU0:rasr9000-2w-b#show l2vpn forwarding bridge-domain BRIDGES:BR-A mac-address
hardware egress location 0/1/CPU0
Tue Jun 18 06:44:04.464 EDT
To Resynchronize MAC table from the Network Processors, use the command...
l2vpn resynchronize forwarding mac-address-table location <r/s/i>
Dest MAC
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 400
Agenda
✓ System Architecture: System anatomy & health
✓ Operating System & Configuration: IOS-XR & configuration models
✓ Control, Management, Security: Processing of control & exceptions
✓ Transit Packet/Frame Journey: Life of L3/L2 unicast/multicast
✓ MPLS Operation: Processing, forwarding & L3/L2 service operation
➢ Troubleshooting: Diagnostics, counters, drops, and packet capture
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 401
6 Troubleshooting
System Diagnostics
Background Diagnostics
RSP default diagnostics
RP/0/RSP0/CPU0:rasr9000-2w-a#admin show diagnostic content location 0/RSP0/CPU0
Wed Dec 11 19:44:32.957 EST
RP 0/RSP0/CPU0:
Diagnostics test suite attributes:
M/C/* - Minimal bootup level test / Complete bootup level test / NA
B/O/* - Basic ondemand test / not Ondemand test / NA
P/V/* - Per port test / Per device test / NA
D/N/* - Disruptive test / Non-disruptive test / NA
S/* - Only applicable to standby unit / NA Every minute or
X/* - Not a health monitoring test / NA every 5 seconds
F/* - Fixed monitoring interval test / NA
E/* - Always enabled monitoring test / NA
A/I - Monitoring is active / Monitoring is inactive
Test Interval Thre-
ID Test Name Attributes (day hh:mm:ss.ms shold)
==== ================================== ============ ================= =====
1) CPUCtrlScratchRegister ----------> ***N****A 000 00:01:00.000 1 Error threshold
2) ClkCtrlScratchRegister ----------> ***N****A 000 00:01:00.000 1 (consecutive)
3) ZenJfScratchRegister ------------> ***N****A 000 00:01:00.000 1
4) FabSwitchIdRegister -------------> *B*N****A 000 00:01:00.000 1
5) SrspStandbyEobcHeartbeat --------> *B*NS***A 000 00:00:05.000 3
6) SrspActiveEobcHeartbeat ---------> *B*NS***A 000 00:00:05.000 3
7) FabricLoopback ------------------> MB*N****A 000 00:01:00.000 3
8) PuntFabricDataPath --------------> *B*N****A 000 00:01:00.000 3
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 404
Background Diagnostics
Test example: PuntFabricDataPath
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 405
Background Diagnostics
LC default diagnostics
RP/0/RSP0/CPU0:rasr9000-2w-a#admin show diagnostic content location 0/0/CPU0
Wed Dec 11 20:32:08.842 EST
A9K-24x10GE-SE 0/0/CPU0:
Diagnostics test suite attributes:
M/C/* - Minimal bootup level test / Complete bootup level test / NA
B/O/* - Basic ondemand test / not Ondemand test / NA
P/V/* - Per port test / Per device test / NA
D/N/* - Disruptive test / Non-disruptive test / NA
S/* - Only applicable to standby unit / NA
X/* - Not a health monitoring test / NA
F/* - Fixed monitoring interval test / NA
E/* - Always enabled monitoring test / NA
A/I - Monitoring is active / Monitoring is inactive
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 406
Background Diagnostics
Reading the results
RP/0/RSP0/CPU0:rasr9000-2w-a#admin show diagnostic result location 6 ) SrspActiveEobcHeartbeat ---------> .
0/RSP1/CPU0 detail
Wed Dec 11 20:35:26.998 EST Error code ------------------> 0 (DIAG_SUCCESS)
Total run count -------------> 378621
Current bootup diagnostic level for RP 0/RSP1/CPU0: minimal Last test execution time ----> Wed Dec 11 20:35:25 2013
RP 0/RSP1/CPU0: First test failure time -----> n/a
Last test failure time ------> n/a
Overall diagnostic result: PASS Last test pass time ---------> Wed Dec 11 20:35:25 2013
Diagnostic level at card bootup: minimal Total failure count ---------> 0
Test results: (. = Pass, F = Fail, U = Untested) Consecutive failure count ---> 0
________________________________________________________________________
_____________________________________________________________________
7 ) FabricLoopback ------------------> .
1 ) CPUCtrlScratchRegister ----------> .
Error code ------------------> 0 (DIAG_SUCCESS)
Error code ------------------> 0 (DIAG_SUCCESS) Total run count -------------> 31552
Total run count -------------> 31553 Last test execution time ----> Wed Dec 11 20:35:08 2013
Last test execution time ----> Wed Dec 11 20:35:08 2013 First test failure time -----> n/a
First test failure time -----> n/a Last test failure time ------> n/a
Last test failure time ------> n/a Last test pass time ---------> Wed Dec 11 20:35:08 2013
Last test pass time ---------> Wed Dec 11 20:35:08 2013 Total failure count ---------> 0
Total failure count ---------> 0 Consecutive failure count ---> 0
Consecutive failure count ---> 0
________________________________________________________________________
_____________________________________________________________________
8 ) PuntFabricDataPath --------------> .
2 ) ClkCtrlScratchRegister ----------> .
Error code ------------------> 0 (DIAG_SUCCESS)
Error code ------------------> 0 (DIAG_SUCCESS) Total run count -------------> 31552
Total run count -------------> 31553 Last test execution time ----> Wed Dec 11 20:35:08 2013
Last test execution time ----> Wed Dec 11 20:35:08 2013 First test failure time -----> n/a
First test failure time -----> n/a Last test failure time ------> n/a
Last test failure time ------> n/a Last test pass time ---------> Wed Dec 11 20:35:08 2013
Last test pass time ---------> Wed Dec 11 20:35:08 2013 Total failure count ---------> 0
Total failure count ---------> 0 Consecutive failure count ---> 0
Consecutive failure count ---> 0
. ________________________________________________________________________
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 407
Background Diagnostics
Errors and clears
RP/0/RSP0/CPU0:Feb 5 05:05:44.051 :
▪ Set: threshold pfm_node_rp[354]:%PLATFORM−DIAGS−3−PUNT_FABRIC_DATA_PATH_FAILED :
exceeded Set|online_diag_rsp[237686]|System Punt/Fabric/data Path
Test(0x2000004)|failure threshold is 3, (slot, NP)failed:
– Path to LC 2 NP 0 (0/2/CPU0, 0)
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 408
On Board Failure Logging [OBFL]
Logging errors, temperature, voltage locally on NVRAM
RP/0/RSP0/CPU0:rasr9000-2w-b#admin show logging onboard ?
all All Application
cbc CBC OBFL Commands
detail Onboard logging detail information
diagnostic Online Diagnostic Application
environment Environment Application
error Syslog Application
location locations to filter on
raw Onboard logging raw information
summary Onboard logging summary information
temperature Temperature Application
trace Debug traces for OBFL(cisco-support)
uptime Uptime Application
verbose Display internal debugging information
voltage Voltage Application
| Output Modifiers
<cr>
RP/0/RSP0/CPU0:rasr9000-2w-b#admin show logging onboard error location 0/1/CPU0 | utility tail count 15
Tue Jan 21 23:32:30.047 EST
11/15/2013 19:27:50 sev:1 0/1/CPU0 pfm_node_lc[290]: %PLATFORM-CROSSBAR-1-SERDES_ERROR_LNK0 :
Set|fab_xbar[172110]|Crossbar Switch(0x1017010)|Slot_0_XBAR_1
12/19/2013 17:28:35 sev:1 0/1/CPU0 pfm_node_lc[291]: %PLATFORM-CROSSBAR-1-SERDES_ERROR_LNK0 :
Set|fab_xbar[172110]|Crossbar Switch(0x1017010)|Slot_0_XBAR_1
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 409
EOBC Switch. (32-bit XR)
Switch links and interfaces
RP/0/RSP0/CPU0:rasr9000-2w-a#show controllers RP/0/RSP0/CPU0:rasr9000-2w-a#show controllers backplane
backplane ethernet detail location 0/RSP0/CPU0 ethernet detail location 0/0/CPU0
Wed Dec 11 21:53:1.24 EST Wed Dec 11 21:53:00.797 EST
GigabitEthernet0_RSP0_CPU0 is up GigabitEthernet0_0_CPU0 is up
Active RSP is RSP 0 Active RSP is RSP 0
Hardware is Gigabit Ethernet, H/W address is Hardware is Gigabit Ethernet, H/W address is
564b.4700.0001 564b.4700.0821
Internet address is 127.0.1.0 Internet address is 127.0.1.2
MTU 1514 bytes MTU 1514 bytes
Encapsulation ASR9KIES (ASR9K Internal Ethernet Encapsulation ASR9KIES (ASR9K Internal Ethernet Server)
Server) Mode : Full Duplex, Rate : 1Gb/s
Mode : Full Duplex, Rate : 1Gb/s 107127056 packets input, 707649689 bytes, 0 total
317863661 packets input, 4291854728 bytes, 0 total input drops
input drops 12 packets discarded (792 bytes) in garbage
0 packets discarded (0 bytes) in garbage collection
collection 29433394 packets discarded (936722920 bytes) in recv
300 packets discarded (83692 bytes) in recv processing
processing 0 incomplete frames discarded
0 incomplete frames discarded 0 packets discarded due to bad headers
0 packets discarded due to bad headers 0 packets waiting for clients
0 packets waiting for clients 1 packets waiting on Rx
1 packets waiting on Rx Received 379530 broadcast packets, 53601523 multicast
Received 379557 broadcast packets, 17762716 packets 0 dropped flood packets
multicast packets 0 dropped flood packets Input errors: 0 CRC, 0 overrun, 0 alignment, 0
Input errors: 0 CRC, 0 overrun, 0 alignment, 0 length, 0 collision
length, 0 collision 67306802 packets output, 22632683 bytes, 0 total
301873561 packets output, 2396666126 bytes, 0 output drops
total output drops Output 1 broadcast packets, 1179989 multicast
Output 0 broadcast packets, 37045337 multicast .
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 410
EOBC Switch. (64-bit XR)
Switch links and interfaces
sysadmin-vm:0_RSP0# show controller switch summary location 0/RP0/RP-SW
Sun Jan 8 15:34:49.602 UTC+00:00
Rack Card Switch Rack Serial Number
--------------------------------------
0 RP0 RP-SW
sysadmin-vm:0_RSP0#
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 411
LC & NP Resources
L3 forwarding resources
RP/0/RSP0/CPU0:rasr9000-2w-a#show cef resource hardware ingress detail location 0/0/CPU0
Wed Dec 11 22:27:57.319 EST
CEF resource availability summary state: GREEN
CEF will work normally
ipv4 shared memory resource:
CurrMode GREEN, CurrAvail 1609412608 bytes, MaxAvail 1683308544 bytes
ipv6 shared memory resource:
CurrMode GREEN, CurrAvail 1609412608 bytes, MaxAvail 1683308544 bytes
mpls shared memory resource:
CurrMode GREEN, CurrAvail 1609412608 bytes, MaxAvail 1683308544 bytes
common shared memory resource:
CurrMode GREEN, CurrAvail 1609412608 bytes, MaxAvail 1683308544 bytes
DATA_TYPE_TABLE_SET hardware resource: GREEN
DATA_TYPE_TABLE hardware resource: GREEN
DATA_TYPE_IDB hardware resource: GREEN
DATA_TYPE_IDB_EXT hardware resource: GREEN
DATA_TYPE_LEAF hardware resource: GREEN
DATA_TYPE_LOADINFO hardware resource: GREEN
DATA_TYPE_PATH_LIST hardware resource: GREEN
DATA_TYPE_NHINFO hardware resource: GREEN
DATA_TYPE_LABEL_INFO hardware resource: GREEN
DATA_TYPE_FRR_NHINFO hardware resource: GREEN
DATA_TYPE_ECD hardware resource: GREEN
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 412
LC & NP Resources
L2 service resources
RP/0/RSP0/CPU0:rasr9000-2w-a#show l2vpn forwarding resource hardware ingress detail location
0/0/CPU0
Wed Dec 11 22:26:07.070 EST
L2VPN forwarding resource availability summary state: GREEN
shared memory resource:
CurrMode GREEN, CurrAvail 1609412608 bytes, MaxAvail 1650212864 bytes
AC hardware resource: GREEN
MPLS hardware resource: GREEN
PBB PORT hardware resource: GREEN
NHOP hardware resource: GREEN
L2TP hardware resource: GREEN
L2TP_SESSION hardware resource: GREEN
VFI hardware resource: GREEN
BRIDGE hardware resource: GREEN
BRIDGE SHG hardware resource: GREEN
BRIDGE PORT hardware resource: GREEN
BRIDGE MAC hardware resource: GREEN
MSTI MAIN PORT hardware resource: GREEN
BRIDGE MAIN PORT hardware resource: GREEN
MCAST TABLE hardware resource: GREEN
MCAST LEAF hardware resource: GREEN
MCAST XID hardware resource: GREEN
PBB BMAC SA hardware resource: GREEN
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 413
LC & NP Resources
L2 service resources - continued
RP/0/RSP0/CPU0:rasr9000-2w-a#show l2vpn forwarding resource hardware ingress detail location 0/0/CPU0
.
Platform resource:
Hardware Resource Summary - NP0
---------------------------------------------
Set Modify Clear Get Get Info Delete All In use
T/F T/F T/F T/F T/F T/F T/Max
XID 24/0 117/0 8/0 0/0 0/0 0/0 16/262144
BRIDGE 1/0 15/0 0/0 0/0 0/0 0/0 1/65536
STATIC MAC 1/0 0/0 0/0 0/0 0/0 0/0 1/2097152
BRIDGE PORT 0/0 0/0 0/0 0/0 0/0 0/0 0/393216
UIDB 39/0 0/0 3/0 0/0 0/0 0/0 -/-
VPLS PW STATS 7/0 -/- 4/0 -/- 0/0 -/- -/-
ISID 0/0 0/0 0/0 0/0 0/0 0/0 0/65536
L2TP 0/0 0/0 0/0 0/0 0/0 0/0 0/131072
DHCP 0/0 0/0 0/0 0/0 0/0 0/0 0/131072
TOTAL MAC -/- -/- -/- -/- -/- -/- 1/2097152
----------- ----------- ----------- ----------- ----------- -----------
Total 72/0 132/0 15/0 0/0 0/0 0/0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 414
TCP Resources
TCP connections states
RP/0/RSP0/CPU0:rasr9000-2w-a#show tcp brief
Fri Dec 13 22:29:33.189 EST
PCB VRF-ID Recv-Q Send-Q Local Address Foreign Address State
0x10174ad8 0x60000000 0 0 :::179 :::0 LISTEN
0x101745f8 0x60000001 0 0 :::179 :::0 LISTEN
0x10174798 0x60000002 0 0 :::179 :::0 LISTEN
0x10174938 0x60000003 0 0 :::179 :::0 LISTEN
0x101cce2c 0x6000000b 0 0 :::179 :::0 LISTEN
0x1016fefc 0x00000000 0 0 :::179 :::0 LISTEN
0x101ac7ac 0x60000000 0 0 10.101.111.1:179 10.100.101.1:20100 ESTAB
0x1017bbf4 0x60000000 0 0 10.101.111.1:646 10.101.188.1:30687 ESTAB
0x10182b38 0x60000000 0 0 10.101.111.1:179 10.100.103.1:59214 ESTAB
0x1002e004 0x6000000d 0 0 10.100.111.1:17514 10.100.111.100:13680 ESTAB
0x10161e18 0x60000000 0 0 0.0.0.0:23 0.0.0.0:0 LISTEN
0x101cc968 0x00000000 0 0 0.0.0.0:23 0.0.0.0:0 LISTEN
0x101594b4 0x60000000 0 0 0.0.0.0:646 0.0.0.0:0 LISTEN
0x1016f7f0 0x60000000 0 0 0.0.0.0:179 0.0.0.0:0 LISTEN
0x10165d74 0x60000001 0 0 0.0.0.0:179 0.0.0.0:0 LISTEN
0x1016f4b0 0x60000002 0 0 0.0.0.0:179 0.0.0.0:0 LISTEN
0x1016f650 0x60000003 0 0 0.0.0.0:179 0.0.0.0:0 LISTEN
0x101ade54 0x6000000b 0 0 0.0.0.0:179 0.0.0.0:0 LISTEN
0x1016276c 0x00000000 0 0 0.0.0.0:179 0.0.0.0:0 LISTEN
0x1015e304 0x00000000 0 0 0.0.0.0:0 0.0.0.0:0 CLOSED
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 415
TCP Resources
TCP connections parameters
RP/0/RSP0/CPU0:rasr9000-2w-a#show tcp detail pcb 0x10182b38 SRTT: 217 ms, RTTO: 300 ms, RTV: 11 ms, KRTT: 0 ms
Wed Dec 11 22:47:18.708 EST minRTT: 1 ms, maxRTT: 289 ms
=============================================================
Connection state is ESTAB, I/O status: 0, socket status: 0 ACK hold time: 200 ms, Keepalive time: 0 sec, SYN waittime: 30
Established at Thu Dec 5 04:13:28 2013 sec
Giveup time: 0 ms, Retransmission retries: 0, Retransmit
PCB 0x10182b38, SO 0x10182968, TCPCB 0x101cc2b4, vrfid forever: FALSE
0x60000000, Connect retries remaining: 0, connect retry interval: 0 secs
Pak Prio: Medium, TOS: 192, TTL: 255, Hash index: 717
Local host: 10.101.111.1, Local port: 179 (Local App PID: State flags: none
287053) Feature flags: MD5, Win Scale, Nagle
Foreign host: 10.100.103.1, Foreign port: 59214 Request flags: Win Scale
Current send queue size in bytes: 0 (max 24576) Datagrams (in bytes): MSS 1216, peer MSS 1216, min MSS 1240,
Current receive queue size in bytes: 0 (max 32768) mis- max MSS 1240
ordered: 0 bytes
Current receive queue size in packets: 0 (max 0) Window scales: rcv 0, snd 0, request rcv 0, request snd 0
Timestamp option: recent 0, recent age 0, last ACK sent 0
Timer Starts Wakeups Next(msec) Sack blocks {start, end}: none
Retrans 9789 0 0 Sack holes {start, end, dups, rxmit}: none
SendWnd 0 0 0 Socket options: SO_REUSEADDR, SO_REUSEPORT, SO_NBIO
TimeWait 0 0 0 Socket states: SS_ISCONNECTED, SS_PRIV
AckHold 9817 9605 0 Socket receive buffer states: SB_DEL_WAKEUP
KeepAlive 1 0 0 Socket send buffer states: SB_DEL_WAKEUP
PmtuAger 0 0 0 Socket receive buffer: Low/High watermark 1/32768
GiveUp 0 0 0 Socket send buffer : Low/High watermark 2048/24576, Notify
Throttle 0 0 0 threshold 0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 416
Troubleshooting:
Forwarding Path
Telemetry
Streaming YANG model telemetry (push subscription model)
RP/0/RP0/CPU0:PE125#show running-config telemetry
model-driven
Tue Feb 14 13:06:18.261 UTC
telemetry model-driven
destination-group COLL1
address family ipv4 192.168.30.101 port 2103
encoding self-describing-gpb
protocol tcp
! YANG sub-tree
.
!
sensor-group YD1
sensor-path Cisco-IOS-XR-infra-statsd-oper:infra-
statistics/interfaces/interface/latest/generic-counters
!
subscription SUB1
sensor-group-id YD1 sample-interval 60000
destination-id COLL1
!
.
!
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 418
Telemetry
Build your own dashboard
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 419
Monitor Interface
See interface stats in almost real time
RP/0/RSP0/CPU0:rasr9000-2w-b#monitor interface tenGigE 0/1/1/1
Errors Stats:
Input Total: 1 0
Input CRC: 0 0
Input Frame: 0 0
Input Overrun: 0 0
Output Total: 0 0
Output Underrun: 0 0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 420
The Physical
Checking on port physical: SFP/XFP, levels NP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 421
The Physical
Reading the controller counters: In, out, invalid, unicast, mcast, frame sizes
RP/0/RSP0/CPU0:rasr9k-1y#show controllers TenGigE0/4/0/20 Egress:
stats Output total bytes = 1345771624
Sun Feb 24 14:44:18.899 UTC Output good bytes = 1345771624
Statistics for interface TenGigE0/4/0/20 (cached values):
Ingress: Output total packets = 21895707
Input total bytes = 3081227904920 Output 802.1Q frames =0
Input good bytes = 3081227904920 Output pause frames =0
Output pkts 64 bytes = 21665536
Input total packets = 23220024479 Output pkts 65-127 bytes = 21179
Input 802.1Q frames =0 Output pkts 128-255 bytes = 168767
Input pause frames =0 Output pkts 256-511 bytes = 40225
Input pkts 64 bytes = 7143534733 Output pkts 512-1023 bytes = 0
Input pkts 65-127 bytes = 2888766549 Output pkts 1024-1518 bytes = 0
Input pkts 128-255 bytes = 13124923916 Output pkts 1519-Max bytes = 0
Input pkts 256-511 bytes = 62799261
Input pkts 512-1023 bytes = 0 Output good pkts = 21895707
Input pkts 1024-1518 bytes = 0 Output unicast pkts = 21870499
Input pkts 1519-Max bytes = 0 Output multicast pkts = 25195
Output broadcast pkts = 13
Input good pkts = 23220024479 Output drop underrun =0
Input unicast pkts = 23220023458 Output drop abort =0
Input multicast pkts = 62 Output drop other =0
Input broadcast pkts = 959
Output error other =0
Input drop overrun =0
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 422
Interface Programming in Hardware
Example L3 VLAN sub-interface
RP/0/RSP0/CPU0:rasr9000-2w-b#show ethernet hardware .
interface TenGigE 0/0/0/2.200 location 0/0/CPU0 ........ TCAM entry 0 (uncompressed logical)
Tue Jan 21 21:45:18.351 EST
----------------------------------------------------------------------------- ................................
Physical port : 2 Port Number : mask=0xFFFF value=0x0004(4)
Interface name : TenGigE0/0/0/2.200
Ifhandle : 0x040012C0 Validity Bits:
Parent Ifhandle : 0x04000140 validity1: mask=1 value=1
Status : Init|Mem|Alloc|TShm|Pgm validity2: mask=1 value=0
TCAM entries : 1 validity3: mask=0 value=0
TCAM entry type : Single tag exact isid_valid: mask=0 value=0
Channel ID : 0 Tag 1 :
PI policy validity : 0x0 ethertype: mask=0xFFFF value=0x8100
NP port : 4 VLAN id : mask=0x0FFF value=0x00C8(200)
NP map (previous) : 0x0 (0x0)
idb pointer : 0x5002b570 Tag 2 :
Admin mode : 1 (Up) ethertype: mask=0x0000 value=0x0000
Interface state : 1 (Up) VLAN id : mask=0x0000 value=0x0000(0)
Interface type : 3 (L3 Sub-if over Source MAC :
Physical) mask : 0000.0000.0000
tunn_ovrd_mode : QnQ Child /w no parent value : 0000.0000.0000
tunneling ethertype set
Ingress UIDB index : 29 ........ TCAM entry 0 (2nd gen physical)
Egress UIDB index : 29 ....................................
-----------------------------------------------------------------------------
TCAM mask:
TCAM key status: 0x404 index: 0 FC FF 00 00 FF FF FF FF FF FF FF FF 00 F0
TCAM 0 address: 0x23880 FF 00 00 BB BB BB
TCAM 1 address: 0x0 TCAM value:
TCAM 2 address: 0x0 01 00 00 81 00 00 00 00 00 00 00 00 C8 00
. 00 04 00 00 00 00
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 423
Unicast Transit Frame Path
Physical > NP > FIA > Fabric > [FIA > NP] > Physical
optics
optics
SFP
Lightspeed optics
optics
SFP
Tomahawk FIA optics
optics
optics
Lightspeed optics
optics
optics
Lightspeed optics
optics
SFP optics
optics
Tomahawk FIA Lightspeed optics
optics
SFP
Lightspeed optics
optics
optics
optics
SFP optics
Lightspeed optics
optics
SFP
Tomahawk FIA Switch optics
Fabric
A9K-8X100GE A99-32X100GE
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 424
The Internal Path
Mapping the port to NP and FIA NP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 425
Inside a Network Processor
Reading pipeline counters
TM
Parse Search Resolve Modify Queueing
Scheduling
499 RSV_ING_L2_SMAC_MISS 60 0
502 RSV_ING_L2_LEARN 60 0
541 RSV_REFRESH_FROM_NOTIFY_CNT 62 0
584 RSV_L2BC_BVI 2 0
604 RESOLVE_REMOTE_RACK_PREP_CNT 5539915 8
.
708 LRN_PERIODIC_AGING_DELETE_ENTRY 60 0
.
848 PUNT_ADJ 2 0
852 PUNT_ACL_DENY 161 0
900 PUNT_STATISTICS 5083356 7
902 PUNT_DIAGS_RSP_ACT 11419 0
904 PUNT_DIAGS_RSP_STBY 11427 0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 426
NP Counters and Rates
Example: Ingress NP, no drops
TM
Parse Search Resolve Modify Queueing
Scheduling
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 427
NP Counters and Rates TM
NP drops, rates and direction Parse Search Resolve Modify Queueing
Scheduling
.
370
373
PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_3
DBG_RSV_EP_L_RSV_ING_L3_IFIB
106211474043
3707021673
883922
0 Typhoon NP catching up
830 PUNT_NO_MATCH 4746 0
831 PUNT_NO_MATCH_EXCD 464963896 0
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 428
NP Counters and Rates – Lightspeed (4th/5th gen)
NP drops, rates and direction
RP/0/RSP0/CPU0:rasr9000-2w-b#show controllers NP counters np2 location 0/4/CPU0
Tue Feb 1 12:12:49.750 CET
Node: 0/4/CPU0:
----------------------------------------------------------------
Show global stats counters for NP2, revision v0
Offset Counter FrameValue Rate (pps)
-------------------------------------------------------------------------------
149 IPv4 QoS TCAM lookup miss 33 0
159 IPv6 LL hash lookup miss on egress 2 0
162 IPv6 QoS TCAM lookup miss 67632 0
214 L2 egress LAG not local 1454 0
384 Egress UIDB in down state 32 0
430 IPv4 ACL deny 698 0
456 IPv4 multicast fail RPF drop 69 0
457 IPv4 multicast fail RPF punt 244747546 50
691 CLNS multicast from fabric pre-route 22633108 4
692 Egress intf inject from fabric 1818 0
694 IPv4 from fabric 194 0
695 IPv4 from fabric pre-route
698 IPv4 multicast from fabric pre-route
254175
280087974
0
53
SW counters
700 IPv6 from fabric 839 0
702 IPv6 link-local from fabric pre-route 153029 0
704 IPv6 multicast from fabric pre-route 57151 0
709 Inject to port 46809633 9
710 MPLS from fabric 1883153 0
713 Pre-route punt request 187982 0
1417 IPv4 disabled in UIDB 10 0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 429
NP Counters and Rates – Lightspeed (contd.)
NP drops, rates and direction
1467 MPLS leaf with no control flags set 134 0
1469 MPLS receive adjacency 84 0
1502 ARP 12348 0
1523 Diags 88210 0
1571 IPv4 options 5 0
1580 IPv4 multicast do all but forward 244747546 50
1586 ICMP generation needed 9 0
SW counters
1598 TTL exceeded 688 0
1610 IFIB 28700797 6
1619 ACL denied packets punted for ICMP generation 698 0
1694 Diags RSP active 87548 0
1697 Diags RSP standby 87548 0
HW Received from Line 879697268863 170139
HW Transmit to Fabric 879450616886 170089
HW Received from Fabric 2509265709824 512903
HW Transmit to Line 2509287364175 512907
HW Host Inject Received 30860357 6
HW Host Punt Transmit 255817121 52
HW Local Loopback Received at iGTR 286146849 58
HW Local Loopback Transmit by iGTR 286146849 58
HW
HW
Local Loopback Received at Egress
Transmit to TM from eGTR
286146849
2509551824765
58
512961 HW counters
HW Transmit to L2 2509543181275 512959
HW Received from Service Loopback 8643490 2
HW Transmit to Service Loopback 8643490 2
HW Internal generated by PDMA 124341747260 23474
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 430
NP Counters and Rates TM
NP drops Parse Search Resolve Modify Queueing
Scheduling
Node: 0/1/CPU0:
----------------------------------------------------------------
NP 0 Drops:
----------------------------------------------------------------
RSV_DROP_IN_L3_NOT_MYMAC 136912
MODIFY_PUNT_REASON_MISS_DROP 2
PARSE_EGR_INJ_PKT_TYP_UNKNOWN 4042
PARSE_DROP_IN_UIDB_TCAM_MISS 60081
PARSE_DROP_IN_UIDB_DOWN 15
PARSE_DROP_IPV4_MCAST_NOT_ENABLED 331791
UNKNOWN_L2_ON_L3_DISCARD 341153
----------------------------------------------------------------
RP/0/RSP0/CPU0:ASR9006-2w-a.PE2#
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 431
NP Counters and Rates TM
Per (sub)interface NP drop counters Parse Search Resolve Modify Queueing
Scheduling
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 432
NP Counters and Rates TM
Decoding dropped frames Parse Search Resolve Modify Queueing
Scheduling
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 433
NP Counters and Rates TM
Decoding dropped frames Parse Search Resolve Modify Queueing
Scheduling
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 434
NP Counters and Rates TM
Traffic Manager drops Parse Search Resolve Modify Queueing
Scheduling
Node: 0/0/CPU0:
----------------------------------------------------------------
RP/0/RSP0/CPU0:rasr9000-2w-b#
RP/0/RSP0/CPU0:rasr9000-2w-b#
RP/0/RSP0/CPU0:rasr9000-2w-b#show controllers NP tm counters np1 location 0/0/CPU0
Tue Dec 10 14:40:49.816 EST
Node: 0/0/CPU0:
----------------------------------------------------------------
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 435
FIA Counters SFP
SFP
NP FIA
FIA counts, drops and direction
RP/0/RSP0/CPU0:rasr9000-2w-b#show controllers fabric RP/0/RSP0/CPU0:rasr9000-2w-b#show controllers fabric fia
fia instance 0 stats location 0/0/CPU0 instance 0 drops ingress location 0/0/CPU0
Tue Dec 10 14:49:58.704 EST Tue Dec 10 15:33:37.655 EST
********** FIA-0 **********
********** FIA-0 ********** Category: in_drop-0
Category: count-0 From Spaui Drop-0 0
From Unicast Xbar[0] 733461306331 accpt tbl-0 0
From Unicast Xbar[1] 733460650405 ctl len-0 0
From Unicast Xbar[2] 0 short pkt-0 0
From Unicast Xbar[3] 0 max pkt len-0 0
From MultiCast Xbar[0] 233068 min pkt len-0 0
From MultiCast Xbar[1] 0 From Spaui Drop-1 0
From MultiCast Xbar[2] 0
From MultiCast Xbar[3] 0 Back pressure accpt tbl-1 0
ctl len-1 0
To Unicast Xbar[0] 933450146675 from egress NP short pkt-1 0
To Unicast Xbar[1] 932066610046 max pkt len-1 0
To Unicast Xbar[2] 0 min pkt len-1 0
To Unicast Xbar[3] 0 Tail drp 125787328841
To MultiCast Xbar[0] 451799 Vqi drp 0
To MultiCast Xbar[1] 0 Header parsing drp 0
To MultiCast Xbar[2] 0 pw to ni drp 0
To MultiCast Xbar[3] 0 ni from pw drp 0
To Line Interface[0] 8759312354291 sp0 crc err 0
To Line Interface[1] 457138023968 sp0 bad align 0
From Line Interface[0] 11117127781061 sp0 bad code 0
From Line Interface[1] 489302108080 sp0 align fail 3
Ingress drop: 97191712670 sp0 prot err 0
Egress drop: 0 sp1 crc err 0
Total drop: 97191712670 sp1 bad align 0
.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 436
Line Card Drops
All drops for all reasons on a line card
RP/0/RSP0/CPU0:ASR9006-2w-a.PE2#show drops all
location 0/1/CPU0 show netio drops:
Thu Jul 7 17:04:12.291 EDT [netio:Interface: GigabitEthernet0/1/0/10]
/pkg/lib/libipv4_fib_switch.dll: 4043
[netio:Interface: GigabitEthernet0/1/0/10]
===================================== packet_null_action: 305
Checking for drops on 0/1/CPU0
=====================================
show controller np counters:
[np:NP0] RSV_DROP_IN_L3_NOT_MYMAC: 137015
show arp traffic: [np:NP0] MODIFY_PUNT_REASON_MISS_DROP: 2
[arp:ARP] IP Packet drop count for node 0/1/CPU0: 1 [np:NP0] PARSE_DROP_IN_UIDB_TCAM_MISS: 60198
[np:NP0] PARSE_DROP_IN_UIDB_DOWN: 15
[np:NP0] PARSE_DROP_IPV4_MCAST_NOT_ENABLED: 332431
show cef drops: [np:NP0] UNKNOWN_L2_ON_L3_DISCARD: 341810
[cef:0/1/CPU0] Discard drops packets : 15 [np:NP1] MODIFY_PUNT_REASON_MISS_DROP: 3
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 437
Line Card Drops
Modifying the "show drops all" template
Example: include drops from "show Step 3: Add this sequence to the end of the
controllers np fast-drop" command in the '#NP' section of the packet_drops.list file:
output of the "show drops all" command
[commandstart]
Step 1: Copy the /pkg/etc/packet_drops.list cmd_name = show controller np fast-drop
cmd_exec = prm_np_show fast-drop -s $location
file to /disk0a:/usr/ module = np
group = ^.*Show NP EFD stats counters for (NP\d),
run default_group = ERROR!! - Group not found!!
cd /pkg/etc drop_regex1 = ^\s*(\S+Priority[0-9]\S)\s+(\d+)
cp packet_drops.list /disk0a:/usr/ [commandend]
exit
Step 4: Verify the command works as expected
Step 2: Edit the file offline or on the router by using the 'self-test' option:
using the 'vim' editor in the shell.
sh drops all self-test location <location> | b fast-
drop
run
vim /disk0a:/usr/packet_drops.list
exit You should see in the output everything except
the lines that are matching the drop_regex1
pattern. Compare this to the output of:
sh controllers np fast-drop all location <location>
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 438
Troubleshooting:
Packet Tracing
ASR9k: Embedded Packet Tracer Purpose
• Validate service provisioning by tracing the matching flow through
the system
• Perform in-depth triaging of packet forwarding issues in data-path
and punt-path (inject-path in planning)
• Learn the platform and XR platform independent forwarding
infrastructure
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 440
ASR9k: Embedded Packet Tracer Key Features
• User-mode intuitive CLI for user interaction (no configuration
required).
• Very flexible condition specification to specify a flow of interest.
• Offline Web App to easily derive conditions for a arbitrary header
stack.
• Trace packets of a flow through the system.
• Embedded Packet Tracer does not change packet disposition
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 441
Service Verification/Troubleshooting In L2 VPN
Ethernet Flow
MPLS
MPLS
identifier
PW Ctrl
Ethernet
dot1q Expected
dot1q
Agg IPv4 path of a
switch flow
L2VPN
PE P P P P
client
P P XP P L2VPN
PE
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 442
Supported Platforms/Releases
• XR Release 7.1.2:
• Mark packets on ASR 9000 Tomahawk and Lightspeed+ NP
• Count traced packets on ASR 9000 Tomahawk and Lightspeed+ NP
• XR Release 7.5.2:
• Count traced packets on punt path:
• SPP
• NetIO libraires
• UDP, TCP
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 443
User Interaction
Identify the • Any sequence of bits in the packet header
flow
Clear old • Not mandatory, but helps avoid confusions ☺
conditions, • “clear packet-trace { conditions | counters } all”
counters
Express the • Express as offset/value/mask on specific interface(s)
flow as set of • Use https://github.com/xr-packet-tracer to derive the offset/value/mask
packet tracer
conditions
Apply • Specify input interface(s) and offset/value/mask sets
conditions • “packet-trace condition { interface | condition }…”
View
results
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 444
Embedded Packet Tracer CLI
Command Description
packet-trace condition interface <interface> Specify interface on which marking should be enabled
packet-trace condition <id> offset <offset> Specify the conditions as a set of offset/value/mask triplets
value <value> mask <mask>
packet-trace start Start packet marking
packet-trace stop Stop packet marking
show packet-trace status Display the status of packet tracer:
• Conditions buffered by packet trace master process
• Tracing state (active/inactive), based on the execution of “start” and
“stop” commands
show packet-trace status [detail] Same as above, plus for every location:
• List every counting module and any errors it reported
• List every marking module, active conditions and any errors it reported
show packet-trace result Display all non-zero counters
clear packet-trace conditions all Clear all conditions (only allowed when tracing stops)
clear packet-trace counters all Clear all counters
show packet-trace description [detail] Display all supported counters
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 445
Embedded Packet Trace Condition
• Specify interfaces where condition is applied
• Condition applies to physical interface
• To trace on sub-interface, calculate in the encapsulation in the offset
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 446
Packet Trace Condition
• “Condition” is expressed in offset/value/mask triplets
• Offset is expressed in octets from the very start of the Ethernet frame
• Value defines the expected values on positions we care about starting
from the offset
• You can set 0 or 1 into positions you don’t care about
• Mask defines which bits we care and which we don’t care about starting
from the offset
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 447
Packet Trace Condition Generator Web App
3
2
4
5
Download from: 6
7
https://github.com/xr-packet-tracer 8
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 448
Clear Conditions and Counters
• Packet trace counters can be cleared at any time
clear packet-trace counters all
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 449
Start / Stop Tracing
• Packet tracer master process on RP sends the specified conditions
to all LCs
• LCs that own target interfaces program the NP and start marking
packets
• Packet trace flag is preserved in the NP/fabric/punt/inject packet
headers
packet-trace start
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 450
Show Packet Trace Status – Simple Output
• Displays conditions buffered by packet trace master and status
• Status is derived from the packet-trace start/stop command
RP/0/RSP0/CPU0:CORE-TOP#show packet-trace status
Packet Trace Master Process:
Buffered Conditions:
Interface HundredGigE0_5_0_1
Interface HundredGigE0_5_0_3 Conditions buffered by the
1 offset 14 value 0x7e4 mask 0xfff packet trace master process
2 offset 30 value 0xc0a80003 mask 0xffffffff on active RP
3 offset 34 value 0xc0a80002 mask 0xffffffff
RP/0/RSP0/CPU0:CORE-TOP#
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 451
View Packet Trace Results
• Counter type:
• Marking – packet has matched the condition and was marked for tracing
• Pass - this counter describes the action performed on the packet. Packet
is passed on for further processing.
• Drop – this counter signals that the NP µcode made a decision to drop the
packet. Drop reason is not provided. Try correlating the NP drop counters
with the increment of this counter
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 452
View Packet Trace Results
RP/0/RSP0/CPU0:CORE-TOP#show packet-trace results
Thu Jul 11 17:03:57.477 UTC
T: D - Drop counter; P - Pass counter
Location | Source | Counter | T | Last-Attribute | Count
-------- ------ ------------------------- - ---------------------------------------- ---------------
0/5/CPU0 NP0 PACKET_MARKED P HundredGigE0_5_0_1 1000
0/5/CPU0 NP0 PACKET_TO_FABRIC P 1000
0/5/CPU0 NP0 PACKET_FROM_FABRIC P 1000
0/5/CPU0 NP0 PACKET_TO_INTERFACE P HundredGigE0_5_0_0 1000
Type (explained
Location Counter name on previous slide) Counter value
Source identifies the NP
number on the location • With every counter update, packet trace framework also receives the
timestamp and allows for a freeform “attribute” that describes more
Order of counters tries to illustrate the order closely the action.
of events in packet processing, but this may • The use of attribute and its meaning differs between counters
not always be the case. • Current CLI only exposes the last attribute to the user.
• In future releases, user will be able to see the last 1023 timestamps
and attributes per counter.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 453
Example: ICMP Echo Request Processing Path
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 454
References
• https://xrdocs.io/asr9k//tutorials/xr-embedded-packet-tracer/
• https://www.youtube.com/watch?v=5aCAwdQF8SE
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 455
Troubleshooting:
Packet Capture
Packet Capture: Problem Packets
Example: incrementing drops
TM
Parse Search Resolve Modify Queueing
Scheduling
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 457
Packet Capture: Problem Packets
Example: incrementing drops
TM
Parse Search Resolve Modify Queueing
Scheduling
Warning: Every packet captured will be dropped! If you use the 'count'
option to capture multiple protocol packets, this could disrupt Alert!
protocol sessions (eg, OSPF session flap). So if capturing protocol
packets, capture only 1 at a time. Captured
are
Warning: A mandatory NP reset will be done after monitor to clean up.
This will cause ~50ms traffic outage. Links will stay Up. dropped
Proceed y/n [y] >
Alert!
Traffic
loss
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 458
Packet Capture: Problem Packets
Example: incrementing drops
TM
Parse Search Resolve Modify Queueing
Scheduling
Warning: Every packet captured will be dropped! If you use the 'count'
option to capture multiple protocol packets, this could disrupt Alert!
protocol sessions (eg, OSPF session flap). So if capturing protocol
packets, capture only 1 at a time. Captured
are
Warning: A mandatory NP reset will be done after monitor to clean up.
This will cause ~50ms traffic outage. Links will stay Up.Ignore dropped
Proceed y/n [y] >
Monitor RSV_ING_VPWS_ERR_DROP on NP0 ... (Ctrl-C to quit) [internal]
Sat Jan 18 19:02:44 2014 -- NP0 packet
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 459
Packet Capture: Problem Packets
Example: incrementing drops
TM
Parse Search Resolve Modify Queueing
Scheduling
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 460
Packet Capture: Problem Packets
Decoding
TM
Parse Search Resolve Modify Queueing
Scheduling
00 00 02 01 61 90 00 00 c0 02 01 02 81 00 00 0a
08 00 45 00 00 8b 00 00 00 00 40 3d f8 30 c0 01
01 01 c0 01 01 02 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
10 f3 11 05 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Decode using Wireshark ‘Import From Hex Dump’
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 461
Packet Capture: HW Counters On Lightspeed
Example: HW counters
RP/0/RSP0/CPU0:xrg-402-asr9906#monitor np ?
counter next packet to increment a specific NP counter(cisco-support)
crc-frame-err Ingress packets with CRC or Framing errors(cisco-support)
fabric-egress Egress packets from fabric(cisco-support)
interface interface to display counters(cisco-support)
net-ingress Ingress packets from network links(cisco-support)
RP/0/RSP0/CPU0:xrg-402-asr9906#monitor np
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 462
Packet Capture: Transit Packets
Example: IPv4 L3VPN ingress
RP/0/RSP0/CPU0:rasr9000-2w-b#show running-config ipv4 access-list CAPTURE
Sat Jan 18 20:13:35.941 EST
ipv4 access-list CAPTURE Count in NP
10 permit ipv4 192.4.1.0/24 10.10.6.0/24 capture
20 permit ipv4 any any
! Let all else go!
RP/0/RSP0/CPU0:rasr9000-2w-b#show running-config interface TenGigE 0/0/0/2
Sat Jan 18 20:13:50.654 EST
interface TenGigE0/0/0/2
vrf TRAFFIC
ipv4 address 192.4.1.1 255.255.255.0 Apply to transit
ipv4 access-group CAPTURE ingress
!
RP/0/RSP0/CPU0:rasr9000-2w-b#show controllers NP counters np0 location 0/0/CPU0 | include
ACL_CAPTURE_NO_SPAN
Sat Jan 18 20:14:26.109 EST
477 ACL_CAPTURE_NO_SPAN 6802507 38003
RP/0/RSP0/CPU0:rasr9000-2w-b#show controllers NP counters np0 location 0/0/CPU0 | include
ACL_CAPTURE_NO_SPAN
Sat Jan 18 20:14:28.819 EST NP ACL “capture”
477 ACL_CAPTURE_NO_SPAN 6905417 38002 counter
RP/0/RSP0/CPU0:rasr9000-2w-b#show controllers NP counters np0 location 0/0/CPU0 | include
incrementing
ACL_CAPTURE_NO_SPAN
Sat Jan 18 20:14:34.597 EST
477 ACL_CAPTURE_NO_SPAN 7124969 37991
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 463
Packet Capture: Transit Packets
Example: IPv4 L3VPN ingress
RP/0/RSP0/CPU0:rasr9000-2w-b#monitor np counter ACL_CAPTURE_NO_SPAN np0 count 3 location 0/0/CPU0
Sat Jan 18 20:31:53.311 EST
Warning: Every packet captured will be dropped! If you use the 'count'
option to capture multiple protocol packets, this could disrupt
protocol sessions (eg, OSPF session flap). So if capturing protocol Alert!
packets, capture only 1 at a time.
Captured
Warning: A mandatory NP reset will be done after monitor to clean up. are
This will cause ~50ms traffic outage. Links will stay Up.
Proceed y/n [y] > dropped
Alert!
Traffic
loss
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 464
Packet Capture: Transit Packets
Example: IPv4 L3VPN ingress
RP/0/RSP0/CPU0:rasr9000-2w-b#monitor np counter ACL_CAPTURE_NO_SPAN np0 count 3 location 0/0/CPU0
Sat Jan 18 20:31:53.311 EST
Warning: Every packet captured will be dropped! If you use the 'count'
option to capture multiple protocol packets, this could disrupt
protocol sessions (eg, OSPF session flap). So if capturing protocol Alert!
packets, capture only 1 at a time.
Captured
Warning: A mandatory NP reset will be done after monitor to clean up. are
This will cause ~50ms traffic outage. Links will stay Up.
Proceed y/n [y] > dropped
Monitor ACL_CAPTURE_NO_SPAN on NP0 ... (Ctrl-C to quit) Those 3 packets
are dropped!
Sat Jan 18 20:32:34 2014 -- NP0 packet
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 465
Packet Capture: Transit Packets
Example: IPv4 L3VPN ingress
.
(count 2 of 3)
Sat Jan 18 20:32:36 2014 -- NP0 packet
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 466
Packet Capture: Transit Packets
Decoding the packet
00 11 0b 00 61 92 00 00 c0 04 01 02 08 00 45 60
00 ec 00 00 00 00 40 3d a8 08 c0 04 01 02 0a 0a
06 5d 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
10 f3 11 05 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Decode using Wireshark ‘Import From Hex Dump’
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 467
Troubleshooting NP
Performance
Why Is My NP Load High?
High NP Load
• Typical: complex feature processing keeps packets in NP buffers for
extended time
• Atypical: excessive egress replications keep NP pipeline busy
• Enhanced version of np_perf shell facility on TH/LS/LS+ line cards:
• Better monitoring of NP buffer pool(s) utilisation
• Provides insight into average and peak buffer utilisation over a longer
period of time, while not overloading the CPU
• Available since XR release 7.1.2
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 469
Enhanced np_perf On Tomahawk
[xr-vm_node0_2_CPU0:~]$np_perf -h
Usage: np_perf -e<channel> [-n<samples>] [-t<ms sample time>] -[opts]
-e NP channel (0,1,2,3)
-n <sample>, --num number of samples to take, min:100, def:2000, Mandatory arguments
-R, --rfd show average flow-control on time per source
<optional> -T, thread mode, def = FALSE (console mode)
<optional> -D <sec>, run duration in second
between 10 and 200000, def = 0 (one shot)
repeat -n samples(>= 2000) for at least <sec>
-T will be on automatically
<optional> -k <rfd_threshold>, between 100 and 10000, def = 3000
<optional> -o <selection>, def = run all selections
1: 10G ~ 100G interface
2: 40G ~ 100G interface
3: QSGMII interface
4: special interface
5: Group 1~8
6: all bank 0~31
7: ICFD/OCFD queue
8: TM global queue
9: TM output queue
<optional> -x <xfi port_id>, between 0 and 47.
100G: port_id % 12 == 0
40G: port_id % 4 == 0
10G: all other irrelevant output omitted
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 470
Enhanced np_perf On Lightspeed/Lightspeed+
[xr-vm_node0_0_CPU0:~]$np_perf
Usage: np_perf -e<channel> [-n<samples>] [-t<ms sample time>] -[opts]
-e, NP channel (0..3)
-r, Global Packet Buffer (GPB) info/monitor
Mandatory arguments
[-w], show current thresholds
[-T], thread mode, def = FALSE (console mode)
[-D <sec>], run duration in second
between 3 and 200000, def = 0 (one shot)
repeat -n samples(>= 2000) for at least <sec>
-T will be on automatically with -D
[-k <soft threshold>], between 1 and 40000, def = 30000
[-o <selection>], (info operation)
0: all ingress and egress info (default)
1: ingress 100G ports info
2: all ingress info
3: ingress port info
4: ingress PSA info
5: ingress CMN/Shared space info
6: all egress info
7: egress Channel info
8: egress PSA info
9: egress CMN space info
[-x <port_id>], (monitor operation)
0 ~ 42: select one of ingress interface port
43: ingress all 100G ports
44: ingress all ports
45: ingress SecChn1 service lpbk
46: ingress SecChn2 HPI
47: egress Primary channel
48: egress SecChn1 recycle lpbk
49: egress SecChn2 local lpbk
50: ingress CMN space
51: ingress shared space
52: egress CMN space irrelevant output omitted
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 471
Enhanced np_perf Operation
• Continuously read current utilisation of selected buffer pool
• Print one line of output after every ‘-n’ reads
• Release LC CPU:
• Tomahawk: release CPU for 1us on every 500 reads
• Lightspeed: release CPU for 0.5us on every 1000 reads
• If current read exceeds the ‘-k’ threshold, print current usage
• If ‘-D’ or ‘-T’ is specified, run in the background as a thread of:
• Tomahawk: prm_server_to process
• Lightspeed: npu_server process (npu_server_main thread)
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 472
Tomahawk NPU Architecture
TCAM
Tomahawk NPU 4 TM loopback/replication ports 4x36Gbps
• Subject To Early Fast Discard
TM0
Line port Input bypass Line port
WRED
I/F x12 Output I/F x12
TOP Resolve
TOP Search
TOP Modify
TOP Parse
I/F x12 Output I/F x12
SPri WRR
per flow queuing
ICFDQ
TM1 FIA Output I/F
FIA Input I/F
x16 bypass x16
WRED
FIA Input I/F FIA Output I/F
x16 x16
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 473
Ingress Packet Pre-Processing On Tomahawk
• Tomahawk NP has a single RFD buffer pool shared between ingress/egress path
processing
• At times of congestion important packet are protected by Early Frame Discard (EFD)
mechanism:
• EFD thresholds are based on RFD buffer utilisation:
• Low/High threshold per network interface
• Global threshold: based on % of total RFD buffers in use
• EFD is performed in HW, before passing packet to TOP engine feature processing
• EFD is only performed on packets received on network interfaces
• Packets that pass EFD are stored in 256-byte RFD buffers.
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 474
Tomahawk EFD Thresholds
Global EFD Thresholds Per Network Interface EFD Thresholds
16000
RFD Buffers HundredGigE Interface
15200 Threshold 4:
95% Drop low and high priority Threshold Value
Allow critical priority
Drop low and high priority
3600 / 4200(*)
Allow critical priority
13600 Threshold 3:
85% Drop low priority Drop low priority
3400 / 3800(*)
Allow critical and high priority Allow critical and high priority
new CLI (7.1.x and later, via CSCvu03480):
(*)
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 475
Tomahawk HW Based EFD
• Subject To Early Fast Discard • Tomahawk implements HW based priority EFD
• Existing Typhoon SW based EFD for priority classification and discard logic
• hw location 0/x/cpu0 early-fast-discard <ip, mpls, vlan cos, i/o encp> val op
& Pre-parse
• Network control, High priority (ToS/Exp/Vlan Cos/DSCP >= 6) and Low priority
FIA Input I/F
x16 RFD Usage Line Side Forward Line Side Early Fast Line Side Fabric Side Flow
Priority (No Drop) Drop Priority Flow Control Control
>95% Control High, Low Priority On* On
>85% Control, High priority Low priority On* On
>60% All None On* On
NPU HW Early
Fast Drop >40% All None On* Off
<40% All None Off Off
* If not CLI disabled
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 476
What Causes NP Fast Drops?
• EFD drops a packet when RFD threshold is hit (i.e. RFD utilisation is
high)
• What may cause high RFD utilisation:
• RFD leak
• NP is overloaded
• How to confirm RFD leak:
RFD utilisation while traffic flows RFD utilisation when traffic stops Likely Cause
Average ~= Peak ~= RFD threshold Average ~= Peak ~= RFD threshold RFD leak ➔ bug in ucode
Average ~= Peak ~= RFD threshold Average ~= Peak ~= 0 NP overload ➔ heavy features (e.g. BVI,
uRPF, etc.)
Average < Peak (by order of magnitude) Average ~= Peak ~= 0 Bursty traffic, possibly heavy features
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 477
Example - Input
• run np_perf in background during 3600 seconds and save output
into a file (-D)
• Read only RFD buffer utilisation (-R)
• Limit to specific port (-x): 100G ports and both FIA ports
• execute 50000 reads before printing a summary line (-n)
• report syslog when instantaneous RFD utilisation is above 4000 (-k)
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 478
Example – Output Snippet
Output of –k option: whenever the threshold specified by ’-k’ argument is exceeded, output is produced into syslog and standard output
Apr 6 17:33:21.734422, NP_1 xfi_0 , N: 1427 , rfd: 3811 (> 3700) 3811 RFD buffers in use on Hu0/4/0/3
Apr 6 17:33:21.734422, NP_1 xfi_12, N: 140 , rfd: 3818 (> 3700) 3818 RFD buffers in use on Hu0/4/0/2
Apr 6 17:33:21.734422, NP_1 xfi_24, N: 4969 , rfd: 3831 (> 3700) 3831 RFD buffers in use on fabric interface 0
Apr 6 17:33:21.734422, NP_1 xfi_32, N: 889 , rfd: 3819 (> 3700) 3719 RFD buffers in use on fabric interface 1
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 479
Lightspeed iGPB and eGPB
Ingress Global Packet Buffers (iGPB) Ingress Fab Qs Egress VoQs
Egress Global
Common 192k Packet Buffers
guaranteed superframe FIA (eGPB)
space descriptors
(PPEs) 8MB Common
Ctrl OOR drop 4GB HBM Unicast
(when 81 buffers are available) space
• Contiguous (High
memory space Shared High priority OOR drop Output
(when 162 buffers are available) Bandwidth
space 2MB channels
• Once received, Low priority OOR drop Memory)
packet remains in (intfs+PPEs) (when 243 buffers are available) Multicast space
the same buffer,
but it’s accounted • Packets sit in iGPB while they are processed by Packet Processing Engines (PPE)
for in a different
Input • Once packet processing starts by the PPE, packet is not accounted any more against input
pool
channels channel threshold.
guaranteed • Once processing is completed (including QoS) all packets are copied into 4GB HBM (High
space Bandwidth Memory)
(interfaces) • ➔ Concept of limited-size “ingress fast queues” from Tomahawk does not apply on
Lightspeed
• Separation between iGBP and eGBP pool
• iGPB: 72000 units of 128 bytes
• eGPB: 26000 units of 128 bytes
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 480
Lightspeed EFD Thresholds – Input channel
Ingress Global Packet Buffers (iGBP) Threshold values per single HundredGigE interface
Threshold 4: Threshold Description Value
Drop low and high priority
Allow critical priority 4 Drop low and high priority 10766
3 Drop low priority 8944
Threshold 3:
Drop low priority 2 Start sending flow control to line 6509
Allow critical and high priority
1 Stop sending flow control to line 4112
Input
channels
guaranteed
space
(interfaces) Threshold 2:
Start sending flow control to line
Allow all traffic
Threshold 1:
stop sending flow control to line
Allow all traffic
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 481
View NP Ingress GPB
Buffer
Taildrop Thresh L2
Port MinGuar CTL HP LP2 LP1 Xoff Xon
Thresholds
--------------------+-------+----------------------------+--------------
HundredGigE0_0_0_8 8944 11899 10766 8944 8944 6509 4112
HundredGigE0_0_0_9 8944 11899 10766 8944 8944 6509 4112
np_perf –e<n> -r -w
HundredGigE0_0_0_10 8944 11899 10766 8944 8944 6509 4112
HundredGigE0_0_0_11 8944 11899 10766 8944 8944 6509 4112
DropThreshRemaining
Type MinGuar Max CTL HP LP2 LP1
--------------------+---------------+----------------------------
Common Space 20000 26000
Shared Space 0 11860 81 162 243 324
Egress GPB
Lp Hp
Egress Channel MinGuar BpThresh MinGuar BpThresh
--------------------+------------------+-----------------
Primary 2540 1268 2540 1268
Type MinGuar
--------------------+--------
Common Space 20216
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 482
Where’s LS+ Perf Limit? Test Results
Interface In(bps) Out(bps)
Hu0/0/0/5 82.6G/ 82% 94.5G/ 94%
Hu0/0/0/0
Hu0/0/0/13
97.0G/ 97%
82.5G/ 82%
94.6G/ 94%
90.0G/ 89%
Average values
Hu0/0/0/17 96.4G/ 96% 89.8G/ 90% (based on multiple
Hu0/0/0/8 90.4G/ 90% 87.1G/ 87% snapshots during the test)
Hu0/0/0/9 NP2 90.1G/ 89% 86.0G/ 85%
Hu0/0/0/10 91.5G/ 91% 88.2G/ 88%
Hu0/0/0/11 91.2G/ 91% 88.0G/ 87% Features:
- ingress/egress QoS
Node: 0/0/CPU0: - MPLS imposition (L3VPN
----------------------------------------------
Load Packet Rate - Ingress netflow
NP2: 56% utilization 232878440 pps
NP2: 26% utilization 233491860 pps
NP2: 56% utilization 241413480 pps varying readout due
NP2: 53% utilization 298298940 pps to bursty traffic
NP2: 42% utilization 233614360 pps
NP2: 64% utilization 236480540 pps
NP2: 57% utilization 230305960 pps
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 483
np_perf Threads Running In Parallel
# ++++++++++ ingress all 100G ports
run ssh lc5_xr /pkg/bin/np_perf -e0 -r -n1000000 -x43 -D3600
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 484
NP iGPB
Time Port Avg Peak Wm HpAvg HpPeak HpWm
-----------------------+--------------------+---------------------+---------------------
Jun 20 01:03:44.723901 HundredGigE0_0_0_8 13 4164 10 0 8 10
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 485
NP iGPB
utilisation Ingress GPB
Thresholds
sorted
Measurements
Time Space Avg Peak Wm
-----------------------+--------------------+---------------------
Jun 20 01:05:59.891605 Ing Cmn Space 4240 15085 15239
• Common space at ~60% of max Jun 20 01:03:45.665564 Ing Cmn Space 4180 14724 15097
• Empty shared space Jun 20 00:58:10.271313 Ing Cmn Space 4231 14099 14256
• ➔ ingress pipeline PPEs are not Jun 20 01:04:43.159634 Ing Cmn Space 4239 13632 13869
Jun 20 00:59:06.216773 Ing Cmn Space 4263 13429 13638
overloaded Jun 20 01:01:53.595518 Ing Cmn Space 4209 13350 13628
Jun 20 00:58:41.276052 Ing Cmn Space 4216 12999 13264
Jun 20 00:59:16.923882 Ing Cmn Space 4192 12997 13318
Jun 20 01:03:51.374061 Ing Cmn Space 4194 12955 13071
Jun 20 00:59:37.209121 Ing Cmn Space 4226 12737 12933
Measurements
Time Space Avg Peak Wm
-----------------------+--------------------+---------------------
Jun 15 16:27:51.575630 Ing Shared Space 0 0 0
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 486
NP eGPB
Thresholds
Lp Hp
Egress Channel MinGuar BpThresh MinGuar BpThresh
Egress --------------------+------------------+-----------------
Primary 2540 1268 2540 1268
Primary Measurements
Pool
Time Port Avg Peak Wm HpAvg HpPeak HpWm
-----------------------+--------------------+---------------------+---------------------
Jun 20 00:59:07.161242 Egress Primary 43 1742 1742 4 1420 1510
(Top 5)
Jun 20 01:01:40.263936 Egress Primary 44 1724 1724 4 1370 1460
Jun 20 00:57:35.265513 Egress Primary 42 1724 1724 3 1274 1594
sorted
Observations: sorted
• LP not Measurements
Time Port Avg Peak Wm HpAvg HpPeak HpWm
approaching -----------------------+--------------------+---------------------+---------------------
Jun 20 00:57:21.642064 Egress Primary 44 1680 1680 4 1620 1626
70% Jun 20 01:06:28.024603 Egress Primary 46 1680 1718 4 1596 1600
• HP not Jun 20 01:05:11.635047 Egress Primary 43 1682 1728 4 1588 1612
Jun 20 01:05:52.364817 Egress Primary 45 1680 1686 4 1578 1622
approaching Jun 20 00:57:30.865742 Egress Primary 46 1688 1688 4 1558 1592
65%
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 487
NP eGPB Egress CommonPool Utilisation
(Top 5)
Thresholds
Type MinGuar
--------------------+--------
Common Space 20216
Measurements sorted
Time Space Avg Peak Wm
-----------------------+--------------------+---------------------
Jun 20 01:03:10.035183 Egr Cmn Space 3343 10691 10771
Jun 20 01:02:08.450449 Egr Cmn Space 3358 10547 10987
Observations: Jun 20 01:03:02.794878 Egr Cmn Space 3367 10478 10948
• Not approaching Jun 20 01:03:53.247814 Egr Cmn Space
Jun 20 01:05:35.467574 Egr Cmn Space
3357
3366
10471 10668
10275 10535
55% Jun 20 01:02:39.539830 Egr Cmn Space 3354 10271 10493
Jun 20 00:56:49.441531 Egr Cmn Space 3327 10270 10487
Jun 20 01:02:46.863921 Egr Cmn Space 3342 10209 10350
Jun 20 01:01:07.863248 Egr Cmn Space 3344 10177 10558
Jun 20 00:59:42.809658 Egr Cmn Space 3375 10132 10571
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 488
Additional Fast Drop Troubleshooting Commands
show interface <interface>
show controllers <interface> stats
show policy-map interface <interface>
show qoshal default-queue interface <interface>
show qoshal loopback-queue interface <interface>
show controllers np fast-drop np<np_number> location <location>
show controller np counters np<np_number> location <location>
show interfaces <interface> accounting rates
telemetry model-driven
sensor-group NP
sensor-path Cisco-IOS-XR-asr9k-np-oper:hardware-module-np/nodes/node/nps/np/efd
sensor-path Cisco-IOS-XR-asr9k-np-oper:hardware-module-np/nodes/node/nps/np/fast-drop
sensor-path Cisco-IOS-XR-asr9k-np-oper:hardware-module-np/nodes/node/nps/np/counters
sensor-path Cisco-IOS-XR-asr9k-np-oper:hardware-module-np/nodes/node/nps/np/load-utilization
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 489
Agenda
✓ System Architecture: System anatomy & health
✓ Operating System & Configuration: IOS-XR & configuration models
✓ Control, Management, Security: Processing of control & exceptions
✓ Transit Packet/Frame Journey: Life of L3/L2 unicast/multicast
✓ MPLS Operation: Processing, forwarding & L3/L2 service operation
✓ Troubleshooting: Diagnostics, counters, drops, and packet capture
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 490
Complete your Session Survey
• Please complete your session survey
after each session. Your feedback
is important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (open from Thursday) to
receive your Cisco Live t-shirt.
• All surveys can be taken in the Cisco Events Mobile App or
by logging in to the Session Catalog and clicking the
"Attendee Dashboard” at
https://www.ciscolive.com/emea/learn/sessions/session-catalog.html
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 491
Continue
Agenda Your Education
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 492
Thank you
Glossary
1R2C One rate two color CLNSE Connectionless Network Service
2R3C Two rate 3 color CoS Class of Service
802.1Q An IEEE [Institute of Electrical and Electronics Engineers] standard CoPP Control Plane Policing
AAA Authentication, Authorization, and Accounting CPU Central Processing Unit
AAL5 ATM Adaptation Layer 5 CRC Cyclic Redundancy Check
AC Attachment Circuit CSC Carrier Supporting Carrier
ACE Access Control Entry DBUS Data bus
ACL Access Control List dCEF Distributed Cisco Express Forwarding
ADJ Adjacency DB Database
ARP Address Resolution Protocol DCI Data Center Interconnect
ASIC Application-Specific Integrated Circuit DDR Double Data Rate
ATM Asynchronous Transfer Mode DFC Distributed Forwarding Card
B Byte DoS Denial of Service
bc Burst committed DRAM Dynamic Random Access Memory
Bcast Broadcast DSCP Differentiated Services Code Point
BD Bridge Domain DTP Dynamic Trunking Protocol
be Burst excess DWDM Dense Wavelength Division Multiplexing
BFD Bidirectional Forwarding Detection EFD Early Fast Discard
BGP Border Gateway Protocol EFP Ethernet Flow Point
BPDU Bridge Protocol Data Unit EIGRP enhanced Internal Gateway Routing Protocol
BVI Bridge Virtual Interface ELAM Embedded Logic Analyzer Module
CAM Content Addressable Memory EOBC Ethernet Out of Band Channel
CBWFQ Class-Based Weighted Fair Queuing EoMPLS Ethernet over Multiprotocol Label Switching
CDP Cisco Discovery Protocol eq Equal
CEF Cisco Express Forwarding ES+ Ethernet Services Plus
cir Committed information rate ESI Ethernet Segment Identity
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 495
Glossary
EVI EVPN Instance IPSec Internet Protocol Security
FIA Fabric Interface ASIC IPv4 Internet Protocol version 4
FPD Field Programmable Device IPv6 Internet Protocol version 6
FPGA Field Programmable Gate Array IPV6CP IPv6 [Internet Protocol version 6] control Protocol [Part of PPP}
FW Firmware IRB Integrated Routing & Bridging
Gbits Gigabits ISIS Intermediate System - Intermediate System [Internal gateway routing protocol]
Gbps Gigabit per second L2 Layer 2 [OSI Open Systems Interconnection] OR Level 2
GByte Gigabyte L2PT Layer 2 Protcol Tunneling
GE Gigabit Ethernet L2VPN Layer 2 VPN [Virtual Private Network]
GHz Gigahertz L3 Layer 3 [OSI Open Systems Interconnection] or Level 3
GPB Google Protocol Buffer L4 Layer 4 [OSI Open Systems Interconnection] or Level 4
GRE Generic routing Encapsulation LACP Link Aggregation Control Protocol
HA High Availability LAN Local Area Network
HbH Hop by Hop LC Line Card
HBM High Bandwidth Memory LCDBUS Line Card Data Bus
HSRP Hot Standby Router Protocol LCP Link Control Protocol [Part of PPP]
H/W Hardware LCRBUS Line Card Results Bus
H-QoS Hierarchical Quality of Service LDP Label Distribution Protocol
ICMP Internet Control Message Protocol LER Label Edge Router
ID Identity LFI Link Fragment Interleave
IDS Intrusion Detection system LFIB Label Forwarding Information Base
IFIB Internal FIB [Forwarding Information Base] LLQ Low Latency Queue
IOS Internet Operating system LPTS Local Packet Transport Services
IP Internet Protocol LSP Label Switched Path
IPCP IP [Internet Protocol] Control Protocol [Part of PPP] LSR Label Switching Router
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 496
Glossary
MAC Media Access Control NVRAM Non-Volatile Random Access Memory
Mbps Megabits per second OSM Optical Services Module
MByte Megabyte OSPF Open Shortest Path First [protocol]
Mcast Multicast PA Port Adapter
MET Multicast Expansion Table PAgP Port Aggregation Protocol
MHz Megahertz PDU Protocol Data Unit
MIB Management Information Base PFC Policy Feature Card
MIPS Multiprocessor without Interlock Pipeline Stages PFM Platform Fault Manager
Mod Modulo PHP Penultimate Hop Popping
Mpps Megapackets per second PIFIB Pre-IFIB [Internal Forwarding Information Base]
MPLS Multiprotocol Label Switching PLU Packet Lookup Unit
MPLS-TP Multiprotocol Label Switching - Transport Profile PoP Point of Presence
MPP Management Plane Protection POS Packet Over sonet
MQC Modular Quality of service Command line interface PPP Point to Point Protocol
MSDP Multicast Source Discovery Protocol PPS Packets Per Second
MSFC Multilayer Switch Feature Card PSIRT Product Security Incident Reponse Team [Cisco]
MSS Maximum Segment Size (TCP) PW Pseudo-Wire
MTU Maximum Transmission Unit QoS Quality of Service
MUX Multiplexer RADIUS Remote Authentication Dial In Service [protocol]
NAT Network Address Translation RARP Reverse ARP [Address Resolution Protocol]
ND Neighbor Discovery [protocol] RBUS Results bus
NP Network Processor RIP Routing Information Protocol
NPU Network Processor Unit RJ45 An 8 wire wiring standard
NSF Non-Stop forwarding RP Routing Processor OR Route Processor
NTP Network Time Protocol RPF Reverse Path Forwarding
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 497
Glossary
RSP Routing and Switching Processor OR Route Switch Processor [Cisco] tx Transmit
RSVP Resource reservation protocol uC Microcontroller
RTBH Remote Triggered Black Holing UDLD Unidirectional Link Detection
SCP Secure Copy uRPF Unicast Reverse Path Forwarding
SDRAM Synchronous Dynamic Random Access Memory VACL VLAN [Virtual Local Access Network] Access control List
SFP Small Form-factor Pluggable VLAN Virtual Local Access Network
Sh Shaper VOQ Virtual Output Queueing
SIP Shared Port Adapter Interface Processor [Cisco] VPLS Virtual Private LAN [Local Access Network] Service
SNMP Simple Network Management Protocol VPN Virtual Private Network
SP Service Provider OR Switching Processor VQI Virtual Queue Identifier
SPA Shared Port Adapter VRF Virtual Routing and Forwarding
SRAM Static Random Access Memory VRRP Virtual Router Redundancy Protocol
SSH Secure Shell [protocol] VTP Virtual Trunking Protocol
SSO Stateful Switch Over VTY Virtual Terminal line
SSRAM Synchronous Static Random Access Memory WAN Wide Area Network
SUP Supervisor [Cisco] WFQ Weighted Fair Queuing [Cisco]
SW Switching WRR Weighted Round Robbin
TAC Technical Assistance Center [Cisco] XML Extensible Markup Language
TACACS Terminal access Control Access-Control System [protocol]
TCAM Tertiary Content Addressable Memory
TCB Transmission Control Block
TCL Tool Command Language
TCP Transmission Control Protocol
TDM Time Division Multiplexing
TTL Time To Live
TECSPG-3204 © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Public 498